Literary Insight: James Risen, The Last Honest Man: The CIA, the FBI, the Mafia, and the Kennedys―and One Senator’s Fight to Save Democracy (Little, Brown and Company, 2023)

Senator Frank Church holding a poison dart gun developed by the US Intelligence Community (left) and Senator John Tower observing (right) at the Church Committee’s first open session on September 17, 1975. In the wake of Watergate, Church was tasked with investigating abuses of power by the US Intelligence Community. Rather than noting mere oversteps by the Intelligence Community, Church and his  Congressional Committee put forth dark truths about its work that they uncovered. Indeed, Church exposed a myriad of clandestine and covert plots orchestrated by the Central Intelligence Agency (CIA), the National Security Agency (NSA) and  the Federal Bureau of Investigation (FBI) as well as other federal organizations. In many cases, singular actions were taken by the Intelligence Community actually amounted to criminal violations of federal law. This essay is not a book review. Instead, it is a literary insight essay providing meditations of Risen’s The Last Honest Man. In this essay, greatcharlie’s insights are delimited to a discussion of occasional rogue behavior, abuses of law, by members of the US Intelligence Community. The book is remarkably suggestive with respect to contemporary times. Such an edict surely requires examination. In this essay, readers may come upon aspects of issues or view new angles of the discussion they may not have not recognized or perhaps would not have considered after reading the book.

James Risen’s The Last Honest Man: The CIA, the FBI, the NSA, the Mafia, and the Kennedys–and One Senator’s Fight to Save Democracy (Little, Brown and Company, 2023), [ISBN-13 9780316565134] tells the story of how Frank Church, at the the time  Senator of Idaho for almost two decades, attempted to reign in US Intelligence Community activities in 1975 after years of no Congressional oversight. Risen draws upon hundreds of interviews, thousands of pages of recently declassified documents, and reams of unpublished letters, notes, and memoirs, some of which remain sensitive today. The story as told in the 480 page tome is true to reality.

As a Senator, Church promoted, advocated, and vigorously defended the US Constitution. He was guided by US values and supported its interests. Church’s beliefs would compel him to lead congressional opposition to the Vietnam War and had become a scathing, radical critic of what he saw as US imperialism around the world. Yet, Risen suggests the “rebellious” Church was politically ambitious, and sough acceptance from the foreign and national security policy establishment of which he was very skeptical. He was also  interested in running for president. The author indicates that Church was not devoid of faults. In the wake of Watergate Church was tasked with investigating abuses of power by the US intelligence community. Rather than noting mere oversteps by the Intelligence Community, Church and his Committee put forth dark truths about its work that they uncovered. Indeed, Church exposed a myriad of clandestine and covert plots orchestrated by the Central Intelligence Agency (CIA), the National Security Agency (NSA) and  the Federal Bureau of Investigation (FBI) as well as other federal organizations. In many cases, singular actions were taken by the Intelligence Community that actually amounted to criminal violations of federal law.

The course taken seemed right to Church as the Committee’s Chairman. One might imagine he understood there was great pitfall involved with criticism the work of Intelligence Community, however, Church never hesitated. By Risen’s account, Church was in fact persistent in his pursuit of the matter. He would show historic strength in his greatest moment. Risen did not indicate that Church had wasted any of the Committee’s valuable time rooting around in extraneous matters. Church stayed focused on his task. 

This essay is not a book review. Instead, it is a literary insight essay providing meditations of Risen’s The Last Honest Man. In brief, a literary insight essay’s purpose is to express a readers feelings and ideas about a literary work. It is a journey of introspection. In this essay, greatcharlie’s insights are delimited to a discussion of occasional rogue behavior, abuses of law, by members of the US Intelligence Community. The book is remarkably suggestive with respect to contemporary times. Such an edict surely requires examination. In this essay, readers may come upon aspects of issues or view new angles of the discussion they may not have not recognized or perhaps would not have considered after reading the book

In previous times, one might have supposed the understanding, acceptance of what Founding Fathers who authored the US Constitution defined as the unalienable rights of life liberty, and the pursuit of happiness were sacrosanct. However, one might be able to comfortably conclude today that far less importance is given to those rights upon which the country’s soul and existence was once firmly based and upon which the US public’s expectation and requirement for the good governance of the democracy has its roots. What seemed so certain about the once lauded strictures–as a sampling, the Bill of Rights, the first 10 amendmens of the US Constitution–that would guide the country perpetually, is far less sure today than ever before. There are laws, but very often justice for the people is much harder to find. Breaches of regulations of the US Intelligence Community against ordinary citizen, not responsible for any wrongdoing, must not only be examined but vigorously pursued. Si quid novisti rectius istis, candidus imperti; si nil, his utere mecum. (if you can better these principles, tell me; if not, join me in following them.)

Meeting of the Members of the Church Committee prior to several hearings in autumn (above). Some Members of Congress in 1975 would likely have been more inclined to be dismissive of an investigation of the Intelligence Community than give serious attention to it. The Intelligence Community’s leadership could only hope that matters concerning its operations would be handled by the Church Committee with the same delicacy. The Congress for years had failed for years to put a leash on the Intelligence Community. Consequently, it ran off on its own in the world. Nothing but the foreign opposition, stood in its way. As for what remotely sufficed for “oversight” before the Church Committee was set up, information on Intelligence Community activities was curiously gleaned from the organizations’ directors by senior Members of both the House and Senate Armed Services Committees. They would meet with the directors to occasionally chin-wag likely on the latest activities, resources, personnel, latest activities, troublesome spots, and accomplishments. In those times, save the Congress and the free press, the US public would be assuredly have been kept in the dark regarding the government’s actions in the province of intelligence. The means today by which the US public is kept equally abreast of the Intelligence Community’s activities as then is not as certain. To that extent, what aided the Church Committee’s cause was the fact that certain elements of the national newsmedia, far less then than today, were nevertheless the best and only fount of information about the US Intelligence Community’s performance.

The Church Committee, known formally as the Senate Select Committee to Study Government Operations with Respect to Intelligence Activities established on January 27, 1975. Open sessions were held in September and October of 1975, but incisive research was conducted throughout that year.  Prior to the Church Committee, there had not been any formal Congressional oversight process for what became the US Intelligence Community for nearly 30 years. The CIA was established in 1947, and the NSA was organized in 1952.The FBI has been around since 1924. The intelligence activities of a White House domestic surveillance program and the Internal Revenue Service were also probed. Following up on information reported in a December 22, 1974 New York Times article authored by investigative journalist Seymour Hersh, there was plenty sitting in the vaults of the Intelligence Communityfor the Committee to investigate. It was not mere tittle-tattle.

Some Members of Congress in 1975 would likely have been more inclined to be dismissive of an investigation of the Intelligence Community than give serious attention to it. The Intelligence Community’s leadership could only hope that matters concerning its operations would be handled by the Church Committee with the same delicacy. The Congress for years had failed for years to put a leash on the Intelligence Community. Consequently, it ran off on its own in the world. Nothing but the foreign opposition, stood in its way. As for what remotely sufficed for “oversight” before the Church Committee was set up, information on Intelligence Community activities was curiously gleaned from the organizations’ directors by senior Members of both the House and Senate Armed Services Committees. They would meet with the directors to occasionally chin-wag likely on the latest activities, resources, personnel, latest activities, troublesome spots, and accomplishments. 

There was a danger that as a result of the Church Committee coming off the heels of the Vietnam War, the violent response to the Civil Rights Movement, the assassinations of Martin Luther King , Jr., Senator Edward Kennedy, and the earlier assassination of US President John Kennedy, Watergate, and the country’s continued disfunction on race, equality for women, and gross inequities in wealth establishing large divisions in social class, enabling poverty. the Intelligence Community would not be used as a depository for the ills of US foreign and national security policy.

Omne ignotem pro magnifico. (Everything unknown is magnificent.) In the old-fashion, out-moded sense, the US public at the time appreciated the services provided by its case officers and special agents, had possessed an sense of obligation to its Intelligence Community. However, ultimately,  the Intelligence Community is beholding to the people who expect and deserve its unwavering fidelity.

When evidence of Intelligence Community wrongdoings and abuses became overwhelming, much changed on all fronts. The US had to confront the truth about itself if it was reach the heart of the matter.The Committee soon discovered that there was no possibility to the limits of the Intelligence Community’s operations. It was clearly capable of any fantastic outrage. There was a certain method to the eccentric madness of the Intelligence Community. What was discovered was all outside of the common. There was no outlier so to speak. Nothing revealed could have dare been called trivial. It was essential for the Church Committee Members to be put in the full picture. A priority appeared to be to gain a sense of the scale of those activities. This matter went much deeper than originally supposed.

It required life experience to understand what might be possible, to explore with an open-mind, all that would likely stand much of what Church Committee Members believed to be known on its head. To accept all that was being exposed in Church’s Committee would require one to possess a mind that could view it all with a mixture of imagination and reality. At the same time, many Church Committee Members and staff served overseas during World War II, as well as in the Korean War and in the Vietnam War were not mystified by any of it. It was about killing, death. Nothing was beyond their comprehension. As with other Committee members, Church examined the Intelligence Community’s activities burdened with a rational frame of mind. There were difficulties, but there would always be difficulties.

True, what was done was done. However, there was the chance to prevent the furtherance of such activities, crimes and halt any additional damage to the reputation and standing of the US worldwide . The US is a constitutional federal republic, meaning its government is based on a Constitution which is the supreme law of the country and both citizens and their governing officials are bound to follow the rules established in that Constitution. The Intelligence Community’s actions overseas over the years fell under the jurisdiction of the countries in which the occurred. However, their actions against US citizens inside the US fell under federal and state law. Remarkably, an extraordinary number of operations conducted by Intelligence Community members and other government organizations against domestic targets were discovered.

In those times, save the Congress, as well as a free press, the US public will be assuredly kept in the dark regarding the government’s actions, particularly in the province of intelligence. The means today by which the US public is kept equally abreast of the Intelligence Community’s activities as then is not as certain. To that extent, what aided the Church Committee’s cause was the fact that certain elements of the national newsmedia, far less then than today, were nevertheless the best and only fount of information about the US Intelligence Community’s performance. At least for a generation or two, not too long afterward, certain services of the Intelligence Community would remain dark organizations in the minds of many conscientious US citizens. There has been nothing of such consequence concerning the Intelligence Community beyond the IranContra Affair in which its activities have been put from and center for the US public. As a news story in present times, Church Committee findings unlikely would be of interest to the overwhelming majority.

William Colby, Director of the CIA from 1973 to 1976 (above). Once the Church Committee came prying, the Intelligence Community’s leadership and even White House under US President Gerald Ford appeared to become unsettled. The Intelligence Community’s leadership knew exactly what had been transpiriing in their organizations over the years. A reasonable assessment, completely unbiased, would be that under the strictures of US law, particularly on the domestic front, much of it was wrongful. To that extent, the Intelligence Community’s leadership, particularly the CIA’s leadership, knew members of the Church Committee would light on them once they had the opportunity to become read in on information available and actiually see and handle some of the recherché tools and gadgets the Intelligence Community had developed. Given how the hearings were organized, Intelligence Community executives and senior managers would have a considerable measure of control over their organizations’ fates and their own careers as would provide testimony as key witnesses before the Church Committee in both open and closed sessions. Whatever the Intelligence Community’s leadership hoped to accomplish, particularly with regard to minimizing the shock to the US public over each fantastic outrage revealed, surely failed if disproving newly hatched fears about the Intelligence Community was one goal, their efforts were not successful. Contrary to whatever public relations benefit the Intelligence Community’s leadership may have been hoping to garner as result of the hearings, the Intelligence Community’s reputation instead was decisively sullied. Yet, years later, it is clear that whatever resulted from the Church Committee Hearings hardly held fast. The way that the US public thought about not only the government and the Intelligence Community and also the ability to hold it accountable, would shift, opening the door to abuses that would have been beyond the Church Committee’s wildest imagining.

Once the Church Committee came prying, the Intelligence Community’s leadership and even White House under US President Gerald Ford appeared to become unsettled. The Intelligence Community’s leadership knew exactly what had been transpiriing in their organizations over the years. A reasonable assessment, completely unbiased, would be that under the strictures of US law, particularly on the domestic front, much of it was wrongful. To that extent, the Intelligence Community’s leadership, particularly the CIA, knew members of the Church Committee would light on them once they had the opportunity to become read in on information available and handle some the recherché tools and gadgets the Intelligence Community had developed.

From their view, circumstances of the time, the Cold War, the Modern Age, surpassed the use of ordinary ways and means to defeat threats and assure policy aims. They expoused that extreme circumstances required extreme action. Much more was constantly being required to meet ends covertly. Despite the rather widespread disapproval of its actions, the Intelligence Community’s leadership never believed the use of “ramped up” tactics, techniques, and procedures was not a crime. Through there use, the Intelligence Community could fight adversaries by means other than war to safeguard US national security.

That explanation–that alibi–would not have a steadying effect on the US public, many of whom had been made quite concerned after learning from news media reporting of the open sessions of the Church Committee how the government, honorable and powerful, had been behaving in their name. Again, there was mostly disappointment among the people. A fearful mood had gripped some. If it were only a smattering of odd incidents, any audacious thinking and action perhaps might have seemed slightly tolerable. That by no means was the case. 

The Church Committee Hearings were a moment at time in which the Intelligence Community’s leadership would been behooved to guard against self-deception and delusion to avoid becoming too far a field. However, their conviction over everything the Intelligence Community did, however, was so unwavering that one might imagine a private response among some executives and senior managers was ironically to question the loyalty of Church Committee members. The pretense within the Intelligence Community’s leadsrship was that their organizations were “something above”,” something better”, than the rest of society and thereby they were entitled to do things outside US values,  principles, and laws.

Given how hearings were organized, Intelligence Community executives and senior managers would have a considerable measure of control over their organizations’ fates and their own careers as they would provide testimony as key witnesses before the Church Committee in both open and closed sessions.

If the Intelligence Community’s leadership had any thoughts of avoiding hearings, the Church Committee would brook no denial. Forced to go through the investigative process, they might have left the door open in their minds to the hope that the Church Committee’s findings would allow for the suggestion of a rationale for the behavior of their personnel and all the transpired over the years. They might have hoped to hear a plausible explanation that would circle around notions of the ubiquitous and ceaseless Communist threat posed by the Soviet Union, the Eastern Bloc countries,, and the People’s Republic of China to the US, its allies and friends, and other democracies worldwide.

A figurative pirate’s chest of the strange, unusual technologies and maccabre tactics, techniques procedures, and methods was unlocked and opened wide. It was trove of horrors. To the overwhelming majority of US citizens who gave their attention to the Church Committee hearings, all that was discovered felt, to turn a phrase of the era, very un-American. Risen describes Church Committee revelations on assassinations targeted at Cuban President Fidel Castro in Cuba, Congolese President Patrice Lumumba, and South Vietnamese President Ngo Dinh Diem. There were others. He reports on the CIA’s MKULTRA program.and the use of LSD. and it’s domestic surveillance program, HTLINGUAL. He tells the shocking story of the FBI’s surveillance and harassment of Martin Luther King, Jr. and other US activists under COINTELPRO operations. The CIA contacted an organized crime figure, Johnny Roselli, to act as an intermediary to elicit the assistance of  Chicago organized crime boss Sam Giancana, to coordinate CIA efforts to assassinate Fidel Castro with the Mafia. This list barely scratches the surface. 

There was a sense of revulsion among Committee members and staff. Each Committee Member may have felt something private, very intense, very off putting  about matter. Some might say that many of Intelligence Community lurid activities reflected a loathing of the human race. Seemingly, it was the organization’s preferred way to have others to perceive it. The Church Committee did not really warm to any of those who testified. The Intelligence Community’s leadsrship was not always well-collected while offering testimony. Still, among those Church Committee Members who may have felt disgust over the deeds of the Intelligence Community they had funded generously, there was no intention of allowing anger and grief conspire to create a blindness that might interfere with their vital work.

Whatever the Intelligence Community’s leadership hoped to accomplish, particularly minimizing the shock to the US public over each fantastic outrage, surely failed. If mitigating newly hatched fears about the Intelligence Community was one goal, their efforts were not successful. Contrary to whatever public relations benefit the Intelligence Community’s leadership may have been hoping to garner as result of the hearings, the Intelligence Community’s reputation instead was decisively sullied. Yet, years later, it is clear that whatever resulted from the Church Committee hearings hardly held fast.. The way that the US public thought about not only the government and the Intelligence Community and also the ability to hold it accountable, would shift, opening the door to abuses that would have been beyond the Church Committee’s wildest imagining.

Surely, nothing uncovered by the Church Committee was lost upon the Intelligence Community’s opponents overseas. Their opponents overseas were tough and numerous. However, it seems elements of the US Intelligence Community thought of themselves as being tougher, and sought to be rougher still. It is doubtful that the Soviet Union, the Eastern Bloc countries, and the People’s Republic of China saw or heard anything too shocking or surprising. The Church Committee’s findings were unlikely music to their ears regarding the international front. Clearly, the US was active clandestinely and covertly overseas in a big way. On the domestic front in the US, however, the situation was likely viewed as much better by adversarial foreign intelligence services. News of the Intelligence Community’s history of operations against political targets very likely indicated to the Intelligence Community’s opponents that it was flush with so much cash that it could divert resources and manpower to those efforts. 

Although it was not broached in Risen’s book, those political diversions may have provided enough reason for their foreign intelligence services to sense they were often operating with impunity in the US. Resources and manpower were not just diverted to that mission, but dedicated to it through multiple programs. Conceivably, that may have encouraged the Soviet Union,  Eastern Bloc countries, and the People’s Republic of China to increase their presence and efforts in the US. The Soviet spymaster of Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, Oleg Kalugin, indicates in his memoirs that the 1960s and 1970s were heady, fruitful times for Soviet and Eastern Bloc intelligence operations inside the US. (SEE greatcharlie’s April 30, 2020 post entitled, “Book Review: Oleg Kalugin, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994)”) It would have been almost impossible for the Intelligence Community to know the totality of what foreign intelligence services might have been successfully collecting at the time until new political, economic, or financial information allowed some unexplained upper hand or scientific or technological advances would crop up that evinced tell-tales of its origins and that it had been stolen.

Risen explains Church worked after the Committee Hearings to establish Intelligence Community oversight. Steps included the development of the Foreign intelligence Surveillance Act (FISA) of 1978 and creation of the Senate Select Committee on Intelligence on May 19, 1976 and the House Permanent Select Committee on Intelligence on July 24, 1977.

James Angleton, Chief of CIA Counterintelligence from 1954 to 1975, at the Church Committee Hearings. A figurative box of the strange, unusual technologies and maccabre tactics, techniques procedures, and methods was unlocked and opened wide. It was trove of horrors. To the overwhelming majority of US citizens who gave their attention to the Church Committee hearings, all that was discovered felt, to turn a phrase of the era, very un-American. Risen describes Church Committee revelations on assassinations targeted at Cuban President Fidel Castro in Cuba, Congolese President Patrice Lumumba, and South Vietnamese President Ngo Dinh Diem. There were others. He reports on the CIA’s MKULTRA program.and the use of LSD. He tells the shocking story of the FBI’s surveillance and harassment of Martin Luther King, Jr. and other US activists under COINTELPRO operations. The CIA contacted an organized crime figure, Johnny Roselli, to act as an intermediary to elicit the assistance of  Chicago organized crime boss Sam Giancana, to coordinate CIA efforts to assassinate Fidel Castro with the Mafia. This list barely scratches the surface. During his testimony at the Church Committee, Angleton was pressed on the CIA’s domestic surveillance program, HTLINGUAL. It was sensed at the time that Angleton had not been completely forthcoming with Committee Members.

Without pretension, what greatcharlie relates in the following discussion is completely true and accurate to the best of its knowledge and belief. The information is simply laid out. There is no insistence that readers accept it. It is what it is.

After the September 11, 2001 terrorist attacks on the US, practically all curbs of the psyche and actual policy and legal parameters against abuses were not observed to the letter–somewhat overlooked–by the Intelligence Community in favor of a “go get ’em” attitude and offensive posture against “the enemy”. The priority became getting results: killing and capturing terrorists; uncovering and thwarting terrorist plots; destroying terrorist networks; and, seizing terrorist assets. The practice nearly became “anything goes.” The mainstream newsmedia in the US was supportive of just about everything done and a very vocal US public demanded further retribution. The emotional response of the US public was certainly understandable, however, most were abysmally ignorant of the Intelligence Community’s activities were overseas, literally on the high seas, and domestically. Among US public there are those who, even after being introduced to actualities, are unable to would hardly shake their views how their government can often operate. Today, only a fraction might take a firm interest in the misdeeds, violations of rights under the Constitution, or even larceny and outright violent crimes committed by the Intelligence Community.  It is likely the case for members of the US public that as long as the Intelligence Community’s actions do not directly effect them or their own, there is little to be concerned about. To go a step further, some members of the US public may not be willing to accept that rogue elements of the Intelligence Community and their contractors would engage in surveillance and direct acts against innocent US citizens. Nevertheless, it happens, as Risen’s book makes it very clear. 

The Global War on Terror has not ended. However, US President Joe Biden has reorganized resources and manpower in the over two decades long ubiquitous fight. Fewer airstrikes are ordered in fewer countries. US counterterrorism forces appear to be operating overseas in lesser numbers. The tempo of their operations has decreased. One would expect those decisions and others have had a correlative impact of ratcheting down the Intelligence Community’s use of resources and manpower. Looking a bit further on its tasks, no greater evidence of the Russian Federation’s potential for military aggression exists at the present than the Ukraine War. Yet, relative threats posed by the Russian Federation to the US and its interests has lessened. The degree of inefficiency and albeit incompetence that has been displayed by the Russian Federation Armed Forces and the intelligence services in the prosecution of operations of or pertaining to the Special Military Operation that the Cold War fears of the untamable and indomitable “”Russian Military Bear” has since faded at bit.. However, concerning the People’s Republic of China, however, its intelligence services have displayed an acumen in their espionage activities within the US that has been seemingly beyond the capacity of US counterintelligence services to combat. US foreign intelligence operations in the People’s Republic of China also have not met with great success. In the aggregate, the People’s Republic of China has delivered wrenching blows against the US. 

The point here is that with relatively reduced threats against some opponents and barely a modicum of success against espionage directed from the People’s Republic of China foreign intelligence services in the US, some unscrupulous individuals in the organizations of the Intelligence Community may feel a “greater flexibility to do other things” undistracted by real work upon which they could fully focus their minds and hone their “skills”. Thereby, in an odd and unhealthy, and criminal twist, they appear to have shamefully preyed upon the average US public. Rogue members of these organizations–and there always have been a few– have engaged have engaged in this behavior for years, but happens not with similar frequency. They generally engage in their wrongful acts well-below the radar.  It is awful to accept that a few personnel of the US counterintelligence services, including not so trustworthy contractors they call upon, to knowingly use the exquisite technical resources of the US and tactics, techniques procedures and methods to crush ordinary citizens who have no interest in doing anything against the US. (On this matter, greatcharlie writes not from study, but rather from personal experience as an innocent target of such wrongful and incredibly costly activities.)

The rogue federal officers and contractors have their own reasons for turning to villainy and own reasons for selecting their victims. The victims names may have been found on some innocuous list within the rogue federal officers organizations. Through wrongdoing, the names are apparently transferred to an active list of targets for the rogue federal officers and contractors to prey upon. Rogue federal officers and contractors will claim to have legitimate cause for their actions them. Warrants from “helpful” judges presiding on the Foreign Intelligence Surveillance Court (FISC) will be provided based on those claims, allowing electronic surveillance,  physical search, and other forms of investigative actions for foreign intelligence purposes. (The FISC was established by Congress in the aforementioned FISA.) More importantly, the warrants will allow the rogue federal officers and contractors to increase available financial resources for activities against their innocent victims. 

Needless to say, cellphone calls, texts, emails of victims are monitored. Letters and other missives are intercepted, extracted from, and occasionally inserted into, the victims mail deliveries. Electronic devices to monitor the victims in their own homes are used. Cable television and high speed internet services are weaponized for use as monitoring equipment. The technologies may have changed, but this practice of monitoring resembles that used against Martin Luther King, Jr. when he was, as noted earlier, the target of a federal surveillance and “dirty tricks” program. Yet, far much more, not relayed here, is done along this track. The individual’s personal life, finances, property, could are targeted. Doors will be closed to employment, association with social and professional groups, membership in organizations. Recognition and awards for achievement and excellent will be denied. Family members and friends will also face attacks designed to separate them from the individual or destroy them. Every effort will be made to shun the victim from society.

To gnaw a bit further on the surveillance of a victim, as a standard practice that task is performed through the use of manpower on the street. The personnel of a contractors are used mostly for this purpose. Some are employeed to engage in electronic surveillance.  To use manpower on the street in a very robust way, contractors, albeit errantly, will hire ordinary individuals from the US public to assist them. Greater budgets allowed once FISC warrants are secured mean bigger operations.  That permits exigent hires  For rogue federal officers and contractors greater budgets through innovative ways mean greater wrongful operations,, but also the potential for increased financial gains for them. (In the past, waggish federal officers were sometimes heard to jest that such improper efforts perfectly allowed for the creation of a “second retirement” much better than the one their organizations were going to provide.) C’est comme ça.

It is rarely difficult to find exigent hires willing for usually modest, but sometimes exhorbitant payment–bribes–to zealously engage in surveillance activities and aggressive, even criminal acts at the behest of rogue federal officers and contractors. Most of the exigent hires only understand “spy work” through Hollywood depictions and exciting novels. Most are thrilled to live out “Walter Mitty” fantasies of being a spy as they disrespect, betray and bully the innocent! The ranks of citizen hires are inflated by the exigent employ of permanent and temporary residents, visitors, tourists, and undocumented immigrants as well. The visitor to the US will receive an unforgettable lesson on the meaning and nature of civil rights in the country courtesy of the rogue federal officers and contractors. Whether a citizen or visitor, the hires receive remuneration. Exigent hires are compensated immediately for their wrongful service. The payments are in essence bribes to encourage and to reward their violation of the law. If prospective hires take the unusual step of asking why such surveillance of the victim is necessary, the rogue federal officers and contractors will offer an apocryphal story that may shock, anger, or outrage the prospect concerning the victim, tell outright, ghastly lies about the victim’s character, or conversely set aside any wrongdoing or any threat posed by the victim and convince the hire that anything done will be to the victims benefit! Intriguingly, the latter actually works exceedingly well.

Exigent hires will invariably  approach the surveillance of their innocent victim using the limits of their varied faculties. The results can be atrocious, shocking, and sometimes silly. Exigent hires can often be seen hiding behind pillars, jumping behind cars, and hiding their faces with their hands among a few things. As the vetting of hires is nonexistent, the dysregulated are often employed and they will often vent rage directly at the victim over false reports about them from rogue federal officers and contractors to relieve unbalanced levels of stress and frustration. Occasionally, participation is shamefully impelled not only by remuneration, but by racial, ethnic, religious, and gender prejudice. Those hires will indubitably make their offensive perspectives known to victims when walking by them or loitering near them. Evidence of how they manage racist and otherwise biased hires may offer an indication of whether the rogue federal officers and contractors harbor similar prejudices toward a victim. They can often develop a kinship with such odious individuals. On the odd occasion, one might unexpectedly observe the rogue federal officers and contractors communicating with them in plainview! Those hires surely receive opportunities for contracts and more chances to abuse a victim for payments. There is often a sense great importance and power that conspiring with “secret men” and “secret women” conveys to most hires, this can expectedly lead to hostility, aggression, and violence against an innocent victim.

Since none of the hires employed under these circumstances are not acting against actual officers or operatives of a foreign intelligence service or some other dangerous group, these exigent hires can act with relative impunity against victim. A victim’s response to the hires transgressions must not include acting physically. The rogue federal officers and contractors will use their standing and FISC warrants to ensure local law enforcement will arrest a victim and “friendly” prosecutors will secure fines or sentences against them. Such occurances have indeed been tragedies. Yet, the activities of the rogue federal officers and contractors will not stop even after causing that degree of harm. On s’en fout!

The exigent hiring of “operatives” by rogue federal officers and contractors is not always unsystematic. Some hires are offered contracts to encourage regular service against innocent victims. Often, contract hires are asked rogue federal officers and contractors to log their observations of victims via text or group chat. They often provide the information on what the victim is wearing, the number of the taxi in which the victim is riding, the direction the victim is walking or the activity in which the victim is engaged. (Interestingly, rogue federal officers and contractors always inform their hires of their victims whereabouts, yet they will often insist their hires log their “observations” of the victim by text or group chat. Other than creating activity for the hires, that work amounts to kabuki, hardly serving a useful purpose day-to-day when the rogue federal officers and contractors are watching the victim themselves. Maybe it is more a matter of keeping up appearances.

Some exigent hires are sought out because they are in a position to have opportunities for more than occasional contact with a victim. These “key hires” will,typically be associated with the victim’s personal and professional life, and the victim’s simple daily activities. A short list of such hires would typically include: neighbors; apartment building staff; contractors; locksmiths, municipal civil service workers of all types to include the police and emergency services technicians; dog walkers; taxi cab drivers; car service drivers; barbers; hairstylists; restaurant staff; pizza shop employees; coffee shop staff; street food vendors; conveniance store clerks; department store employees; luxury watch store employees;  supermarket employees; car garage attendants; storage company employees; moving company employees; realty agency staff; funeral directors, movie theater staff, museum staff; performing arts center staff; elementary and secondary school staff; parents of elementary and secondary school students; elementary and secondary school students; visiting professors at nearby universities; sports book authors; content management system employees; bank branch employees; accountants; tax preparers; paralegals; lawyers; medical office administrative staff and technicians; physical therapists; doctors; court house staff; and, judges. (The actions of judges co-opted by the rogue federal offcers and contractors in an US court proceeding against a victim are typically so remarkably corrupt that greatcharlie assures they must be seen to be believed.) It is fascinating to observe just how many individuals are typically made privy to the rogue federal officers and contractors “secret operations” against innocent victims.

Through contact with such key hires, the rogue federal officers and contractors aditionally hope to receive information about the victim through “clandestine conversation”. Usually, they will insist these hires ask victims specific questions about themselves which is most often incongruous with the natter in which they might be normally engaged. The activities of those key hires, along with other hires who have contracts, are controlled through cellphone calls, direct texting, and group chat. Group chat is at the present the most unified way for the rogue federal officers and contractors to assemble and mass their hires to act upon a victim collectively. Essentially, hires are organized for “gang stalking” and out-and-out harassment–bullying. These hires are compensated usually at central locations in the vicinity of their activity: a parked car or a coffee shop.

Interestingly, with warrants from the FISC in hand, rogue federal officers and contractors can also make use of programs created for use by employees of specific service industries to surveil and act against targets of investigations. In New York City for example, a clandestine program–so called a covert program by officials–was developed by federal and local law enforcement and US intelligence services to use taxi cab and car service drivers to surveil and photograph targets when they are on the street and to engage them in clandestine conversations as passengers with the aim of “surreptitiously interrogating” them or passing disinformation to them. Remember, the victims are absolutely innocent, have no special information offer. So, insisting the taxi drivers engage in such a practice, certainly not as training, along with simply using the shed light upon the mental state of the rogue federal officers and contractors. Maybe it is again a matter of keeping up appearances. It is as plain as a pikestaff that the taxi and car service drivers are impelled by pecuniary interest and ego, certainly not intellect. Clearly, most of the drivers take on their “secret work” having received insubstantial educations overseas, possessing a limited vocabulary as English is usually a second language for them, being devoid of sophisticated conversational skills–being tactless, and not knowing what it means to be congenial. One can imagine how awkward, clumsy, and better than annoying their efforts at “clandestine conversations” usually are. Ironically, the drivers must rely upon the politeness and tolerance of the victim to perform their “clandestine” work while lacking any compunction over deceiving a victim or potentially causing them harm.

It might be worth noting that warrants from FISC also allows for the rogue federal officers and contractors to cooperate with members of foreign intelligence and security services of US allies stationed in the US. The officers of some foreign intelligence and security services will make their presence known to victims by behaving overly aggressively, with hostility, and even a threatening them. Indeed, they take on this barbaric posture even against US citizens living in their own country. Officers of somewhat more sophisticated foreign intelligence and security services may make it a point to have an attenuated presence. However, they may deliberately make themselves known if they have been tasked to ask questions of–softly interrogate–the target. Interestingly, that task invariably falls to female officers of the foreign intelligence and security services who, with male colleagues close by, will “noticeably” spend an ordinate amount of time studying the victim before moving in. Such activities fall under the category of transnational repression and are illegal. Foreign intelligence and security services of US allies are surely pleased to receive financial resources from their US counterparts for their cooperation. Warrants from FISC open the financial spigot for such funding. However, what is imaginably most important for the foreign intelligence and security services of US allies who might participate in such activities at the victim’s expense is finding a place for themselves at the “high intelligence roundtable” with the powerful US. Once again, rogue federal officers and contractors more than likely trigger this activity by foreign intelligence and security services stationed inside the US as a matter of keeping up appearances.

Attempts to co-opt a victim’s immediate family members and other relatives are also made by rogue federal officers and contractors. If successful, they will usually forever destroy the victim’s immediate family unit and separate the victim permanently from other relatives. 

The definition of success among the Ancient Greeks was the full use of one’s powers along the lines of excellence. At a minimum, success for the rogue federal officers and contractors against their victims clearly has meant stripping them of anything resembling an ordinary life, completely restricting their liberties in a normal sense by standing between the victims contacts with others, and interfering with any effort to pursue happiness. The whole wrongful process can go on for years or at least as long as the victim lasts. Yet, very often the outcome desired by the rogue federal officers and contractors is far more sinister. The “stress response”, the flight or fight system, is triggered when mind and body are out of balance. When mind and body are out of balance, in stress mode, one is headed for health problems, disease, or breakdown. No organism can stand being in emergency mode all the time. The infliction of daily episodes of gang stalking and harassment can elicit heart disease, heart failure, and psychological disorders. Cases of suicide can also stem from a victims in ability to cope with strains too strong and too alien for “normal living” in an advanced industrial democratic society to countenance. Mere empirical observations of rogue federal officers and contractors actions and the results inflicted upon victims should reasonably assure one that there is not a shred of decency among them. Far more perverse actions are taken against victims. Plainly, the rogue federal officers and contractors have even acted in a variety of ways to cause a victim’s death.

As mentioned, the exigent hires and contract hires of the rogue federal officers and contractors are generally more concerned with how much money they will receive. Typically, hires will hardly notice, or even look to see on their own volition, if the victim were suffering physically or psychologically in some discernible way. As a combination of the hires’ “low-vibrational” character and their receipt of regular abhorrent reports from the rogue federal officers and contractors about the victim usually meant to infuriate their hires or even amuse them, there is generally no empathy shown by hires for the victim. The victim is not recognized as a human being. The victim is seen only as a commodity. Noticeably, hires are quite deliberately directed and bound as a collective through a form of mind control. From the prostitute and drug peddler to the doctor and state court judge, the rogue federal offcers and contractors get their hires to do exactly what they want them to do. The reality is there is no professional side to involving US citizens and so many others in the wrongful–illegal–surveillance and possibly the criminal homicide of anyone, especially an innocent victim. In their own criminal way, the rogue federal officers and contractors are destroying the fabric of the society.

Victims of rogue federal officers and contractors have no voice. The few who would make reports of their maltreatment and entreaties for justice are stifled by the corrupt. Through the use of their standing with law enforcement and judicial systems, FISC warrants, and long exercised technical ways to block a victim’s communications, it is assured that the victim’s pleas will go unheard. Many victims are so despaired by trying and failing to successfully report their mistreatment and circumstances surrounding it that they are led to either very quietly or very publicly self-destruct.

As suggested earlier, it is easy enough for those in the US public who cannot accept corruption and murderous criminality on such great scale among corrupt members of the US security services and their contractors and some will surely to find comforting ways to dismiss it or outrightly rebuke it. Yet, those who would accept this reality may be unwilling to speak against it. The number of other government officials in the organizations who may discover others acting corruptly and may wish to report or to investigate such criminality would be few as the consequences of their detection might be retribution in the form of daily attacks on the job equal or worse than those suffered by the innocent victims.

Leaders of organizations can be changed in response to revelations of wrongdoing at the senior level and within the rank and file. However, a subsequent change in leadership to that could lead to the rejuvenation of such vengeful, aggressive thinking and actions against the previously targeted inedividual found guiltless, incident free will be ordered. The individual’s personal life, finances, property, could once again be targeted. Doors will be closed once again to employment, association with social and professional groups, membership in organizations. Recognition and awards for achievement and excellent once again will be denied. Family members and friends not co-opted by the rogue federal officers and contractors once again will face attacks designed to separate them from the individual or destroy them without fail. Victims will once again be shunned by the society. During the new episode, the most devastating psychological and physiological attacks upon the individuals–by then a few years older and likely less interested in struggling against a tide a wrongdoing–would be launched by authorities with far greater intensity, to achieve their destruction or even deaths through suicide or violence so dearly wanted by others through the original effort. Ironically, the rogue federal officers and contractors who assisted in organizing and managing the individual’s destruction originally, will very likely have retired from their federal security service by then to enjoy the fruits of their wrongdoing. However, others would doubtlessly rush forward to take their place. Où va-t-on à partir de maintenant?

This is in some small part the actual state of affairs for many victims of rogue federal officers and contractors at the moment. It is a whole world invisible to the ordinary citizen. As explained earlier, there is no insistence that anything discussed here be accepted by readers who are unfaniliar with it all. Nevertheless, everything presented is true and can be easily substantiated with the cooperation of honest and thoughtful law enforcement officials. (Note: All that is discussed concerning the mistreatment of citizens by rogue federal officers and contractors is based on the author’s personal experience!) One might suppose that for those who may be interested in how surveillance is conducted on the street level in the US, this discussion may prove instructive. It is unlikely lost upon readers that “one” who might desire to penetrate domestic surveillance activities in the US, not too much would be involved with becoming a “contract hire”. Once onboard as a hire, one would potentially have access to details about the daily surveillance activities of some US intelligence service or law enforcement organization, such as what organization was currently tasked with, who exactly is being targeted, where the target is acting, and who the organization’s street “operatives” are. What could be accomplished by “one”, one in a hypothetical case being a foreign intelligence officer or a team of officers and operatives tasked with the mission of infiltrating surveillance activities of a US intelligence service or law enforcement organization, must be left to the imagination. 

One possibility might be the regular successful “collection” of vital information to protect their country’s foreign intelligence operations inside the US. One can only guess how difficult it would be to launch successful counterintelligence operations against a wily foreign intelligence sserviceoperating inside the US when it knows everyday where its opponent’s officers and operatives are and who and what they are looking at. Perhaps something of the kind is already happening on some scaleg. For that reason, for more than a theory, on-going surveillance operations as discussed here, either sanctioned by authorities or wrongful conducted by the rogue federal officers and contractors, should be immediately rolled up, audited, and assayed. Perhaps doing any of that would be too bothersome. (Curiously, the average individual in the US public may not accept that such wrongful behavior by rogue federal officers and contractors occurs, however foreign intelligence services surely have no doubts about what transpires.) Born Jacques Anatole François Thibault, known as Anatole France (April 16, 1844-October 12, 1924) was a French poet, journalist, and novelist. Considered in his day as the ideal French man of letters. He was awarded the 1921 Nobel Prize in Literature in recognition of his literary achievements. In Le Petit Pierre (1918), ch. XXXIII, he wrote: “De toutes les définitions de l’homme, la plus mauvaise me paraît celle qui en fait un animal raisonnable.” (Of all the ways of defining man, the worst is the one which makes him out to be a rational animal.)

Martin Luther King, Jr. (above). When King was the victim of FBI’s surveillance and harassment under its COINTELPRO operations, he had committed any federal crimes and was not a threat to US national security. He was an innocent US citizen. To that extent, actions taken against him by Intelligence Community organizations once uncovered by the Church Committee were shocking and surprising. In previous times, one might have supposed the understanding, acceptance of what Founding Father’s who authored the US Constitution defined as the unalienable rights of life liberty, and the pursuit of happiness were sacrosanct. However, one might be able to comfortably conclude today that far less importance is given to those rights upon which the country’s soul and existence was once firmly rooted and upon which the US public’s expectation and requirement for the good governance of the democracy has its foundation. What seemed so certain about the once lauded strictures–as a sampling, the Bill of Rights, the first 10 amendmens of the US Constitution–that would guide the country perpetually, is far less sure today. There are laws, but very often justice for the people is much harder to find. Breaches of regulations of the US Intelligence Community against ordinary citizen, not responsible for any wrongdoing, must not only be examined but vigorously pursued.

Seared in the minds of the authors of the US Constitution, the Founding Fathers, were the extraordinary sacrifices made by thousands of Colonists before and during the Revolution. Attendant to that were acts of tyranny leveled upon colonists by authorities in the Kingdom of Great Britain. There was usually much suffering dealt by the British Army to the rebellious in territory controlled by the British Empire. Methods used by the professionals of the British Army for the purpose of assuring the Kingdom’s grip on the Empire’s many lands overseas were tried and true. Given the that, the victory of the American Colonists, with assistance from France, was spectacular and almost supernatural. The tyranny resulting from the imposition of coercive power by the Kingdom of Great Britain was a manifestation of what was intrinsic in mankind: the desire to control others for self-interest. The despotic intrusion of ones will upon another compelled in some. The Bill of Rights, the initial 10 Amendments of the US Constitution are in part responses of the Founding Fathers. to egregious injustices under which Colonists suffered much of which was intended to break any sense of unity among them.

It is greatcharlie’s firm belief that few in the US public–indeed, relative to the size of the population and to include officers of the court–are aware of the contents of the Bill of Rights and their meaning. There is the real possibility that many in the US may have no interest at all in the matter. Rather than simply utter the term, Bill of Rights, which for many may amount to empty words, greatcharlie offers the concisely authored first 10 amendments of the Constitution passed by Congress on September 25, 1789 and ratified on December 15, 1791.

The First Amendment states: “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press, or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”

The Second Amendment states: “A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.”

The Third Amendment states: “No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law.”

The Fourth Amendment states: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

The Fifth Amendment states: “No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb, nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.”

The Sixth Amendment states: “In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed; which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the assistance of counsel for his defense.”

The Seventh Amendment states: “In Suits at common law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved, and no fact tried by a jury shall be otherwise re-examined in any Court of the United States, than according to the rules of the common law.”

The Eighth Amendment states: “Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted.”

The Ninth Amendment states: “The enumeration in the Constitution of certain rights shall not be construed ttho deny or disparage others retained by the people.”

The Tenth Amendment states: “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”

It must be noted that under the Fourteenth Amendment, which concerns civil rights–as well as Senators, Representatives, and the public debt, citizens in the US, born or naturalized, and other individuals living in the US are entitled to equal protection under the law of the US and the State in which they reside and no person shall be. deprived life, liberty, or property, without due process of law under either jurisdiction.

Two centuries after the Bill of Rights were ratified, power can still corrupt. In the country the Founding Fathers constructed, led by a government formed of the people, for the people, and by the people, the aforementioned intrinsic negative impulses in mankind could nevertheless manifest within those who were members of the citizenry themselves. Despite swearing to an oath to support, protect, and defend the US Constitution and the solemn compact between government and the people, various episodes of corruption have taken their place in the country’s history.

Sojourner Truth was a 19th century African-American abolitionist and activist for civil rights, women’s rights, and alcohol temperance. Truth was born into slavery in Swartekill, New York, but escaped with her infant daughter to freedom in 1826. Sojourner Truth is known for saying “The truth is powerful and will prevail.” The truth will “prevail.” That is as may be. However, without some preconcerted, energetic effort to make certain the truth is heard, understood, and accepted by all who are reasonable and rational, it will unlikely have an impression and be unappreciated. Only a precious few open-minded individuals, following the law and holding firm to their beliefs, spiritual or philosophical, will hold firm to the truth.

Reportedly, the writer, professor, political activist, Nobel laureate, and Holocaust survivor, Eli Weisel, once explained God created man because He loves stories: Weisel would cite the Chasidic tale of the Baal Shem Tov. Accordingly, when misfortune threatened his community, Tov would venture into a certain part of the forest to meditate. There he would light a fire and say a special prayer. In consequence, misfortune would be averted miraculously. During a later time of peril, a despondent Rabbi Israel of Rizhyn addressed God as follows: “I am unable to light the fire. I do not know the prayer; I cannot even find the place in the forest. All I can do is to tell the story: this must be sufficient.” It did suffice, and God saved His People. Dum spiro spero. (While I breathe, I hope.)

By Mark Edmond Clark

The Continued Ascent of Dong Jingwei: After  Succeeding at MSS, His Sights Are Now Set on Opponents in Hong Kong

Dong Jingwei (above). Without a doubt, Hong Kong and its future are issues of great concern for People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping and the Party leadership in general. Likely to Xi’s satisfaction, Dong Jingwei is now in firm control of issues concerning protests and conspiracy against the regime and foreign sponsored efforts to orchestrate and sustain resistance in the city. Having pondered Dong’s posting and its responsibilities, greatcharlie has sought in this essay to dive a bit deeper into Dong’s background to better understand him and to meditate on his likely plans to get a handle on Hong Kong. Interestingly, in the photo image above provided by the Guangxi People’s Congress, conspicuously displayed on center of Dong’s jacket (above) is his official name tag. Readers may note, Dong is the only attendee visible in the photo that displayed both a table placard and a name tag to identify himself. While he apparently saw the need for “maximum” identification to assure recognition, Dong at the time of a photo served in the fairly well-known and powerful positions of Vice Minister of the Ministry of State Security (MSS) and the Chief of MSS Counterintelligence.

On July 18, 2023, the People’s Republic of China Ministry of Human Resources and Social Security announced Dong Jingwei was appointed as the central government’s commissioner for the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region. Dong succeeded Zheng Yanxiong was appointed director of the Liaison Office of the of the Central People’s Government in the Hong Kong Special Administrative Region in January 2023. The Office for Safeguarding National Security was established in 2020 just months after China imposed a national security law in the wake of extended pro-democracy and anti-People’s Republic of China government protests that began in 2019. Protests were attended reportedly by as many as half a million people, In 2022, a HK$508 million ($65 million) headquarters building was constructed in Hong Kong for the organization. Zheng was the first director and.a founding member of Dong’s new office. John Lee Ka-chiu was installed as the Chief Executive of Hong Kong Special Administrative Region on July 1, 2022. Upon the announcement of Dong’s appointment, Lee welcomed him in a statement saying Hong Kong “will continue to work and communicate closely” with the Office for Safeguarding National Security as it seeks to fully implement the 2020 law.

Concerning the 2020 national security law, following the Hong Kong protests from 2019 to 2020, the People’s Republic of China imposed it to enable the prosecution of four major crimes, stamping out dissent. Zheng, at that time, pursued dissenters with vigor and was consequently sanctioned by the US for his activities. Of equal concern was the need to eliminate external influences in the form of foreign intelligence services. Beijing reported with conviction that they were entangled in Hong Kong’s protest activities,  providing both funding and direction to pro-democracy and anti-government activists. His extensive background at Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS and working alongside Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (the Ministry of Public Security of the People’s Republic of China) or MPS, in part gave Dong a leg up for selection to the commissioner’s job.  MSS is essentially the People’s Republic of China’s equivalent to the US Central Intelligence Agency (CIA) and is responsible for foreign intelligence worldwide and counterintelligence both abroad and at home. MSS counterintelligence is directly aimed at the infiltration of foreign intelligence and counterintelligence services and the neutralization of their operations. MPS is a sort of dual law enforcement and intelligence service under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS and MPS share the counterintelligence mission for the People’s Republic of China. As national security bureaucracies, both organizations are organized under the State Council of the People’s Republic of China Central Committee of the Communist Party of China, but both have settled lines to the highest realms of power into the Party. Very likely, it was Dong’s successes against foreign intelligence networks and operatives on the mainland in particular as the Chief of MSS Counterintelligence that also caused him to stand out of the best choice.

Interestingly, official sources on Dong’s appointment were especially frugal with their information about his intelligence background, never mentioning his very accomplished previous post as the Chief of MSS Counterintelligence. At the time of the announcement of Dong’s appointment, a representative for the Hong Kong government did not immediately respond to a request for comment on Dong’s appointment, including his past experiences at MSS. The China Daily only went as far to state Dong was the director of the political department of the MSS from 2017 to 2018, according to a resume published on the website of the China Law Society, of which he is vice president. It added the he previously served as director of the Hebei Provincial Department of State Security from 2006 to 2017. Omne ignotem pro magnifico. (Everything unknown is magnificent.) 

Without a doubt, Hong Kong and its future are issues of great concern for People’s Republic of China President and Communist Party of China Secretary Xi Jinping and the Communist Party of China’s leadership in general. To what is likely Xi’s satisfaction, Dong is now handling of issues in the city concerning protests and conspiracy against the regime and foreign sponsored efforts to orchestrate and sustain such resistance. In this essay, greatcharlie has sought in this essay to dive a bit deeper into Dong’s background, to include apparent safeguards taken for his security and what may have been external efforts against him, and what he may have in mind for quelling the threat posed by the People’s Republic of China’s opponents’ in Hong Kong. Thoughts are offered not only on decisions he has likely made but also on decisions he may likely make in the immediate future to shape events. Dong may have reason to believe the national security situation in Hong Kong may soon turn considerably in the Communist Party of China’s favor. This essay is relatively brief and could hardly have squeezed issues dry so to speak and put one in the full picture of regarding Dong’s thinking. However, the hope is that greatcharlie’s ideas and insights may lead readers, hopefully to include some practitioners in the field of foreign and national security policy analysis and decisionmaking, to develop new lines of thought on how to proceed concerning this pressing issue. Luce sunt clariora tua concilia omnia. (All your advice is clearer than the light.)

Before July 2021, this photo image of Dong Jingwei (above) was accepted by greatcharlie as authentic. As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. Dong is a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises. In attempting to ascribe certain traits to Dong given his role at MSS, those considered by greatcharlie may appear to be mere abstractions. However, among the few traits listed should be a reliable intuition, further honed when at MSS he coped with challenges posed by foreign opponents. It may have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions of managers within the intelligence services of opponents.

Things To Know about Dong

As reported by greatcharlie in its June 30, 2021 post entitled, “The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax”, Dong was born on November 18, 1965. At the time of this writing, he is 59 years old. In the People’s Republic of China, it would be of some significance to note that he is of Han nationality. As for his studies, he earned a master of science degree. The only publicly reported member of Dong’s family is his daughter, Yang–also known as Dong HuaHua on social media, She is the ex-wife of Jiang Fan, who at the time was an Alibaba executive, heading the company’s e-commerce platforms, Tmall and Taobao.

Suffice it to say Dong is a member of the Communist Party of China. Highlights of his career include service as the Secretary of the Party Committee and Director of the State Security Department of Hebei Province from 2006 to 2017. He served as Director of the Pokitical Department of the Ministry of State Security from 2017 to 2018. He eventually became a Member of the Party Committee and Vice Minister of the Ministry of State Security and the Chief of MSS Counterintelligence. It was noted in the July 24, 2015 edition of Intelligence Online that Dong’s direction of the State Security Department in Guo’anbu in the Hebei Province was significant for him as that province has reportedly produced many of Xi’s “securocrats.” Loyalty to superiors, age, and regional background apparently put him in good standing with senior party officials under Xi. One could probably safely mention reliability and discretion. By 2015, Dong reportedly became part of the “Xi Jinping Clique”, one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles and accolades provided to Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

Further concerning the MSS, as briefly noted earlier, it is an intelligence service responsible for foreign intelligence, counterintelligence, and internal security as well. To go a bit deeper, its impact stems mainly from providing consumers in Beijing to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, and ministers and senior executives of appropriate ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their foreign and national security policy decisions. The People’s Republic of China’s intelligence services and law enforcement organizations have had considerable success in destroying the networks and intercepting the intelligence officers and operatives of foreign intelligence services operating in their country. Dong surely would had a considerable role in the interception and neutralization of those foreign an local actors. Whatever may have been put in place to ensure those foreign intelligence services networks would not be rejuvenated or replaced in some form has successfully mitigated such efforts. Dong surely had a considerable role in creating such a defense to foreign opponents aims and efforts as well. It would stand to reason that whatever Dong organized while at MSS to hold back the People’s Republic of China’s opponents surely could have been recognized by results as being strong enough, sustainable enough, to allow him to advance to his new position in Hong Kong.

Very likely from the view of the Communist Party of China’s leadership, Dong was much deserving of promotion and greater authority, and should not be held down indefinitely in the MSS as counterintelligence chief. Such has not been an obvious choice for national authorities in many countries to make about an individuals such as Dong. In foreign and national security policy bureaucracies in many countries, individuals such as Dong have been kept in place when they have exhibited great skill and seemingly unique capabilities in their jobs. For instance, Alexander Bortnikov has stood as Director of Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB since 2008. During the Cold War, CIA executive, James Angleton held his position as chief of counterintelligence from 1954 to 1975. Further, in the broader sense of counterintelligence as being a element of law enforcement, J. Edgar Hoover led the US Federal Bureau of Investigation from 1924 until 1972.

Dong achieved great success at MSS primarily under the leadersip of its director, Chen Winqing. Apparently, they had an good working relationship  Dong assured for Chen Winqing that MSS would have solid one-two punch against opponents via foreign espionage and counterintelligence. However, through a decision made at the 20th National Congress of the Communist Party of China, on October 28, 2022, Chen Winqing was named Party Secretary of the Central Political and Legal Affairs Commission, overseeing national security and intelligence. He was additionally made a member of the Communist Party of China’s 24-member Politburo. On October 30, 2022, Chen Yixin was officially appointed by the Standing Committee of the National People’s Congress as his successor at MSS.

The Central Political and Legal Affairs Commission is the Communist Party of China’s highest security body and oversees all legal enforcement agencies, including the police force. As it concerned his preceding service at MSS with Dong at his side, Chen Winqing’s 2022 appointment more importantly placed him in charge of the People’s Republic of China’s national security and intelligence systems. It was only a few months later did Dong receive his opportunity to advance to the national security position in Hong Kong.

It is unclear why Dong did not simply receive to the top job as Minister of the MSS. However, it seems having Dong simply replace Chen Winqing was not likely viewed as the answer at any point. It was likely accepted by decisionmakers that it would be best to promote Dong to a duty of great importance and requiring immediate results that few could handle successfully. The position would require him to immerse himself on critical, exigent, and defined issues and not “just manage” MSS with its broad purview, although he most likely could have performed the top job there well, too. To that extent, Communist Party of China authorities, to include his former chief, Chen Winqing, obviously felt the best choice was to appoint a counterintelligence manager, a spymaster, a blood hound for a spycatcher as Dong to Hong Kong.

Notably, Dong’s appointment was confirmed only after a revamping of the Hong Kong and Macau Affairs Office (HKMAO). The HKMAO is an administrative organization  of the Central Committee of the Communist Party of China and the The State Council of the People’s Republic of China. Dong’s organization with its security role sits under the HKMAO.

This photo image of Dong Jingwei (above) was posted on Wikipedia website at the time greatcharlie wrote its June 2021 essay about his alleged defection. It has since been removed. The public in the People’s Republic of China and the world will never get to see a true photo image of Dong. Perchance the fact that there are discrepancies in those photo images leaves room open for the supposition that the latest official image popularly displayed in the local newsmedia in Hong Kong and beyond may indicate a desire by Beijing authorities or by the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region to furnish a false clue as to the spymaster’s true identity. For whatever reason, the use of varied photo images may be a national security requirement set for Dong by Chen Winqing and the Central Political and Legal Affairs Commission. It also ostensibly gives the impression that in official foreign and national security policy circles in Beijing and Hong Kong, and particularly in the Communist Party of China, that Dong holds a place of importance to them which surpasses that of any ordinary civil servant posted to the region. To gnaw just a bit further, the use of alternative images of Dong may tindicate the use of decoys is a more commonly used practice by the People’s Republic of China’s foreign intelligence and counterintelligence services than anyone outside of the country might have imagined. Surely, the sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. Mentioned in theis essay in the use of an alias by Sun Qingye, one of Dong’s senior deputies in Hong Kong.

The Photo Image Discrepancy

As the two images have far more similar features of the official than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. To support greatcharlie’s discussion on the discrepancies in the two popular photo images of Dong, two are used, and discussed  briefly within captions of this post. The discrepancies in the two photo images was covered in somewhat ample detail in greatcharlie’s July 15, 2021 post entitled, “”Commentary: Will the Real Dong Jingwei Please Stand Up?: Comparing Features of Popular Images of People’s Republic of China’s MSS Vice Minister”. However, it is not greatcharlie’s intention to re-visit the discussion on the issue of the variance in Dong’s images here

There remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case, then in the possible effort to conceal his identity, Dong has done the thing completely. The two photographs focused upon here will continue to be published perhaps until another plausible image, or perchance another two or more, of Dong surface at some time and via some source of Beijing’s choosing.

As the two images have far more similar features than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. Of the two different photo images, one may actually be Dong.

Suffice it to say as discussed in some greater detail in greatcharlie’s July 15, 2021 post, the idea of a director, senior executive, or key operations manager of an intelligence service taking steps to conceal his or her identity would not be unique in the annals of secret intelligence. Turning to a handful of examples, in greatcharlie’s November 13, 2019 post entitled, “Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997),” it was explained that Markus Wolf, chief of the foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA of the erstwhile Deutsch Demokratische Republik (German Democratic Republic) or GDR, lived a life in relative obscurity, brilliantly concealing his presence and the footprint of his organization as both operated against the West. His memoir’s title, Man without a Face, was a direct reference to the fact that at one point, Western intelligence services only had a blurred photograph of Wolf while he attended the Nuremberg Trials from which elements within the CIA managed to identify him in 1959. Unable to collect an up-to-date photograph from which to identify Wolf afterward, for a long-time he was referred to among Western intelligence services as the “man without a face.” As the story goes, only after a GDR defector, Werner Stiller, identified Wolf in a photograph in 1979 for the counterintelligence element of West Germany’s Bundesamt für Verfassungsschutz (Office for the Protection of the Constitution) or BfV did that change. The photograph of Wolf was captured by Säpo, Sweden’s National Security Service, during a visit he made with his wife to Stockholm in 1978.

At the time Stephen Dorril wrote his authoritative book, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000), Richard Dearlove, then head of the United Kingdom’s Secret Intelligence Service–colloquially known as M16–was virtually unknown. A contemporary photograph was not published in the newsmedia. According to a BBC report, when Stella Rimington in 1992 was named the first female chief of the United Kingdom’s Security Service–known colloquially as MI5–her neighbors finally discovered what she did. Even her children learned of true occupation for the first time. No official photographs accompanied her name at that time. However, later, official photos of her were provided after photographers managed to take what was described as “a very blurry picture of her out shopping.” Petit rusé, petit malin!

Interesting also is the fact that Sun Qingye, a deputy head of the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region, has a background in MSS. More directly, he served in the China International Cultural Exchange Center. When he assume his post in Hong Kong, in July 2020, Sun used the alias “Sun Winqing”.

The public of the People’s Republic of China and the world may never get to see a true photo image of Dong. Perchance the fact that there are discrepancies in those photo images leaves room open for the supposition that the latest official image popularly displayed in the local newsmedia in Hong Kong and beyond may indicate a desire by Beijing authorities or by the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region to furnish a false clue as to the spymaster’s true identity. For whatever reason, the use of varied photo images may be a national security requirement set for Dong by Chen Winqing and the Central Political and Legal Affairs Commission. It also ostensibly gives the impression that in official foreign and national security policy circles in Beijing and Hong Kong, and particularly in the Communist Party of China, that Dong holds a special place for them which surpasses that of any ordinary civil servant posted to the region. To gnaw just a bit further, the use of alternative images of Dong may tindicate the use of decoys is a more commonly used practice by the People’s Republic of China’s foreign intelligence and counterintelligence services than anyone outside of the country might have imagined. Surely, the sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. Recall the aforementioned note on the use of an alias by Sun Qingye, one of Dong’s senior deputies in Hong Kong.

Admittedly, greatcharlie lacks any information that would allow it to judge which photograph holds Dong’s true image. As promised, greatcharlie has only sought to parse out a few possibilities here. What is presented are simply perceptions based on observations made of less than a handful of photographs. Certainly in China, there are more than a few people in the MSS, MPS, the State Council, and the Communist Party of China who know exactly what Dong looks like and which of the two photographs, if either, depicts him. It may very well be that the causaliy for the use of mixed images of Dong is based on an effort to increase security. However, just as greatcharlie, a nonpracticioner, “amateur sleuthhound”–as one reader sardonically  referred to the editor–has examined two reported images of Dong in photographs, Expert, professional analysts in US intelligence services and those of foreign intelligence services allied with the US have doubtlessly examined all of the photographs available that purportedly include Dong using Artificial Intelligence and other advanced technologies, and have reached to their own conclusions. Thus, despite any possible efforts to conceal Dong’s identity, they likely have a fair idea of how he looks, too!

In the end, Dong’s work product will tell volumes about the individual and indicate his presence. Certainly, even if business as usual to date is the best foreign intelligence services may have offer to retain a handle on Hong Kong, with Dong on the beat, they will have to find answers where currently there may be none to simply maintain their grip, big or small, on the situation.

The Defection Rumor

Rumors of the alleged defection of Dong Jingwei, a vice minister of MSS were the subject of intense discussion worldwide, but especially in the US newsmedia and social media in June 2021. The singular story was previously discussed in greatcharlie’s June 30, 2021 post entitled, “The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax”. Assuredly, as with its July 15, 2021 post regarding Dong’s photo images, there is no intention by greatcharlie to simply rehash in detail territory that it has well-trampled. The aim is to explore a bit deeper for readers.

Allegedly, Dong fled the People’s Republic of China in February 2021 and handed himself over to US intelligence officials. Dong would have been one of the highest-ranking officers from People’s Republic of China’s Intelligence Community, and the Chinese government in general ever to defect to the US. Yet, alas, the rumored defection never occurred.

As reasoned by greatcharlie in its June 2021 post, the nature of the man or woman who would be able to serve as the chief of MSS counterintelligence, it indicated that is was hard to form a mental picture of Dong and how he of all people could had defected to the US, with his daughter in-tow no less. It is harder to envision who among those with any knowledge of the People’s Republic of China government and the national security apparatus would believe, Dong would ever consider defecting to the US no matter what the circumstances may be within the Communist Party of China or in his personal life. One could imagine Dong would be a deadender, sticking with the Party and his country until the rattle. It is also difficult to imagine what individual, organization, or professional organization gave the rumor its wings. Equally hard is understanding how those who ignited the rumor of Dong’s defection intended to benefit from its formulation and promotion. There was always the possibility–though there are absolutely zero newsmedia reports anywhere that suggested some proceeding mental health episode had befallen him–that Dong hypothetically could have been overwhelmed by some cacoethes. Yet again, the defection never happened.

There may be something to learn concerning how such a bold lie took public form. Among those who reported on the defection, there was general acceptance of the sequence of events. The defection scheme as laid out was indeed mad-capped. Dong allegedly defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. Dong supposedly provided the US government with information about the Wuhan Institute of Virology that allegedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. According to Han Lianchao, a former People’s Republic of China Ministry of Foreign Affairs official who defected in the wake of the Tiananmen Square massacre, Dong’s defection was raised by then Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and then People’s Republic of China Foreign Minister Wang Yi at the US-China Summit in Anchorage, Alaska in March 2021. On June 16, 2021, Han, citing an anonymous source, alleged that in Anchorage, Yang and Wang demanded that the US return Dong to China, but US Secretary of State Anthony Blinken refused. Subsequent reports, coupled with analyses by China specialists continued as Dong’s precise whereabouts remained unknown. Speculation had even reached Chinese social media threads after Dong had not been seen or photographed for several weeks.

Inferred from the odd choice to promote newsmedia stories of a defection was the potential confusion and chaos that might have been created in the minds of MSS, MPS, and People’s Libération Army’s Intelligence Bureau officers operating in the US and in the confines oF US interests overseas. The implications of such a breach in security would have been enormous. Information mined from such a highly positioned executive and director of MSS through interview, and potentially coercive interrogation, could result in the identification of officers, managers and their operatives, the exposing of netwirks, and collective information on sensitive operations conducted in the past and being performed at the moment

Rather than having a deletorious effect on the psyche of such officers, as well as their operations, the move uncovered the fact that they would hardly shrink at the last. In the worst cases scenario for the People’s Republic of China, Dong would have likely been quickly replaced under such circumstances. They as intelligence officers had accepte# the risk that there could the unexpected, things could go terribly wrong in the field. They had to prepare themselves for before travelling to the US or elsewhere.

Nothing about the tricky step would indicate a path upward to strengthen counterintelligence efforts against the People’s Republic of China’s espionage in the US. The People’s Republic of China’s Intelligence services have been steady in the approach to their work. Conceivably, the dismal failure of the suspected psychological operation would embolden if not the People’s Republic of China, but other foreign intelligence services to take bolder steps the Breach US security and ignite recruitment and espionage operations of audacity and  of an extent never considered in the past elsewhere.

Within the foreign and national security bureaucracies in Beijing, the assessment may likely have been that finding itself bereft of ideas, the choice was made by some foreign intelligence service or counterintelligence service to use a gimmick, a deception, a dangle if any specific response or individual were to be caught in a trap. It was likely assessed that the source was a Western counterintelligence service, perhaps one in Washington. 

As a friendly suggestion from a humble observer, it might be best for foreign counterintelligence services to refrain from engaging in such “poorly calculated” and “poorly calibrated” disinformation operations, if one of them was indeed involved in the Dong Jingwei defection hoax. Such action would appear to have the effect of emboldening People’s Republic of China intelligence officers operating overseas. If foreign counterintelligence services might insist upon adding to the chronicle of wasted time, perhaps one of them could send a large, ultra-high altitude balloon over the People’s Republic of China. Surely, it would mimic Beijing’s own actions throughout January and February of 2023. Still, one could imagine that a balloon as such, blithely passing over the country, would at least garner the attention of, and some discernible reaction from, a few officials of the security services there. (It remains difficult for greatcharlie to understand why the People’s Republic of China’s high-altitude balloons were not colored red if not to represent the Communist Movement then for artistic reasons: “Le Ballon Rouge” (1956). In leaving the balloons colorless, perhaps the aim was once again deception. Ostensibly, they could have been any country’s big balloons.) Einen Vogel haben!

This photo image of Dong Jingwei was posted on Twitter on June 16, 2021 by the US based, Chinese pro-democracy activist, Han Lianchao. In the tweet Han discusses how he came upon a rumor from an associate that Dong had defected to the US. If readers could pardon greatcharlie’s frankness, and not to disparage Han’s efforts, but as the rumor in the tweet was false, perhaps the photo that accompanied the tweet was a false image of Dong, too! In the rather diminutive space of Hong Kong–relative to mainland, Dong may be able to once and for all destroy all inroads made by foreign intelligence services. It will be more than a chess piece battle. Dong’s hope appears to be obviating all future possibilities for funding, providing information, and directing protest actions as the governments in Hong Kong and Beijing suggest were organized in 2019 and 2020. Lessons learned in successfully destroying foreign intelligence networks in mainland China will very likely serve as the basis to develop new and far more effective and  efficient tactics, techniques, procedures, and methods best suited for Hong Kong. Successful work by Dong could potentially improve the chances for the Communist Party of China to bring Hong Kong more peacefully back into its fold earlier than it might have envisioned.

Dong as a Threat to Activists and Foreign Intelligence Service Secreted in Hong Kong

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. Dong is a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

In attempting to ascribe certain traits to Dong given his role at MSS, some considered by greatcharlie may appear to be mere abstractions. Among the traits it feels should be listed is a reliable intuition. His intuition was surely exercised when at MSS he handled challenging problems posed by foreign opponents. It may very well have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions of managers within the intelligence services of opponents. Perchance the same trait likely assisted Dong in successfully navigating to the top rung of the People’s Republic of China’s national security apparatus and to perform well at the side of leaders of the Communist Party of China.

Unt desint vires tamen est laudanda. (Even if it is beyond one’s power, the will [to try] is worthy of praise.) If foreign intelligence services are doing their jobs well in Hong Kong, it is almost assured that intelligence officers, their operatives and informants, covert sites, and clandestine lines of communication are well-ensconced in the city. Certainly from the Communist Party of China’s perspective, all foreign intelligence operations in the city are ready to be cracked. As of this writing, Dong has held his new position for nearly six months. Imaginably, in the initial phase of whatever Dong hopes to do, he and his managers will study the problem afresh ad nauseum and mine through existing information collected until with some assurance he can strike with speed, surprise, and–again from the Communist Party of China’s perspective–in some cases, lethality. He would very likely hope that his first big operation against his opponents would have a strong educational effect on them. However, foreign intelligence services would unlikely leave their operations open to defeat with one decisive blow. After all, they likely learned lessons from their intelligence disasters on the mainland.

On October 1, 2023, on the blog of the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region, Dong expressed a philosophical perspective on what his office’s work would entail. In brief, he stated: “The central government has built a comprehensive legislative and enforcement mechanism for the SAR to safeguard national safety, introducing the law, which had provided a solid security guarantee for the long-term prosperity, and started a new era for one country, two systems.” He proffered that Hong Kong has been transformed from chaos to order and was advancing from stability to prosperity but still faced risks and challenges in maintaining long-term prosperity. To help the city along that path, Dong stated that his office will use Xi’s thoughts on socialism with Chinese characteristics in the new era as guidance. That would include upholding a holistic view of national security to implement one country, two systems. He declared: “[The office] will work with the committee for safeguarding national security of the HKSAR and relevant departments, to deeply implement the national security law in Hong Kong, combat all acts that endanger national security, and safeguard national sovereignty, security, and development interests of the country.” Expressing a holistic view, Dong said that he hoped various sectors of Hong Kong could support the work, strengthen the awareness, and “jointly build a solid dam” of safeguarding national security, to “promote a greater role for Hong Kong in building a great country and rejuvenation of the nation.”

However, before October 2023, Dong spoke more plainly about the counterintelligence task ahead in his country. At the aforementioned 2021 seminar on a counter-espionage regulation, Dong, then an MSS vice minister, spoke plainly about the counterintelligence task in his country. He explained they must catch spies as well as the funders working behind the scenes who carry out anti-China activities, according to the ministry’s summary of the meeting. Two months later, according to an online report by People’s Republic of China’ Central Political and Legal Affairs Commission, Dong held a press conference and stated the national security departments had “mobilised all forces in the society for a people’s war against spies.” According to the Central Political and Legal Affairs Commission’s website, Dong told reporters, “We insist on catching both the foreign spies as well as the hidden traitors.” He added: “We are determined to adopt powerful approaches in order to resolutely safeguard state sovereignty, security and development interests.”

What Will Dong Do?

In Hong Kong’s very crowded and rather diminutive space–relative to mainland, Dong may have a better chance to once and for all destroy all inroads made by foreign intelligence services there. However, it will be no mean feat and much more than a chess piece battle. Dong’s hopes may be to obviate all future possibilities for foreign intelligence services to fund, providing information to, and direct protest actions. One could infere from statement from the governments in Hong Kong and Beijing that they were convinced foreign intelligence services played a role in organizing the protests in 2019 and 2020. How Hong Kong and Beijing came across such information has never been made clear publicly. No clear and convincing evidence of the presence and interference of foreign intelligence services has been put forth. Perhaps the information was gleaned as a result of interviews and interrogations of both detained and arrested Hong Kong activists. Perhaps one of the overseas stations of the People’s Republic of China”s foreign intelligence services was able to secure information about an opponent’s foreign intelligence operations in Hong Kong. In any event, lessons learned through the successful destruction of foreign intelligence networks in mainland China will very likely serve as the basis to develop new and far more effective and efficient tactics, techniques, procedures, and methods best suited for Hong Kong. Despite the stated desire in Beijing to a policy of one country, two systems, successful work by Dong could potentially improve the chances for the Communist Party of China to bring Hong Kong peacefully into its fold politically.

The whole world watched in 2019 and 2020 via broadcast newsmedia and online sources, thousands of people rushed to the streets of Hong Kong to call for greater freedoms and more autonomy from mainland China. Not just governments but ordinary observers everywhere noticed the protests, commonly known as the Anti-extradition Protests, were well-organized and well-orchestrated. Apparently, Beijing was actually unnerved by the spectacle. Its reaction to it all was quite different from that toward the 2014 Umbrella Movement and the 2016 Mong Kok Unrest. As part its legal response, Beijing imposed an overarching national security law in 2020, equally effective in Hong Kong, to punish four major crimes: secession, subversion, terrorism and collusion with foreign organizations. The offenses carried sentences up to life in prison. Under the 2020 law, People’s Republic of China security service officers were for the first time allowed to openly operate in the city unbound by local laws. The law also allows for suspects to be extradited to the justice system on the mainland. An estimated 260 people have been arrested and 79 convicted under the law, including dozens of Hong Kong’s most prominent democratic politicians and activists.

Under Hong Kong’s mini-constitution, the Basic Law, the Central People’s Government in the Hong Kong Special Administrative Region is required to implement its own national security law. Once enacted, law known as Article 23, most likely would prohibit not just four, but rather seven offenses in the city: treason; secession; sedition; subversion against the central government; theft of state secrets; the conduct of political activities by “foreign organizations”; and, the forming of ties between local organizations with foreign organizations. As of this writing, the city’s government is reportedly continuing to develop effective legislative options and will have its own law in 2024. La patience, la persévérance et la perspiration forment une combinaison imbattable pour le succès.

Yet, seemingly foremost in minds of most in Hong Kong at the moment of Dong’s posting to the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region was talk about eight pro-democracy activists who fled abroad to evade national security charges. The story has been extensively covered in local newsmedia reports developed local and to a smaller extent within the international newsmedia. Of such great interest is the story that it shared coverage with Dong’s appointment. In July 2023, the city’s Chief Executive, Lee, pledged a lifetime of police pursuit for the eight fugitives. In support of that pledge, Hong Kong authorities have put a HK$1 million bounty on each of them. 

One might have expected that the flight of the eight fugitives normally would have been a matter best investigated by the city’s main law enforcement organization, Xiānggǎng Jǐngwùchù (the Hong Kong Police Force) or HKPF. HKPF is the primary law enforcement, investigative agency, and uniformed force in the city. Much as MPS officers, HKPF investigators would be authorized to travel outside of the city to track down fugitives as a uniform course of action. Typically, to support those efforts, HKPF would make use of the resources of the International Criminal Police Organization (INTERPOL) and national, provincial, and locally police forces worldwide. For the MPS, a huge benefit of such cooperation as essentially a matter of procedure has been the INTERPOL “Red Notice”. INTERPOL defines a Red Notice as “a request to law enforcement worldwide to locate and provisionally arrest a person pending extradition, surrender, or similar legal action. A Red Notice is not an international arrest warrant. The individuals are wanted by the requesting member country, or international tribunal.” However, the “forced repatriation” of the eight fugitives would be handled under standard operating procedure by the HKPF. The “forced repatriation” of the eight fugitives would not be looked upon in a similar way to the cases of thousands who absconded from the People’s Republic of China and were returned under the MPS’s Operation Fox Hunt and Operation Sky Net.

Reading and hearing reports from the local reporters and commentators, it seemed almost certain that interested authorities in Hong Kong and Beijing, in the name of providing justice, would insist that Dong run down the rabbit hole of pursuing the eight fugitives. The case of the eight fugitives indeed achieved such prominence as a national security matter that it rose to a level of importance requiring the “full” attention” of Dong’s new office. Subsequently, a “good number” of its investigators were surely dedicated to the puzzle. (It is the best “figure” greatcharlie can come up with in the abstract.)

Certainly, Dong would have been very satisfied with tracking down the fugitives so early in the game. Their capture would certainly make quite a splash for the newsmedia and a feather in Dong’s cap. He surely will not hesitate to have the national security police detain pro-democracy activists, former opposition politicians and journalists under national security law. However, chasing down the eight fugitives who are now essentially smaller actors on the larger stage of foreign inspired and supported activities to destabilize the Central People’s Government in the Hong Kong Special Administrative Region would hardly be a matter upon which Dong would prefer to focus. 

Directly on the matter from his first day, it very likely would have viewed as most important by Dong to study and make strong and ample observations on the pattern of activities, contacts, communications, and external influences, that allowed for the popularized “eight fugitives” to slip away That, as a start, would have assisted him in understanding how it was established and eventually shutting down the network that facilitated their actions and shutting down other networks that were in place. Such work would likely include to use of the latest technology advances in electronic surveillance developed in the People’s Republic of China. Some innovative combined use of existing technologies and manpower may provide a surprising new wrinkle to Dong’s counterintelligence effort in the city. Dimidium facti qui coepit habet. (Half is done when the beginning is done.)

Still, that work would hardly have diverted Dong’s focus on what has been professed as the bigger picture of the activities of foreign intelligence services and their varied contacts in Hong Kong for the past six months. As aforementioned, Dong’s tacitly declared the objective of People’s Republic of China’s counterintelligence efforts is not just to frustrate, seriously inconvenience, or hamper efforts by foreign intelligence service, but rather, to destroy them completely. That is a priority. Utilizing what he may likely uncover from his studies and observations of the activities of pro-democracy activists, former opposition politicians, journalists, and other elements, as well as using what the People’s Republic of China”s foreign intelligence services might collect about foreign intelligence operations in Hong Kong from their overseas stations, he would likely develop a strategy to level a decisive blow against his opponents. What would put him on track would be the successful identification of foreign intelligence officers operating in Hong Kong. From that point, he could monitor their efforts to: create clandestine linkages with pro-democracy activists, former opposition politicians and journalists; recruit and run operatives and informants in the city; and, develop multiple, sustainable, networks of operatives and informants there. Ostensibly, Dong would look in those particular directions as he would expect foreign intelligence services by tradecraft to take steps in those same directions. Les petits ruisseaux font les grandes rivières.

Dong in uniform (above) while serving in his previous post as Vice Minister for State Security. Dong once declared the objective of People’s Republic of China’s counterintelligence efforts is not just to frustrate, seriously inconvenience, or hamper efforts by foreign intelligence service, but rather, to destroy them completely. That is a priority. Utilizing what he may likely uncover from his studies and observations of the activities of pro-democracy activists, former opposition politicians, journalists, and other elements in Hong Kong, as well as using what the People’s Republic of China”s foreign intelligence services might collect about foreign operations in Hong Kong from their overseas stations, he would likely develop a strategy to level a decisive blow against his opponents.

The Way Forward

Out of academic interest, one might consider in the abstract that rather than being the former fount of acumen and success at MSS counterintelligence, Dong may have merely been the benefactor of the excellent work of bright and capable members of his team. If so, it might account for any decision revealed that he brought members of his MSS counterintelligence team in Beijing with him to Hong Kong. Of course, if he did take a few with him that may not at all have been his reason for doing so. In any event, whether Dong succeeds or suffers shipwreck in Hong Kong will truly tell if he is Communism’s greatest spymaster, albeit post-Cold War. With some hesitancy, greatcharlie is willing to go out on an attenuated thread, likely to the disagreement and dismay of some foreign intelligence services–if its humble opinion is of interest to members of any of them, and state Dong is the real deal!

As it is now likely been the case, managers of foreign intelligence services and counterintelligence services responsible for Hong Kong as well as the People’s Republic of China may now wake up in the morning wondering: “We know Dong has been doing something. What could that  possibly be?” They would want to avoid chasing shadows, but they would want to find out, peering into figurative darkness, if Dong is “getting close.” Putting Dong and his clandestine operations in the spotlight would seem the best way to concentrate resources and talent on thwarting him. However, until enough of his organization’s clandestine counterintelligence steps in Hong Kong are identified and studied, some pattern of its activities in the city takes shape, and its efforts become predictable to a sufficient degree–if any of that ever happens–that task will not be so easy. Sine ira et  studio. (Without animosity, without favoritism.)

Ruminations on the Russian Federation’s Failure To Close the Door in Western Ukraine to Foreign Military Assistance as Part of Its Invasion Plan

US airmen and marines (above) load M777 artillery pieces marked for delivery to the Ukrainian Armed Forces on an US Air Force transport plane. Many weapon systems sent into Ukraine have had a multiplier effect on the battlefield. Firepower in the form of multiple launch rocket systems, self-propelled artillery, and heavy caliber guns, transported possibly along the now heavily traveled supply lines from both Poland and Romania enabled the Ukrainian Armed Forces to launch two highly-successful counteroffensives. Presented here are some ruminations on Russia’s failure to initially shut the door to the massive levels of military assistance to the Ukrainian Armed Forces from the US, other NATO Member States and the EU via Poland, Slovakia, Hungary, and Romania. Emphasis is placed on the likely reasons why Russia went into Ukraine militarily without addressing the potential impact of Western resupply of Ukrainian forces. To that extent, issues considered include: whether the Russian Federation General Staff was responsible for this considerable delinquency or was the Kremlin near criminally remiss for not heeding likely recommendations of the military chiefs and their war planners.

Intriguingly, Russian Federation President Vladimir Putin launched the Ukraine War lacking a strategy that took into consideration of what Vooruzhonnije Síly Rossíyskoj Federátsii (the Armed Forces of the Russian Federation, hereinafter referred to as the Russian Federation Armed Forces) would come up against. What was seemingly completely missed or misunderstood was the degree of support from the US and NATO Member States that Kyiv would receive. No effort, that was apparent, was made to obviate the ability of the US and its NATO allies to supply Ukraine at will as part of the military strategy. From the start, conquering Kyiv was the focus as if Putin, his foreign and national security policy team at the Kremlin, and his senior commanders in the Russian Federation Armed Forces. Perhaps, for Putin, the conquest of Ukraine was a dream on which he could feast his imagination. That was at least until the matter was reduced to reality. If one might think of Putin at all as a rational actor, it would seem Putin has painted himself into a corner. That is quite unlike Putin. Some might say that after all the years of accomplishments and successes, and all the experience, he was bound to make one big mistake. It is a real head rubber.

Presented here are some ruminations on Russia’s failure to initially shut the door to the massive levels of military assistance to the Ukrainian Armed Forces from the US, other NATO Member States and the EU via Poland, Slovakia, Hungary, and Romania. Emphasis is placed on the likely reasons why Russia went into Ukraine militarily without addressing the potential impact of Western resupply of Ukrainian forces. To that extent, issues considered include: whether the Russian Federation General Staff was responsible for this considerable delinquency or was the Kremlin near criminally remiss for not heeding the recommendations of the military chiefs and their war planners; whether the door was left wide open between Poland Slovakia, Hungary, and Romania with Ukraine because they were hamstrung by Putin’s concept that a successful “lighting strike in Ukraine” could be achieved even though the idea was apparently developed in the abstract; and, whether they had little choice but to acquiesce to the manifestations of Putin’s sense of vulnerability over Ukraine’s close ties to the US, the EU, and NATO. Unless one was actually behind closed doors of conference rooms in the Kremlin and the national security bureaucracies in Moscow, or “reading someone’s mail,” one cannot know for certain how the decision concerning resupply from western Ukraine was made or maybe not made. The best informed guess would inevitably be an interpretation. While “ruminating”, greatcharlie sought to stay grounded within the realm of what would actually be possible in Putin’s regime given what is known about it. Insights offered here are occasionally supported with historical examples of timeless relevance that immediately came to mind or actually helped to generate ruminations. Causa latet, vis est notification. (The cause is hidden, the result is obvious.)

Chairman of the Joint Chiefs of Staff US Army General Colin Powell (above) at press conference at the Pentagon on January 23, 1991. When a military campaign is launched, often an objective becomes separating an opposing army from what gives it support and what allows it to continue to generate combat power. Acting in this manner against an opponent is referred to as acting decisively. During the Persian Gulf War, Operation Desert Storm, the concept of separating Iraqi forces in Kuwait from resupply as well as command and control from the Iraqi military and political leadership was expressed without ambiguity by then Chairman of the Joint Chiefs of Staff US Army General Colin Powell during a press conference at the Pentagon on January 23, 1991. He famously stated: “Our strategy to go after this army is very, very simple. First, we’re going to cut it off, and then we’re going to kill it.”

Why Is Resupply an Issue?

When sent to war, the purpose of an army is to use its trained troops to deliver calculated lethal violence in protection of their country and its values wherever they are ordered to go. Not to be forgotten, is the necessity that the army’s troops place their very lives on the line in that pursuit. Equally important to note, not all countries have the same values. The values of the Russian Federation, particularly those that compelled the invasion of Ukraine, are quite different, for example, from those of the United Kingdom, France, or Germany. As professionals, army commanders act to the best of their knowledge and experience, use their troop in accordance with their army’s doctrine and in obedience to the concept and intent laid out by the army’s senior leadership. When it is the case, the army leadership acts in fol)owing with the concept and intent of their country’s political leadership. Such was the case when the Russian Federation Armed Forces were directed by Putin and ordered by the Russian Federation General Staff to invade Ukraine.

Today, armies can deploy with a considerable amount of supplies, but supplies begin to deplete as soon as the fight is underway. Nevertheless, to keep the army going, long before it becomes engaged, considerations and arrangements are made by planners and logistical (supply) officers to transport supplies wherever they are needed. Losing the ability to be resupplied means an army can fight only until the point when it metaphorically and literally, as one element of resupply, runs out of gas. To that extent, the most extreme of human endeavors becomes an even greater challenge for troops in that army. Whether resupply is possible can more often mean the difference between victory and defeat. 

To be a useful, effective fighting force on the battlefield, critical items such as bullets, grenades, rifles, other small arms, Kevlar vests, phones, petroleum, oil lubricants, and all and elements as replacement troops, and troop medical evacuation must get up to where the fight is. As shortages become problematic, commanders must begin to economize, their ability to act will be reduced, and subsequently their army becomes far less effective. The commander of the opposing army, if a capable commander, will discern the change, recognize the advantage presented and seek to exploit it as best as possible. The decision would need to be made on whether the army with dwindling supplies should be withdrawn. If the situation reaches the point when the commander can no longer act to alter the army’s situation, his army is being battered, or his army is cut off and has no available means of egress, he may be forced to surrender. While this description is somewhat oversimplified, it lends support for the idea that when a military campaign is launched, often an objective becomes separating an opposing army from what gives it support and what allows it to continue to generate combat power. Acting in this manner against an opponent is referred to as acting decisively.

During the Persian Gulf War, Operation Desert Storm, the concept of separating Iraqi forces in Kuwait from resupply as well as command and control from the Iraqi military and political leadership was expressed without ambiguity by then Chairman of the Joint Chiefs of Staff US Army General Colin Powell during a press conference at the Pentagon on January 23, 1991 alongside the US Secretary of Defense Dick Cheney. In the hour-long briefing, which detailed the first week of operations of the 28-nation coalition against Iraq, Powell famously stated: “Our strategy to go after this army is very, very simple. First, we’re going to cut it off, and then we’re going to kill it. To cut it off, that began last week when we started to go after the nerve center, the brains of the operation, the command and control of the operation, and the lines of communication that come out of Baghdad and other places in the country.”

One might have expected that Russian Federation Armed Forces top commanders and planners, in a similar vein, might have taken a similar tack toward the Ukraine Armed Forces. It might have been expected that they would have recognized that resupply not so much from Ukrainian arsenals but from those of US, other NATO Member States, and other countries in the EU would need to be blocked, cut off in some way. Yet, nothing remotely similar to what Powell expressed in 1991 was heard from theMinisterstva oborony Rossiyskoy Federatsii (Ministry of Defense Russian Federation) or General’nyy shtab Vooruzhonnykh sil Rossiyskoy Federatsii (General Staff of the Armed Forces of the Russian Federation), or from Putin, himself, about cutting Zbrojni syly Ukrayiny (Armed Forces of Ukraine, hereinafter referred to as the Ukrainian Armed Forces) off from resupply. There were no feigned movements such as moving Russian Federation forces to points outside Ukraine from which a blocking operation could best be launched in order to signal the intention to cut the Ukrainian Armed Forces off from resupply. Nothing was done sufficiently enough to cause supporters of the government of Kyiv to second guess any planned efforts to resupply the Ukrainian Armed Forces. In view of the potential decisive impact from contributions by the 30 countries in NATO,  particularly the US with its military largess, it would seem some Russian Federation Armed Forces commanders and planners thinking logically would urge the Russian Federation General Staff to suggest scrapping the operation until the problem of the Western resupply threat was resolved. 

A near endless list of situations during wars in which resupply determined the outcome of battle or even the war, itself. For example, armies have often encountered difficulties in cutting off resupply on a strategic level when fighting a determined opponent. Occasionally political leaders and army commanders have been slow in recognizing the opportunity to act decisively to mitigate resupply efforts on a strategic level. Armies have faced difficulties on the tactical level against a smaller force of well-trained, well-organized, and well-led opposing troops, even during a siege, when sufficient resupply has been made available to them

Ho Chi Minh Trail

The Ho Chi Minh Trail (Đường mòn Hồ Chí Minh) was a supply system that provided support, in the form of manpower and materiel, to the Communist insurgency, Viet Cong, and the People’s Army of Vietnam (North Vietnamese Army) during the Vietnam War. It comprised a logistical network of roads and trails that ran from North Vietnam to South Vietnam through the kingdoms of Laos and Cambodia during the Vietnam War. Initially troops, pushing heavily laden bicycles, driving oxcarts, or carrying supplies on their backs, moved hundreds of tons of supplies along it. However, trucks would become the primary means of moving supplies and troops. By 1969, tgere was even a pipeline crossed the Lao frontier through the Mu Gia Pass and, by 1970, it reached the approaches to the A Shau Valley in South Vietnam. The plastic pipeline, equipped with numerous small pumping stations, managed to transfer diesel fuel, gasoline, and kerosene all through the same pipe. By the end of 1970, the number of pipelines entering Laos increased to six that year. As a whole, supply efforts through trail were quite effective, which no mean feat given US efforts to thwart effort through trail included attacks from a CIA-raised clandestine army and the most intense air interdiction campaign in history. Mitigating the effects of US operations to destroy the trail was an existential effort. One might say the Ho Chi Minh Trail was the “center of gravity” for the Communists. Its loss probably would have led to their defeat in the war. As long as supplies could get to the Viet Cong and North Vietnamese Army, their war effort could continue with vigor which complicated US-led efforts to secure South Vietnam for the government in Saigon. South Vietnam would eventually surrender to North Vietnam.

Battle of the Atlantic 1939-1945

During World War II, Germany acted robustly to prevent merchant ships from carrying food, raw materials, troops and their equipment from North America to the United Kingdom. If they had succeeded, the outcome of war might have been radically different. The United Kingdom might have been starved into submission, which would have been complete strain on the morale. Its forces and those of its allies worldwide likely would have been deeply impacted. The supply line from the US was essentially the beating heart, the center of gravity, of the United Kingdom’s war effort. The threat to the movement of ships across the Atlantic came in the form of German submarines, the “Unterseeboot” or U-boat. United Kingdom Prime Minister Winston Churchill once wrote that, “The only thing that ever really frightened me during the war was the U-boat peril.”

At the start of World War II, the Befehlshaber der Unterseeboote (Commander of the Submarines) was Konteradmiral (Rear Admiral) Karl Dōnitz. Dönitz pushed for a German fleet that consisted almost entirely of U-boats, claiming that depriving Germany’s enemies of vital supplies such as food and oil would be the most effective way to achieve victory. He claimed that given 300 U-Boats of the latest design, the Type VII, he could defeat the entire Royal Navy. He would utilize them in tactical formations that would later be called “wolfpacks”. Dőnitz’s  superior, Oberbefehlshaber der Kriegsmarine (Commander-in-Chief of the Navy) and Großadmiral, Oberkommando der Marine (the Naval High Command) Erich Raeder, was uninterested in his theories. Raeder was a traditionalist whose focus was surface warfare. Raeder also judged that Germany could not contest the Royal Navy for control of the sea. Even more, Raeder believed submarine warfare was cowardly. By 1941, although relatively small in number, U-boats under then Vizeadmiral (Vice Admiral) Dőnitz were threatening Allied shipping as far as the US east coast. By the end of 1942, U-boat “wolfpacks” were achieving considerable success in sinking merchant ships. By early 1943, the United Kingdom’s resources, especially oil, were running out, and it became a question of whether Allied shipyards could build merchant ships fast enough to replace the tonnage that was being sunk. 

Finally recognizing the value of then Admiral Dönitz concepts on the effective conduct of submarine warfare, in January 1943, German Führer und Reichskanzler Adolf Hitler saw to it that he was advanced to the rank of Großadmiral (Grand Admiral) and replaced Großadmiral Erich Raeder as Oberbefehlshaber der Kriegsmarine and Großadmiral, Oberkommando der Marine. Interestingly, he retained his post as Befehlshaber der Unterseeboote. Dőnitz was given the authority to act as he saw fit with German naval forces too late. At that juncture, Dőnitz had 200 operational U-boats. By April 1943, his U-boats were clearly struggling to make an impact. The Allies were sinking German submarines in greater numbers, with 45 being destroyed in the months of April and May. Aggressive Allied anti-submarine tactics were aided by the introduction of new technology. Long-range aircraft were equipped with centimetric radar and directed based on Ultra intelligence from intercepts of Kriegsmarine Enigma code communications. The mass production of Liberty Ships in US shipyards would ensure that the Allies would overcome attrition rates and win the Battle of the Atlantic. Without the victory, the Allies would not have been able to land forces ashore in the Mediterranean Theater or at Normandy.

In Operation Sonnenblume, in 1941, the German Afrika Korps‘ first offensive in North Africa, it sought to advance on Alexandria and Suez. In that advance, the capture of Tobruk was a priority as it was the only deep water port in Eastern Libya and would have provided the Germans with the closest supply port to the Egypt–Libya border. Of some significance is the fact that the one the renowned military commanders to emerge from the war led the attack on Tobruk: Generalleutnant (Lieutenant-General) Erwin Rommel. In 1940, Rommel commanded the 7th Panzer Division during the invasion of France where he demonstrated skill in the new tactic of blitzkrieg. He was a military officer who knew his business. When Rommel struck, he achieved complete surprise against British Army units in Libya’s eastern coastal region. The British Army was forced to retreat several hundred miles across the desert toward Tobruk. At Tobruk, the British Army and its allies held on. The Germans frequently bombarded the port. A blockade had been organized to thwart British resupply and reinforcement efforts. However, ships of the Royal Navy’s Mediterranean Station ran the blockade, and provided Tobruk’s defenders gunfire support, supplies, fresh troops and by ferrying out the wounded. The defenders of Tobruk received enough resources to keep up the fight. Rommel was stopped and the siege was lifted in December 1941.

Tobruk Siege 1941

In Operation Sonnenblume, from February 6, 1941 to May 25,1941, its first offensive in North Africa, the German Afrika Korps sought to advance on Alexandria and Suez in that advance, the capture of Tobruk was a main objective. Tobruk was the only deep water port in Eastern Libya and would have provided Rommel a supply port closer to the Egypt–Libya border than Benghazi, 900 kilometers or 560 miles west of the Egyptian frontier, which was within the range of Royal Air Force bombers; Tripoli was 1,500 kilometers or 930 miles to the west in Tripolitania. Of some significance is the fact that the one the renowned military commanders to emerge from the war led the attack on Tobruk: Generalleutnant (Lieutenant-General) Erwin Rommel. A veteran of World War I, from 1929 through 1933, Rommel served as an instructor at the Dresden Infantry School and from 1935 at the Kriegsakademie (German War Academy) at Potsdam. In 1940, Rommel commanded the 7th Panzer Division during the invasion of France where he demonstrated skill in the new tactic of blitzkrieg. He was a military officer who knew his business. When Rommel struck, his Afrika Korps achieved complete surprise against British Army units in Libya’s eastern coastal region of Cyrenaica. The British Army was forced to retreat several hundred miles across the desert towards Tobruk.

Recognizing that he had the opportunity to capture Tobruk before the British Army and its Allies had time to organize an effective defense, Rommel advanced aggressively to exploit it. The 9th Australian Division, dubbed “The Rats of Tobruk”, supported by British Army armor and artillery, repulsed initial German assaults on April 10, 1941 to April 14, 1941, and even when the fresh 15th Panzer Division was committed to the attack on April 30, 1941, the defenders held on. The Germans frequently bombarded the port with artillery and Luftwaffe (German Air Force) dive-bombers and medium bombers. A blockade had been organized to thwart British resupply and reinforcement efforts. However, ships of the Royal Navy’s Mediterranean Station–to include the Inshore Squadron–ran the blockade. Indeed, known as the “Tobruk Ferry Service”, Royal Navy and Royal Australian Navy warships provided gunfire support, supplies, fresh troops and by ferrying out the wounded. The defenders of Tobruk were provided enough resources to keep up the fight. The Royal Air Force flew defensive sorties from airfields far away in Egypt. The siege of Tobruk was the first occasion in the war that German Panzer units had been stopped. The siege was lifted in December 1941. It must be noted that via Operation Crusader, launched on November 27, 1941, Tobruk was relieved by the British Eighth Army which after September 1941, controlled British Army and other Allied ground forces in the Western Desert. It seems worthwhile to note the Fall of Tobruk occurred when Generalfeldmarschall Erwin Rommel  commanding Panzerarmee Afrika (Panzer Army Africa) which controlled the Afrika Korps and additional German units deployed to Africa as the 90th Light Infantry Division), as well as the Italian X Corps and XX Corps, attacked  on June 20, 1942 with massed air support, broke through a weak point on the eastern defensive perimeter, and captured the port. Although the garrison on the western perimeter had not been attacked, it was cut off from supplies and transport. Lacking the means to escape, the majority had to surrender; 33,000 prisoners were taken. Rommel had indeed learned lessons during the 1941 siege.

Être Voué à L’échec dès le Début

Even if everything else had been planned and arranged in the correct manner in every other aspect for the invasion, the viability of the entire plan would still rest on the ability of the Russian Federation Armed Forces to at best destroy, acceptably disrupt, or at the absolute minimum, delay resupply from the US, EU, and NATO. Without being able to control the movement of resupply in the West, the plan for the invasion should have been scrapped or the attack should have been postponed until that was nailed down. The reasoning behind such a decision has already been made abundantly clear looking at the circumstances of the handful of examples presented here already. As it was, the “special military operation” was launched, half-baked, and billions of dollars in military assistance has reached the Ukrainian Armed Forces via their country’s western border. Many weapon systems sent into Ukraine have had a multiplier effect on the battlefield. Firepower in the form of multiple launch rocket systems, self-propelled artillery, and heavy caliber guns, transported possibly along the now heavily traveled supply lines from both Poland and Romania enabled the Ukrainian Armed Forces to launch two highly-successful counteroffensives. On August 29, 2022, a counteroffensive was launched to eject Russian forces occupying the Kherson and Mykolaiv oblasts (provinces). On September 6, 2022, a counteroffensive was launched to eject Russian forces occupying the Kharkiv, Donetsk, and Luhansk oblasts. Given the unsatisfactory nature in which the Russian invasion was arranged and indeed, has been prosecuted, the decision to go into Ukraine was the sort that if made during an instance of saber rattling and war fever in a highly-industrialized democracy, would very likely lead to the impeachment of a national leader.

Ruminations

To set the record straight from the outset, greatcharlie believes that if Russian Federation forces were selectively positioned in Western Ukraine, the Ukrainian Armed Forces would have likely used their formidable and quite impressive drone arsenal to bombard them. They might have achieved the same relative success that they have achieved with Russian Federation forces in the east and south and around Kyiv. Once aptly prepared, Ukrainian special forces would likely do their part to hunt down and displace and destroy any Russian Federation troops settled in their country’s Western region. 

Commanders and planners in the Russian Federation Armed Forces would unlikely have known or believed any of that would have been possible before the invasion. One would need to consider other reasons for the omission of a mission to thwart, to an extent blockade resupply to the Ukrainian Armed Forces from the West.The Romania-Ukraine border is 649 kilometers or around 403 miles, but it is discontinuous. The. Moldova-Ukraine border is 1,222 kilometers or 759 miles. However, along the Dniester River, between Moldova and Ukraine, is the autonomous Republic of Transnistria.  Thereby, 454 kilometers or 282 miles of the Moldova-Ukraine border stand as the de factor border between Transnistria and Ukraine.

To the left of the above map are all countries situated on Ukraine’s western border. As Ukraine is looked upon in Europe as a very large country, perchance the area in western Ukraine that would need to be covered was judged by military commanders and planners in the Russian Federation General Staff as too large and deemed too difficult to control or monitor, surveil, and launch successful interdiction attacks and raids from. The Polish–Ukrainian border has a total length of 529 kilometers or 329 miles to 535 kilometers or 332 miles according to different sources. The Romania-Ukraine border is 649 kilometers or around 403 miles, but it is discontinuous. The Slovakia-Ukraine border is 97 kilometers or a bit over 60 miles. The Hungary-Ukraine border is roughly 103 kilometers or 60 miles long. It its located in Hungary’s Tisza river valley of its northeast. The Moldova-Ukraine border is 1,222 kilometers or 759 miles. However, along the Dniester River, between Moldova and Ukraine, is the autonomous Republic of Transnistria.  Thereby, 454 kilometers or 282 miles of the Moldova-Ukraine border stand as the de factor border between Transnistria and Ukraine.

Omission or De-emphasis?

Negligentia sempre habet infortunam comitem. (Negligence always has misfortune for a companion.) Imaginably, there is a moderately rational reason behind the decision to attack the second largest country in Europe, 603,500 square kilometers or 233,000 square miles, without being fully prepared. Ukraine is second largest in size to Russia, which is 17,098,246 square kilometers or 6,601,670 square miles. As Ukraine is looked upon in Europe as a very large country, perchance the area in Western Ukraine that would need to be covered was judged as too large by military commanders  and planners in the Glavnoe operativnoe upravlenie General’nogo štaba Vooružёnnyh sil Rossijskoj Federacii (the Main Operational Directorate of the General Staff of the Russian Federation) and commanders and planners at the lower level in Yuzhnyy Voyennyy Okrug (the Southern Military District) and the Zapadnyy Voyennyy Okrug (the Western Military District) and deemed too difficult to control or monitor, surveil, and launch successful interdiction attacks and raids into. The Polish–Ukrainian border is the state border between Poland and Ukraine. It has a total length of 529 kilometers or 329 miles to 535 kilometers or 332 miles according to different sources.

Concisely and admirably described by the Mission Opérationnelle Transfrontalière (Transfrontier Operational Mission), an association that was set up in 1997 by the government of France to resolve issues for entities concerned with cross border issues, the Poland-Ukraine border begins at the tripoint formed by the Ukrainian, Polish and Slovak borders, in the middle of the Eastern Carpathian mountains. The demarcation runs initially towards the east, arriving at the Ushok Pass and the source of the San River, whereupon it turns north-west to follow the river for around 50 kilometers or 31 miles. It subsequently leaves the river to take a north-easterly direction, crossing the region known as the “Przemyśl Gate”, where mountains meet lowlands. The border then crosses large swathes of agricultural land, to reach the Bug River, which forms the last third of its demarcation. It ends at the tripoint formed by the borders of Poland, Ukraine and Belarus. Poland is a NATO Member State and an EU border state.

The Romania-Ukraine border is 649 kilometers or around 403 miles, but it is discontinuous. Again using a description from the Mission Opérationnelle TransfrontalièreThe Republic of Moldova separates the border into two segments. The first in the west, at the tripoint between the Hungarian-Romanian and Hungarian-Ukrainian borders. That segment then continues across the East Carpathian mountains and terminates at the tripoint formed by the Moldovan, Romanian and Ukrainian borders. The second segment begins at the second tripoint between the Moldovan, Romanian and Ukrainian borders, on the north bank of the Danube River, and terminates as it reaches the Black Sea. Romania is a NATO Member State and an EU border state. The Slovakia-Ukraine border is 97 kilometers or a but over 60 miles long. Slovakia is also a NATO Member State and an EU border state. The Hungary-Ukraine border is roughly 103 kilometers or 60 miles long. It is located in Hungary’s Tisza River Valley in the country’s northeast. As with the preceding three countries discussed, Hungary is a NATO Member State and an EU borderstate. The. Moldova-Ukraine border is 1,222 kilometers or 759 miles. However, along the Dniester River, between Moldova and Ukraine, is the autonomous Republic of Transnistria.  Thereby, 454 kilometers or 282 miles of the Moldova-Ukraine border stand as the de factor border between Transnistria and Ukraine. Transnistria is an autonomous republic aligned since 1992 with the Russian Federation. Russian Federation Armed Forces units have also been garrisoned there since 1992. To that extent, anyone providing military assistance to Ukraine would hardly choose to move anything through Moldova as Russian Federation intelligence services posted in Transnistria would likely be able to position themselves to monitor such resupply activities. Moving through Moldova would very likely be deemed too risky, unsafe. To an extent, one might say any effort by Russian Federation Armed Forces to monitor resupply efforts for Ukraine would indicate commanders and planners were covering the matter. Perhaps the Russian Federation General Staff sold that notion to Putin. However, while a few things could be done from Transnistria, given the sheer size of its border with Ukraine, and its position south and toward the east with respect other bordering countries, it would unlikely be enough to make a real difference. It would seem Putin did not want to stir trouble over Transnistria issue. The Russian Federation Armed Forces there have remained relatively quiet, and the West has more or less left the autonomous republic alone. If covert monitoring has been transpiring along or across the Transnistria border, it is apparently not having an impact. Thus, the focus here is on resupply from Poland, Slovakia, Hungary, and Romania.

Russian Federation President Vladimir Putin (center), Russian Federation Defense Minister General Sergei Shoigu (right), and Chief of Staff of the Russian Federation Armed Forces General Valery Gerasimov (left). Commanders and planners in the Russian Federation Armed Forces apparently “wholeheartedly” accepted the idea that the Ukrainians would acquiesce as in 2014. Despite losses inflicted upon Ukrainian defenders and territorial gains, in eastern and southern Ukraine as well as Kyiv, the mission to completely snuff out the combat power and resolve of the Ukrainian Armed Forces and force a sort of mass capitulation was not achieved. The losses of the Russian Federation Armed Forces have been exponentially higher. It seems most apparent that the Russian Federation General Staff had moved forward without a satisfactory long-term plan for the invasion. Indeed, by results alone, one might infer that there were actually no contingency plans to draw upon for the invasion of Ukraine.

Folly, Doctor-Like, Controlled Skill

Commanders and planners in the Russian Federation Armed Forces apparently “wholeheartedly” accepted the idea–fiction–that the Ukrainians would roll over and play nice doggie à la 2014. Tomaten auf den augen haben. Despite losses inflicted upon the Ukrainian defenders and territorial gains, in eastern and southern Ukraine, the mission to completely snuff out the combat power and resolve of the Ukrainian Armed Forces and force a sort of mass capitulation was not achieved. In the end, the losses of the Russian Federation Armed Forces have been exponentially higher. It seems most apparent that the Russian Federation General Staff had moved forward without a satisfactory long-term plan for the invasion. Indeed, by results alone, one might infer that there were actually no contingency plans to draw upon for the invasion of Ukraine, with solutions for all conceivable challenges. Doing the “what-ifs” beforehand was probably viewed as walking out on thin ice “politically”. While the idea might be difficult for the reasonable to reconcile, it appears the massive enterprise was  truly undertaken by Moscow on the fly. 

Allowing the Russian Federation Armed Forces to perform in such a way would be very much unlike Putin given the record of his past behavior. True, over the past two decades, he has dropped some clangers. Even the most knowledgeable and experienced can make mistakes they learned to avoid long ago. That is human nature; the human element. Still, Putin’s actions are usually thoughtful, calibrated, well calculated, with the use of resources in a measured way to achieve the most favorable outcomes. Putin can surely tell the difference between real and unreal. He has not managed to stay in power since 2000 by engaging in Quixotic pursuits. This is something new. One wonders what could possibly come next for Ukraine and for the world.

Putin was oddly hooked on the idea that among the officers, men, and women of the Ukrainian Armed Forces, there was a lingering sense of Soviet unity equal to his own. This in itself was quite interesting as Putin was hardly known for truly displaying brotherly love toward former Soviet republics. He would create an environment of fear in his relationship with their respective leaders. After Euromaidan, the Ukrainians did not want any part of that. In his invasion day television broadcast of February 24, 2022, Putin would go as far as to implore the Ukrainian Armed Forces to submit to his will and allow Russian troops to again simply march into their country. There appeared to be a singular emotional commitment on his part to the ideas of Russian-Ukrainian unity and the fealty of the officers, men, and women of the Ukrainian Armed Forces to Moscow, to him. Putin “appealed” to members of the Ukrainian Armed Forces as follows: “I would also like to address the military personnel of the Ukrainian Armed Forces. Comrade officers! Your fathers, grandfathers and great-grandfathers did not fight the Nazi occupiers and did not defend our common Motherland to allow today’s neo-Nazis to seize power in Ukraine. You swore the oath of allegiance to the Ukrainian people and not to the junta, the people’s adversary which is plundering Ukraine and humiliating the Ukrainian people.” Putin continued: “I urge you to refuse to carry out their criminal orders. I urge you to immediately lay down arms and go home. I will explain what this means: the military personnel of the Ukrainian army who do this will be able to freely leave the zone of hostilities and return to their families.” If the matter were not so grave, his words might be looked upon as comical.

Putin seemed forgetful of, or totally oblivious to, the fact that he was responsible for the greatest humiliation of the Ukrainian Armed Forces when he ordered the “green men” of the Russian Federation Armed Forces into Crimea to seize Ukraine’s sovereign territory. Further, without firing a shot, the green men first corralled members of the Ukrainian Armed Forces much as sheep in their own garrison and then herded them out of Crimea. Knowing the Ukrainians as well as he claimed he did in the February 24, 2022 broadcast, Putin should have known the Ukrainians are not sheep. He should have been well-aware that there would be payback for what happened in 2014 and everything that has happened since. He surely knows that now.

In its ill-designed aspects influenced by the political leadership, the Russian Federation’s special military operation on a macro-level much resembles the failed German campaign, Operation Barbarossa, launched on June 21, 1941. Hitler provided empty assurances resulting from his baseless analyses to Oberkommando des Heeres (High Command of the Army) to the effect that “We have only to kick in the front door and the whole rotten edifice will come tumbling down.” Oberkommando des Heeres went along with Hitler’s concept that the campaign would be a short one, and that the Soviets would give in after suffering the shock of massive initial defeats. As a result, it did not develop a satisfactory long-term plan for the invasion.  The shock and awe of the initial Blitzkrieg was dissipated by the vast distances, Supply challenges could not be overcome. There was a lack of sufficient manpower resources. German losses could not be sustained. After initial contact, there was stiff resistance from Soviet forces. Despite the serious losses inflicted on the Soviet Army the mission to completely destroy Soviet fighting power and force a capitulation was not achieved by January 7, 1942, and the operation was terminated 20 kilometers short of Moscow. Interestingly enough,a number er of fitting comparisons between Putin and a national leader whose blunders came as a result of being closed to the recommendations and entreaties of his or her top advisers, are those made with Hitler.

Delinquency

There is the real possibility that commanders and planners in the Russian Federation Armed Forces, attempting to hastily organize the massive Spetsial’noy Voyennoy Operatsii (Special Military Operation) were not even aware that the opportunity to destroy and disrupt the resupply effort for Ukraine was missed. Everything truly started off on the wrong foot from the get-go. By logic, at first glance this would seem unlikely. After all, the well-trained senior officers and planners of the Russian Federation Armed Forces would not be aware of the danger posed by Ukraine’s open western border. Perhaps there may have been some understanding among military planners that the situation there would be played-down in order to line up with thinking from the Kremlin. In the realm of conjecture, anything becomes possible. If such was the case, from that point onward, they could only hope nothing bad would come of that considerable  omission.

The US educator and organizational theorist, Russell Ackoff was a pioneer in the field of operations research, systems thinking, and management science. In a research article entitled “A Major Mistake That Managers Make” in Handbook of Business Strategy, volume 7, number 1, January 2006, pages. 225-227, Ackoff wrote: “Errors of omission, lost  opportunities, are generally more critical than errors of commission. Organizations fail or decline more frequently because of what they did not do than because of what they did.” Although the December 7, 1941 surprise attack of the Imperial Japanese Navy on Pearl Harbor was a tactical victory, it was also a strategic blunder, as the Japanese failed one of their most critical objectives: destroy the US aircraft carriers. Even worse, the Japanese failed to destroy the strategic oil reserves at Oahu, and the damage to docks and yards was slight. That oil reserve fueled the US Navy through the remainder of the war against Japan.

A well-intervaled column of German vehicles moves through the Ardennes Forest in 1940 (above). At the top of the list of historical causes for military blunders has been insufficient intelligence analyses as well as the failure of consumers to include valuable forecasts in their appraisals of situations. Consider for example how the military high command of France failed their government three times in 70 years by minimizing warnings about the intentions of Prussian and German Governments. In 1870, the Supreme Command of the French Imperial Army, with its attitude of debrouillez-vous (“We’ll muddle through somehow”), did not heed signaling that the Prussian Army would move via the Ardennes Forest through Belgium into France. In 1914, the French Grand Quartier Général (General Headquarters) did not heed indicia signaling that the Imperial German Army, to avoid French defenses on the Franco-German border, would move via the Ardennes Forest through Belgium into France. In 1940, the Anglo-French Supreme War Council, relying on the defenses of the Maginot Line, did not heed indicia signaling that the German Army would move via the Ardennes Forest through Belgium into France. Even with this history, in 1944, the Supreme Headquarters of Allied Expeditionary Forces in Europe ignored idicia signaling that the German Army might attempt to move via the Ardennes Forest into Belgium in an attempt to reach Antwerp and cut Allied Forces into two pieces. The result was the Battle of the Bulge in which US forces suffered an estimated 75,000 casualties.

Was Faulty Intelligence to Blame?

Quis, quid, ubi, quibus, auxiliis, cur, quomodo, quando? (Who, what, where, with what, why, how, when?) Very pertinent here is the attendant influence of faulty intelligence in understanding the situation of an opponent, strengths and weaknesses, capabilities and possibilities in the development of the concept and intent of an operation in terms of supply. It becomes a factor of some magnitude in planning support operations. It is imprudent for political leaders and top military commanders to ignore information from intelligence services that confirms some action by an adversary is very likely, imminent, or has been taken. Well at the top of historical causes for military missteps has been insufficient intelligence analyses as well as the failure of consumers to include valuable forecasts in their appraisals of situations. 

Consider for example how the military high command of France failed their government three times in 70 years by minimizing warnings about the intentions of Prussian and German Governments. In 1870, the Supreme Command of the French Imperial Army, with its attitude of debrouillez-vous (“We’ll muddle through somehow”), did not heed signaling that the Prussian Army would move via the Ardennes Forest through Belgium into France. In 1914, the French Grand Quartier Général (General Headquarters) did not heed indicia signaling that the Imperial German Army, to avoid French defenses on the Franco-German border, would move via the Ardennes Forest through Belgium into France. In 1940, the Anglo-French Supreme War Council, relying on the defenses of the Maginot Line, did not heed indicia signaling that the German Army would move via the Ardennes Forest through Belgium into France. Even with this history, in 1944, the Supreme Headquarters of Allied Expeditionary Forces in Europe ignored idicia signaling that the German Army might attempt to move via the Ardennes Forest into Belgium in an attempt to reach Antwerp and cut Allied Forces into two pieces. The result was the Battle of the Bulge in which US forces suffered an estimated 75,000 casualties.

Referring again to the attack on Pearl Harbor, a newly discovered official US Government memorandum has revealed that intelligence collected about the activities of the Imperial Japanese Navy, led to assessments that Japan might attack the US on the West coast, the Panama Canal, and the US naval and military bases in Hawaii some time in December 1941. The Japanese Imperial Navy would eventually execute a devastating surprise, aircraft carrier-based, aerial attack and submarine attack on the US Naval Base and Headquarters of the US Pacific Fleet at Pearl Harbor, and aerial attacks against the US Army Base at Schofield Barracks and the US Army Air Corps Base at Hickam Field. Most US military commanders were bewildered by the successful attack which they never would have believed Japan could execute before it actually happened. By leaning into those beliefs, they were caught flat-footed by the attack. Their immediate responses were meager and ineffective.

In the case of Ukraine, it would seem Putin was provided faulty information. Some intelligence services apparently did more in the direction of providing fabrications than others.. From what can be gathered by newsmedia reports about its findings, the foreign intelligence service of Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsii (Federal Security Service of the Russian Federation) or FSB, known as the organization’s 5th service. The 5th Service is a division that was established in 1998, when Putin was director of the FSB, to carry out operations in the countries that were formerly republics of the erstwhile Soviet Union. Its mission was to help ensure those countries remained within Russia’s orbit. Apparently, the 5th Service laid it on thick. There were allegedly many unproven, torrid statements on the nature of Ukrainian society made concerning the destructive impact of the West on the culture, morality, spiritually, self-image of the people, ultranationalists, and the leadership in Kyiv, and the Ukrainian people’s willingness to stand fast against an invasion. 

Are Russian Federation Satellites Functioning?

One might imagine that there was a chance that intelligence, surveillance, and reconnaissance (ISR) capabilities by Russian Federation satellites could have assisted in covering the space and monitor and act against assistance efforts by supporting calibrated attacks on supply trains, especially readily observable ones  traveling along roads and rails. Intriguingly, only a few short years ago, there was great concern expressed in the US about formidable Russian Federation satellites that were interfering with US satellites. As discussed in greatcharlie’s July 6, 2017 post entitled, “Trump to Meet With Putin at G-20 Gathering: Trump Seeks an Authentic Relationship with Russia”, there was the belief that Russia was developing the ability to approach, inspect, and potentially sabotage or destroy US satellites while they orbited the Earth. 

Now, it seems, Russian Federation satellites must be able to provide a picture of the situation in Ukraine. True, as stated here, Ukraine is the second largest country in Europe, but, if many will pardon this expression, in greater terms, it is smaller than the State of Texas in the US, which has been regularly, intensely surveilled by the Russian Federation as it was before by the Soviet Union due mainly to the many massive US military and NASA bases and other facilities there. De quoi s’agit-il ici? It appears that a breakdown in Russian ISR capabilities from space much as its military, naval, and intelligence capabilities generally, had occurred long before the special military operation was launched.

Having been responsible for the preparedness of the Russian Federation Armed Forces, the Russian Federation General Staff had to have known something was awry. it had to have known whether they were up to the job in Ukraine. While the Russian Federation Armed Forces’ Zapad and Vostok exercises perhaps indicated that they were ready for war, surely the Russian Federation General Staff was fully aware of how numbers of troops, actions, reports were, to be frank, falsified. The most senior commanders may not have been sure themselves what the true capabilities of the Russian Federation Armed Forces were. If they were living in an illusion about how mighty their forces were, that  Illusion was destroyed in the face of reality.

Snapshot of the initial wave of Ukrainian refugees (above). There is the possibility the commanders and planners in the Russian Federation Armed Forces may have believed there was more to gain by having a great flow of refugees pouring out of Ukraine to create problems, chaos and confusion, hostile reactions from populations of countries inconvenienced by overflows of Ukrainian refugees, and frustration among NATO, EU Member State capitals. Conceivably, the thinking from the Kremlin and subsequently the Russian Federation Armed Forces that if the roads out of Ukraine to Poland, Slovakia, Hungary, Romania, and Moldova were clogged, potentially military assistance could not get through, at least not efficiently. By weaponizing refugee flows an invasion would cause, it may have been believed a way found to split the seam between two possibilities. However, even in the best case scenario, the refugee exodus would be a temporary problem. If Western powers could not resolve the matter, they would at least be able to mitigate its immediate effects. Once the invasion began, humanitarian and refugee organizations of almost every kind jumped in feet first. The West could do more with assistance to stem the crisis than the Russian Federation could do by creating a refugee overflow crisis. As it turned out, the refugee crisis as the Kremlin might have envisioned and hoped did not materialize.

The Pitfalls of Creative Thinking

There is the possibility the commanders and planners in the Russian Federation Armed Forces may have believed there was more to gain by having a great flow of refugees pouring out of Ukraine to create problems, chaos and confusion, hostile reactions from populations of countries inconvenienced by overflows of Ukrainian refugees, and frustration among NATO, EU Member State capitals. That belief would very likely have been in following with the concept and intent disseminated from the Kremlin. The impact of a refugee surge was witnessed while war raged in Syria. During the 2015 Syrian Refugee Crisis, an estimated 1.3 million refugees seeking asylum literally jammed roads leading to Europe. European countries, especially the first ones along the refugees route that encountered them, were unable to handle their numbers immediately. Some capitals panicked. Many political, social, financial, and security issues subsequently arose. The refugee flow eventually subsided. 

The Weaponization of Refugees

Conceivably, the thinking from the Kremlin and subsequently the Russian Federation Armed Forces that if the roads out of Ukraine to Poland, Slovakia, Hungary, Romania, and Moldova were clogged, potentially military assistance could not get through, at least not efficiently. By weaponizing refugee flows an invasion would cause, it may have been believed a way found to split the seam between two possibilities. Zwei fliegen mit einer klappe schlagen. However, even in the best case scenario, the refugee exodus would be a temporary problem. If Western powers could not resolve the matter, they would at least be able to mitigate its immediate effects. Once the invasion began, the UN with its many aid organizations as well as and other international and regional intergovernmental humanitarian and refugee organizations jumped in feet first. The US would work with capitals in Europe, especially Warsaw, and encourage through diplomacy and support with its wherewithal, a multilateral effort by government aid agencies. The EU acted in a similar way. The International Federation of Red Cross and Red Crescent Societies, CARE and other international and regional nongovernmental humanitarian and refugee organizations. Nongovernmental refugee and displaced persons organizations, and a variety of humanitarian organizations from around the world made their way to Poland, Slovakia, Hungary, Romania, and Moldova to get a handle on the problem. 

As things went, the Russi­an Federation’s special military operation triggered a “regional forced displacement crisis.” By September 30, 2022, seven months after the invasion began, 7,536,433 Ukrainian refugees were registered outside of Ukraine. Reportedly, Poland and Germany received the most refugees; more than a million each. The Czech Republic took in the next highest number 438,926, followed by the US, the United Kingdom, France, Turkey, Italy, and Spain, each of which accepted from 100,000 to 300,000 refugees. Smaller numbers escaped to Hungary, Romania, Slovakia, and Moldova. 

Interestingly, and doubtlessly to the consternation of the Kremlin and Russian Federation Armed Forces, not only is military assistance flowing freely into Ukraine from Poland but so are “returnees”. Clear data that documents how many of the 7.5 million Ukrainian refugees have returned home permanently, reportedly is unavailable. However as of September 20, 2022, over 6 million cross-border movements were made back into the country. Border crossing points in Poland as well as Romania are said to be receiving most of the returnees, with nearly 4.5 million crossings from Poland and nearly 1 million from Romania. In the aggregate, one might conclude that the West could do more with assistance than Russia could do by creating a refugee overflow crisis. In the end, the refugee crisis that the Kremlin may likely have envisioned and hoped for did not materialize. Vide et credere. (See and believe.)

Where Was the GRU?

As a military matter, intelligence on the situation in Ukraine to the extent it would impact the special military operation had to be of great interest specifically to Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU  The GRU could not have missed the potential problem of resupply routes into Ukraine from Poland, Slovakia, Hungary, and Romania being set up. Perhaps the GRU was unable to convince the Russian Federation General Staff of the necessity to close the door to assistance from the West. Maybe there was at first a thought to use the same act twice with “green men” in the Western Ukraine. However, GRU planners may have been concerned about being unable to redeploy or evacuate troops placed perhaps at border crossings, highways, train junctions, road intersections, bridges, heights, airports, military airfields, and so on deep in Ukraine in large numbers if a major problem was encountered.

It was suggested in greatcharlie’s January 25, 2022 post, one could conceive that concerning Western military assistance, a special task force has been organized and assigned in advance, among other things: monitor the delivery, stockpiling of stinger, javelin, and other weapons systems to Ukrainian forces; maintain real-time knowledge of the distribution and location of those weapons; destroy those weapons systems; and, destroy or support actions by other Russian military units to destroy Ukrainian military units to which those weapons were distributed. That hypothetical task force would also likely be tasked to monitor–covertly monitor the intelligence activities and military operations of–Western countries as they relate to supplying Ukraine with special military capabilities. It would seem that suggestion made by greatcharlie then was well-off the mark. Maybe they were concerned about potential for great casualties and huge losses of materiel.

Where Was Spetsnaz?

Voyská spetsiálnogo naznachéniya (‘Special Purpose Military Units) or spetsnaz, a carry over from the days of the Soviet Union, are trained, and tasked as special forces units and fielded in wartime as part of the GRU. As is the case with special forces in most countries, the primary missions of spetsnaz are power projection (direct action), intelligence (reconnaissance), foreign internal defense (military assistance), and counterinsurgency. The GRU may have been unable to conjure up a viable plan to use spetsnaz in western Ukraine. Again, GRU planners may have been concerned about being unable to deploy or evacuate troops placed even on raids so deep without a solid means of egress. Even if it had been possible to monitor and act in the Western region from Belarus, again, distances that needed to be traversed may have been too great.

One might wonder whether the GRU had been aware that there was someone else in Western Ukraine, covert foreign forces from governments very friendly with Kyiv, already holding the most useful entrances and exits to and from Poland, Slovakia,, Hungary,, and Romania open in case of an attack. It is the sort of thing US Special Operations Units, the Special Activities Division of the US Central Intelligence Agency, the British Army’s Special Air Service, and the United Kingdom’s Secret Intelligence Service would be very capable of doing and would likely do, covertly. Surely, this idea is drawn from the realm of conjecture, however, it would be a smart move and their hypothetical presence would hardly be reported in the Western newsmedia. If, hypothetically, such forces had been there covertly since 2014, they may have been well-engaged in successful clandestine and covert activities in the region.

Perhaps what happened in Syria may have been an issue at all in GRU Headquarters. A battle between US Special Forces and Russian private military contractors from the infamous Gruppa Vagnera (Wagner Group) may have had a long-lasting educational effect in Yasenevo. Present in Syria as part of the campaign to destroy the so-called Islamic Caliphate created by the Islamic jihadist terrorist organization, the Islamic State of Iraq and Greater Syria (ISIS) that cut across iraq and Syria, US Special Forces, in self-defense at their own base, decimated a formation of Gruppa Vagnera that attacked them. Memores acti prudentes futuri. (Mindful of what has been done, aware of what will be.)

Even if commanders and military planners had been certain that spetsnaz could well-handle any foreign forces that hypothetically might have detected in the Western region of Ukraine, there imaginably would have been a wish in the Kremlin to avoid being seen as, and being accused of, attacking those foreign troops. In dubio abstinence. (When in doubt, sustain.)

Where Were the Russian Airborne Forces?

As for the Vozdushno Desantnye Voyska (Russian Airborne Forces) or VDV, surely the Ukrainians might have expected missions launched by them to hold territory in-depth. Yet, as with the GRU, commanders and planners in the VDV may have been concerned about being unable to redeploy or evacuate troops placed perhaps at border crossings, highways, train junctions, road intersections, bridges, heights, airports, military airfields, and so on deep in Ukraine in large numbers if a major problem was encountered. Maybe they were concerned about potential for great casualties and huge losses of materiel. That happened without an operation to block Western assistance coming in from the West: 50,000+ killed. 

Surely, they were made more certain that the VDV would unlikely have been able successfully operate in the Western region of Ukraine after what transpired when its units attacked Hostomel Airport in the first days of the special military operation. The VDV faced considerable troubles there. One might view the capture of an airport a sort of bread and butter target for airborne units in armies worldwide

Russian Airborne Forces landing at Hostomel Airport (above). Russian Federation Armed Forces commanders and planners may have been concerned about the potential for huge losses if a blocking operation in the West were attempted. Surely, they were made more certain that the VDV would unlikely have been able successfully operate in the Western region of Ukraine after what transpired when its units attacked Hostomel Airport in the first days of the special military operation. After securing Hostomel Airport to the extent possible, the Russian Federation Army and VDV there tried to push into the nearby town and then  advance to Bucha and Irpin. Their poorly organized movement encountered ambushes in Hostomel and Bucha which resulted in significant losses of personnel and equipment. Those in command of the Russian Federation Army and VDV troops, decided to hold their positions, digging in on the roadsides to defend themselves against Ukrainian artillery and drone strikes. They also suffered heavy casualties from night attacks by special forces units of the Ukrainian Armed Forces. On March 29, 2022, the order was given for the Russian Federation forces at Hostomel to withdraw from the Kyiv oblast. Under continuous artillery fire from Ukrainian forces, the Russians damaged equipment that had to be abandoned and made a hasty retreat.

According to reports based on what was observed, the Russian Federation Armed Forces plan of attack against Hostomel Airport included its rapid occupation, with the intention of using it as an assembly area for Kyiv’s encirclement and capture. The airport is a bit over 6 miles north of Kyiv. The Initial February 24, 2022 assault on Hostomel Airport was a success, catching its Ukrainian defenders by surprise apparently due its speed. Mi-35 and Ka-52 attack helicopters operating out of Belarus struck the airport’s defenses and opened a way for helicopter-borne VDV units in Mi-8 transport helicopters that followed. However, despite being caught off guard by the initial assault by the attack helicopters, the attack itself was ineffective as the Ukrainian defenses were left largely intact.  Without any meaningful air support–it was very likely not included in formulation of the attack plan, VDV units on the ground faced counterattacks by Ukrainian forces almost immediately.

Luckily for the VDV troops struggling with Ukrainian forces for control of the airport, Russian Federation Army units originating in Belarus broke through Ukrainian defenses near Ivankiv and rapidly drove toward Hostomel. Although the advancing Russian Federation troops faced attrition from several Ukrainian ambushes en route, they reached Hostomel Airport and assisted the VDV in securing it on February 25, 2022. The Russian Federation Army units and the VDV sought to establish Hostomel into a forward operating base from which the larger push on Kyiv could be initiated. However, it was at this juncture that the special military operation began facing fierce resistance from the Ukrainians and became stalled. Logistical problems impacted operational tempo. The most visible sign was well-televised coverage of a 40-mile-long convoy that halted due to lack of fuel. Securing Hostomel Airport to the extent possible, the Russian Federation Army and VDV there tried to push into the nearby town and then  advance to Bucha and Irpin. Their poorly organized movement encountered ambushes in Hostomel and Bucha which resulted in significant losses of personnel and equipment. Those in command of the Russian Federation Army and VDV troops, decided to hold their positions, digging in on the roadsides to defend themselves against Ukrainian artillery and drone strikes. They also suffered heavy casualties from night attacks by special forces units of the Ukrainian Armed Forces. On March 29, 2022, the order was given for the Russian Federation forces at Hostomel to withdraw from the Kyiv oblast. Under continuous artillery fire from Ukrainian forces, the Russians damaged equipment that had to be abandoned and made a hasty retreat.

A Matter of Military Science

To the extent of everything mentioned here, perhaps a hypothetical concern over sending a relatively large sized force into Western Ukraine was a matter of Russian Federation commanders and military planners remembering what they learned while studying in military educational institutions. To that extent, they wanted to avoid the circumstance faced by Allied troops during Operation Market Garden during World War II.

The story of the Battle of Arnhem, part of Operation Market Garden, a massive Airborne ground assault in from from September 17, 1944 to September 26, 1944 during World War II. remains fairly well-known, however greatcharlie will humbly seek to recount it to the extent that is pertinent here. Under the plan proposed by British Army Field Marshal Sir Bernard Montgomery, the Airborne assault would support a single drive north over the branches of the Lower Rhine River,which would  permit the British Second Army to bypass the Siegfried Line and attack the industrial Ruhr. US Airborne troops were dropped in the Netherlands to secure bridges and towns along the line of the Allied advance. Farthest north, the British 1st Airborne Division was dropped at Arnhem to capture bridges across the Nederrijn (Lower Rhine). Their assault was supported by the Glider Pilot Regiment and the 1st Polish Parachute Brigade. The British XXX Corps were assigned to reach the British-led contingent in two to three days. The division was told to expect only limited resistance from German reserve forces. However, information collected by the British Army’s 21st Army Group in Belgium and Dutch resistance that German armor units were present around Arnhem. That intelligence was supported by aerial reconnaissance. However, the commanding officer of 21st Army Group, dismissed the information. The Supreme Headquarters Allied Expeditionary Force was made aware that almost certainly two Panzer divisions were situated at Arnhem but received the information from Ultra intercepts so close to the Operation Market Garden’s launch that it chose to ignore it. Intriguingly, the First Allied Airborne Army was not made privy to information from Ultra.

The information was very accurate. German Army Generalfeldmarschall Walter Model, the commander of Army Group B, had moved his headquarters to Arnhem and was re-establishing defenses in the area and co-ordinating the reorganization of the scattered units. Thus, at the time of Operation Market Garden’s launch, several units would be present in the vicinity of Arnhem to oppose them. Most threatening among them were the II SS Panzer Corps comprising the remains of the 9th SS Panzer Division “Hohenstaufen” and  the 10th SS Panzer Division “Frundsberg”. It was the bad luck of the airborne force that both German SS divisions, during their formation, had undergone month-long anti-airborne exercises and had also spent the last 15 months studying how best to act against a parachute assault in classroom and field exercises.

The 1st Airborne Division was dropped a distance from its objectives and encountered unexpected resistance, mainly from elements of the 9th SS Panzer Division and the 10th SS Panzer Division. A small force managed to reach the Arnhem road bridge, but the advance of the main body of the division was halted on the outskirts of the town. As for XXX Corps, it was forced into a struggle at Nijmegen, and advance north was delayed. As a result, the British airborne troops were not relieved as scheduled. After four days, the small British force at the bridge was overwhelmed and the rest of the division trapped in a small pocket north of the river. Lacking reinforcement and resupply, remnants of the 1st Airborne Division, after nine days of fighting, were withdrawn in Operation Berlin. Without secure bridges over the Nederrijn and the front line stabilized south of Arnhem, the Allies were unable to advance further. The 1st Airborne Division lost almost three quarters of its strength. Battered and tattered, the division was not sent into combat again.

Concern over a Potential Panicked Response by Ukraine’s Neighbors

The Kremlin may have been uneasy about how the US, its NATO allies, and the EU would respond militarily if Russian troops landed in Western Ukraine, “danger close” to the Polish border. Even more, it may have been the case that  they were concerned political leaders in Poland, potentially panicked at observing Russian forces landing practically on its border, might have responded first by ordering Polish Armed Forces to unilaterally drive inside Ukraine border, take positions inside its Western region, and then refer the matter to NATO. Such hypothetical unilateral action might have included an armored and mechanized drive into Ukraine to create a buffer, and landing troops on border crossings, highways, train junctions, road intersections, bridges, heights, airports, military airfields, and so on before they would all fall completely into Russian Federation hands. To that extent, they would likely go after the same targets in Ukraine that the Russian Federation Armed Forces would likely want. In the worst case scenario, Polish troops could have fired heavy artillery and launched missile attacks on targets to deter air landings by the Russian Federation Armed Forces.

Where Was the Russian Air Force?

Concerning Voyska Vozdushno-Kosmicheskoy Oborony, Rossijskoj Federacii (the Russian Federation Aerospace Defense Forces, hereinafter referred to as the Russian Federation Aerospace Forces), particularly the Voenno-Vozdushnye Sily Rossii, (the Russian Air Force) element, one might have presumed commanders and planners of the Russian Federation Aerospace Forces would have organized air power assets of the force to strike strategically and tactically to make a positive difference in the war effort. Strategically, disrupting its supply of weapons from external sources and destroying Ukraine’s ability to construct weapons would likely be a priority. Tactically, a priority would likely be coordinating efforts by Russian Air Force assets with ground forces as they advanced. One might have expected that with the support of the Russian Federation’s ISR capabilities, a plan would have been in prepared for the Russian Air Force to shut the door on the transport of supplies through Ukraine, interdicting supply lines as fast as they were organized. However, that has not been the case. As the situation stands in the Ukraine campaign, the Russian Air Force has been near nonexistent relative to its size, supposed power, and the expectations of military analysts worldwide. Its best fighters and fighter-bombers have been regularly blasted out of the skies by the Ukrainian Armed Forces using both pricey sophisticated air defense weapons systems provided to Kyiv by Western powers as well as javelins and stingers, shoulder fired rockets operated by individual soldiers in the field. In response to the Ukrainian air defense threat, Russian Federation warplanes are not evading by flying sorties at 15,000 to 20,000 feet as they had over Syria. Russian aircraft are often remaining above Russian airspace and firing air launched cruise missiles into Ukraine. Since aircrews cannot identify targets across the border, airstrikes are made in areas where air intelligence reports the enemy is located. In attacking urban centers, that will always result in collateral damage in the form of civilian deaths and injury and the destruction of nonmilitary structures.

The Unwillingness to Speak Truth to Power

Commanders in all branches of the Russian Federation Armed Forces are surely unwilling to speak truth to power and inform Putin of what needed to be done in the West and that they were uncertain that their forces could achieve such an objective. One might imagine that suffering Putin’s coup de gueule would be the least of their worries. It has been a symptom common among those in service of authoritarian regimes throughout history. Skilled commanders are eventually bled dry of their strength to speak out about ill-laid military plans conjured in the minds of tyrannical leaders who are convinced of the certitude of their ideas. Many have been willing to bring reprisals against those commanders, even their best, who, for the sake of the forces they command and country, might step forward to disagree with them. It causes greatcharlie to cast its mind back to the 1981 pop song Der Kommisar“, essentially a scare story originally performed in both German and English by the Austrian artist Falco (Johann Hölzel). In the penultimate chorus of the English version, are the lyrics: “Don’t turn around, wa-uh-oh (yeah-yeah) / Der Kommissar’s in town, wa-uh-oh / He’s got the power and you’re so weak / And your frustration will not let you speak / La la la la la la.”

Commanders in all branches of the Russian Federation Armed Forces were surely unwilling to speak truth to power and inform Putin of what needed to be done in Western Ukraine and that they were uncertain that their forces could achieve such an objective. One might imagine that suffering Putin’s coup de gueule would be the least of their worries. This has been a symptom common among those in service of authoritarian regimes throughout history. Skilled commanders are eventually bled dry of their strength to speak out about ill-laid military plans conjured in the minds of tyrannical leaders who are convinced of the certitude of their ideas. Many of those leadsrs have been willing to bring reprisals against those commanders, even their best, who, for the sake of the forces they command and country, have stepped forward to disagree with them.

The Military Assistance Misread

On a more political level, perhaps Putin, his Security Council, and the Russian Federation General Staff were certainly completely wrong in their most likely conclusions about the degree of assistance the West would provide, what type of weapons and the impact they would have on the battlefield. The US has committed billions of dollars in security assistance to Ukraine since February 24, 2022. Relative to what the Ukrainians would eventually receive, what they had been provided to that point would hardly have been viewed as impressive by the Russian Federation General Staff.

Much as it had been planned by the US during the days of the Cold War, much of what would be used to repel a Warsaw Pact rampage through Western Europe would be taken from prepositioned stocks of supplies or they would be flown in and shipped in. During the Cold War, from 1969 to 1993, the annual REFORGER (Return of Forces to Germany) Exercises rehearsed that reinforcement and resupply to a great degree. It seems apparent now that thinking along the same vein in the Pentagon may have driven planning for the support of Ukraine in event of an attack. This idea would very likely be a kick-in-the-head to Russian Federation Armed Forces commanders and planners who had not have recognized the parallels as yet, never foresaw the possibility that the US and its NATO allies would essentially come at them, via the Ukrainians, in a similar way.. How obvious it all might seem now.

A Miscalculation on the Political Will of the West

Perchance Putin, his Security Council, and the Russian Federation General Staff miscalculated with regard to the degree of political will in the administration of US President Joe Biden and the US Congress to support Ukraine. Mixed messages regarding US commitment. The “No US boots on the ground” talk came a tad too early perhaps. It probably was music to ears in Moscow. It may have very well created the impression the US was pulling away or could potentially abandon Kyiv if Russia invaded. It may reasonably seem a bit of an overreach to impute to Putin and his acolytes, but one would only need to look at the varying degrees of overreach they have demonstrated with regard to the Ukraine matter.

Maybe Putin and his advisers concluded that European countries could become rankled enough to lend military support to Ukraine but perhaps they were a bit better than less concerned with the quality and quantity of their potential assistance and financial giving. They would expect the US to have the matter well-covered.

Perhaps they considered that Western European resolve to be engaged robustly, wholeheartedly in Ukraine would hinge on the resolve of the US to back its NATO allies. As for the US, much as alluded to earlier, its resolve would hinge on the success or failure of Russian forces in Ukraine, which really meant the capabilities demonstrated by the Ukrainian Armed Forces. Thereby, as long as the Russian Federation Armed Forces performed well, robust military assistance beyond javelins and stingers would not be sent into Ukraine. (Based on that suspected line of thought, one might compare how that situation for Ukraine as the invasion got underway to a degree paralleled, mutatis mutandis, the situation of the fledgling US in 1777. The decisive Battle of Saratoga in which the Continental Army defeated the British Army gave the French government the confidence to sign treaties of alliance and trade with the US government and joined its war against Great Britain.  Both countries agreed to fight the war until the US was truly independent, and neither would agree to a separate peace.)

As the efforts of the Russian Federation Armed Forces became desultory, ineffective, and proved surprisingly lacking at Kyiv and Kharkiv, it became easier for the US to give more to an Ukrainian cause with the real potential for victory and convince other NATO Allies to do the same albeit to far lesser degree. Panicked efforts by Kyiv to muster support and acquire weapons were practically wasteful as they clearly had the matter covered.

Misperceptions on Zelensky: A Force To Be Reckoned With

Of likely concern for Putin’s advisers, if not Putin, was surely Ukrainian President Volodymyr Zelensky who in the months before the invasion was already burning a bit brighter than the Kremlin expected. There were hints that he potentially could display all the qualities ascribed to great leaders. Doubtlessly, it was hoped in the Kremlin that Zelensky would find himself cutting a figure not unlike Felicia Hemans’ “Casabianca” (1826), crying out for an answer, in Zelensky’s case from Washington, that would never come and his world would go up in flames. As it was, Zelensky proved to be a lion of a man, stalwart of the Ukrainian cause, and a force to be reckoned with once the Russian Federation’s special military operation began. Western government officials and news media commentators alike would view Zelensky as having galvanized the Ukrainian people to resist Russia’s effort to swallow up their country. Zelensky also impressed with his entreaties to the world to come to the aid of his fellow countrymen in the best ways that they could. One might safely assume that his efforts influenced how countries with the wherewithal to respond to the Ukraine in its time of need, worked with him, and rapidly developed and implemented plans to provide considerable support for his country. Indeed, such positive perceptions of Zelensky, his impact, helped to attract aid groups, humanitarian volunteers, foreign fighters, helpful weapons, and financial resources to support Ukraine’s cause.

Ukrainian artillerymen fire US made and gifted M142 HIMARS (High Mobility Artillery Rocket System) (above) at Russian Federation forces holding Ukrainian territory. On a more political level, perhaps Putin, his Security Council, and the Russian Federation General Staff were certainly completely wrong in their most likely conclusions about the degree of assistance the West would provide, what type of weapons and the impact they would have on the battlefield. The US has committed billions of dollars in security assistance to Ukraine since February 24, 2022. Relative to what the Ukrainians would eventually receive, what they had been provided to that point could hardly have been perceived as impressive by the Russian Federation General Staff. Much as it had been planned by the US during the days of the Cold War, much of what would be used to repel a Warsaw Pact rampage through Western Europe would be taken from prepositioned stocks of supplies or would be flown in and shipped in. The annual Reforger (Return of Forces to Germany) Exercises rehearsed that reinforcement and resupply to some degree. It seems apparent now that thinking along the same vein in the Pentagon may have driven planning for the support of Ukraine in event of an attack.

The Distorting impact of Putin’s Kyiv Obsession

Surely, Putin’s singular emotional wants and wishes beyond what was militarily and strategically logical what drove the planning of the operation or was it formulated to the best of the abilities of trained, experienced, informed military officers in the Russian Federation Armed Forces. To Putin, everything about the government in Kyiv was anathema. Recall as aforementioned that in a very perplexing way, Putin stated in his appeal to the Ukrainian Armed Forces in his February 24, 2022 broadcast: “You swore the oath of allegiance to the Ukrainian people and not to the junta, the people’s adversary which is plundering Ukraine and humiliating the Ukrainian people.” He would go on to say: “I want to emphasize again that all responsibility for the possible bloodshed will lie fully and wholly with the ruling Ukrainian regime.” The indication s and implications of such statement are that Kyiv was indeed an obsession. To that extent, among those wants and wishes was toppling the government in Kyiv. Accomplishing that apparently became a priority with Kyiv in the planning of the invasion or whatever sufficed for its planning that distorted the picture Putin, his Security Council, and the Russian Federation General Staff of the battlespace. When examined in the context of this situation, how apposite the second quatrain of William Shakespeare’s Sonnet 116 becomes: “What wretched errors hath my heart commited, / Whilst it had thought itself so blessed never! / How hath mine eyes out of their spheres been fitted / In the distraction of this madding fever!”

If one might imagine Putin was a bit more pragmatic in his thinking and approach on Kyiv, it might be believed Putin may have thought the quickest road to victory was to cut off the head, the government in Kyiv and the command and control Ukrainian Armed Forces General Staff, from their forces in the field. If that could be achieved, Putin likely believed the mass surrender of Ukrainian troops in the field would come next. If that was the case, and what has transpired in Ukraine evinces to some degree that it was, then quite a bit of creative thinking was clearly involved in the invasion’s planning. 

However, by the time of the invasion, the government in Kyiv under Zelensky was well-tied in with its Western supporters. Thorough plans to provide escalating levels of military and financial assistance were surely already in place. Even though Zelensky initially displayed a great degree of uneasiness concerning the way in which the needs of Ukraine in the crisis would be met, it might be the case that what has come Ukraine’s way has far exceeded what he might have been reasonably expected. The shortsightedness apparent in thinking that the Kyiv government could be decapitated is stark. An informed guess is that the Ukraine enterprise was not hashed out with the best foreign and national security thinkers in Russia. One would get the idea it all was the result of the thinking of one man, certain of its roundness. Such impetuous schemes and boldness are at first sight alluring, but are difficult to handle, and in the end result in disaster.

Perhaps the real problem for Putin was not just that he relied on fortune, but was driven by blind rage and to a further extent blind ambition. Ukraine was one the bigger pieces he needed to pull together a respectable number of former republics into some simulacrum of the Soviet Union. While it may seem daylight madness for the reasonable to attempt that, for Putin, it makes perfect sense.

The Distraction of Covetous Thoughts?

As discussed in greatcharlie’s May 30, 2022 post entitled, “Putin the Protector of the Russian People or the Despoiler of Ukrainian Resources: A Look at War Causation and Russian Military Priorities in Ukraine”, long before he became the legendary Russian President that he is today, Putin was a doctoral candidate at Leningrad State University (now the University of St. Petersburg.) it was at the very end of his KGB service. (A fuller discussion of that period of Putin’s life can be found in greatcharlie’s March 31, 2017 post entitled “Book Review: Vladimir Putin, First Person: An Astonishingly Frank Self-Portrait by Russia’s President (Public Affairs, 2000)). The rector at the St. Petersburg State Mining University as of this writing, Vladimir Litvinenko, chaired the committee that awarded Russian President Vladimir Putin his doctorate in Economics in 1997. He recently stated that Putin’s thesis was titled “Strategic Planning of the Reproduction of the Mineral Resource Base of a Region Under Conditions of the Formation of Market Relations.” Putin’s economic studies, at what was then Leningrad State University, were most likely heavily doused in Marxian theory. Even more pertinent here, his research made him quite knowledgeable about the resources of countries that were formerly republics of the erstwhile Soviet Union. He would be very aware of Ukraine’s wealth in minerals, particularly in the eastern and southeastern regions. Indeed, Ukraine has a large supply of many valuable mineral and raw material resources. Ukraine in fact holds approximately 5 percent of the world’s mineral resources. Its significant mineral resources include: iron ore, coal, manganese, uranium ore, natural gas, oil, salt, sulfur, graphite, titanium, magnesium, kaolin, nickel, mercury. As for stocks of iron, manganese, titanium and uranium ore Ukraine is ranked first among European countries. As for mercury ore reserves, it is second only to Spain. Attendant to capturing sovereign territory in Ukraine, much as he grabbed Crimea eight year before, Putin may have wanted possession of its supply of many valuable mineral and raw material resources. Thinking in that direction may also have distorted his picture of what would be most important in invading Ukraine successfully. 

If this was Putin’s thinking and actions on this matter, at a more detailed level than discussed earlier, it would very much mirror that of Hitler during Nazi Germany’s invasion of the Soviet Union. As explained by the Imperial War Museum, industrialists in Germany most likely influenced Hitler’s decision to seize the Southern Caucasus in the Soviet Union and Stalingrad despite the concerns and entreaties of Oberkommando des Heeres with undertaking an operation of such distance from where the German Army was situated. As aforementioned, Operation Barbarossa, launched in June 1941, failed to achieve Hitler’s objective of decisively defeating the Soviet Union in a single campaign. German forces managed to occupy vast swathes of Soviet territory and industry. However, the audacious invasion finally ground to a halt in December 1941 on the forested outskirts of Moscow, the exhausted German Army stabilized its winter front in a line running roughly from Leningrad in the north to Rostov in the south. The strain of the harsh winter campaign upon the ill-prepared Wehrmacht, as well as the severe strain placed on the Luftwaffe in its prolonged efforts to air-supply the army’s string of city-bastions along the front, was tremendous. The Germans suffered a staggering 850,000 casualties. Interestingly, despite such considerable setbacks, the Germans believed the war was still going fairly well.

However, the following year, Hitler decided to go on the offensive. A decision by Hitler to launch a campaign in the Southern Caucasus region, south of the German front was spurred on by flawed information provided to him by economic advisers. They told Hitler that Germany would be incapable of sustaining the war without the resources in the Caucasus. North of the mountains was a center of agricultural production, which also held significant coal and metal reserves; to the south, was the region of Transcaucasia, a densely populated industrial center which produced some eighty percent of the Soviet Union’s annual oil production.Responsive to the wishes of the political leadership, by February 1942, the Oberkommando des Heeres was planning an offensive in the Caucasus region. 

On April 5, 1942, Hitler issued  Führerbefehle Nr. 41 (Fűhrer Directive No. 41), laying out the basic plan for the new offensive in the Soviet Union. The new plan would become known as Fall Blau (Case Blue). The main objectives were the major oilfields in the Caucasus and Transcaucasia: Maikop, Grozny and Baku. Senior German commanders were concerned about undertaking such a deep thrust into the opponent’s territory, fearing for the safety of their flank. Hitler’s remedy was to include in the plan the occupation of Stalingrad by Germany’s Italian, Hungarian and Romanian allies. The city would initially be taken by Germans. They would also establish a defensive line along the Don River and Volga River, which would be taken over by allies, too. Capturing Stalingrad would have the additional benefit of blocking all enemy traffic on the Volga, a crucial transport artery. To Hitler, the operation, which he deemed to be “of limited scope,” made perfect sense. Events proved otherwise.

A postage stamp from the erstwhile Deutsche Democratische Republik (German Democratic Republic, also known as the GDR or East Germany) circa 1963, that includes portraits of the Prussian military leader August Neidhardt von Gneisenau (left), Prussian field marshal Gebhard Leberecht von Blücher (right). In war, the value of a reliable, knowledgeable, skilled, and open-minded adviser who truly understands the concept and intent of his commander, cannot be underestimated. A model for interaction between a political leader or military commander with his advisers was the one between the renowned 18th century Prussian Army Marshal Gebhard Leberecht von Blücher with his chief of staff General August Neidhardt von Gneisenau. In Clausewitz: (Scarborough, 1979), author Roger Parkinson quotes von Blücher with regard to his relationship with his brilliant chief of staff as follows: “Gneisenau, being my chief of staff and very reliable, reports to me on the manoeuvres that are to be executed and the marches that are to be performed. Once convinced that he is right, I drive my troops through hell towards the goal and never stop until the desire goal has been accomplished–yes, even though the officers trained in the old school may pout and complain and all but mutiny.” Regarding an offer for von Blücher to receive an honorary degree at Oxford University following the Napoleonic War, Parkinson quotes him as saying: “Well, if I am to become a doctor, you must at least make Gneisenau an apothecary, for we two belong together always.”

Eyes Wide Shut

“A lion does not lose sleep over the opinion of sheep. ” is a quote often attributed to others, but it is very likely the words of Abū ʿAbdullāh Muhammad ibn Idrīs al-Shāfiʿī (28 August 767 — 19 January 820) was a Palestinian-Arab Muslim theologian, writer, and scholar, who was the first contributor of the principles of Islamic jurisprudence (Uṣūl al-fiqh). Often referred to as ‘Shaykh al-Islām’, al-Shāfi‘ī was one of the four great Imams, whose legacy on juridical matters and teaching eventually led to the Shafi’i school of fiqh (or Madh’hab). In his thoughts, Putin is surely completely alone. He appears indifferent to whether the rest of the world sees him as a bit out of touch or strange, apart from everything else. Outside of his super fans in Russia–many of whom have been unfortunate enough to meet their end, so very young, on fields, hills, and woods in Ukraine as questionably trained conscripts–certainly does not appear gallant or chivalrous. Putin is holding the course on Ukraine, not yielding in any way that might allow for authentic and substantive negotiations to end the conflict to begin. There still does not appear to be a line of talk available to even his closest advisers that could put a different complexion on the matter.

In war, the value of a reliable, knowledgeable, skilled, and open-minded adviser who truly understands the concept and intent of his commander, cannot be underestimated. A model for interaction between a political leader or military commander with advisers was the one between the renowned 18th century Prussian Army Marshal Gebhard Leberecht von Blücher with his chief of staff Prussian Army General August Neidhardt von Gneisenau. In Clausewitz: (Scarborough, 1979), author Roger Parkinson quotes von Blücher with regard to his relationship with his brilliant chief of staff as follows: “Gneisenau, being my chief of staff and very reliable, reports to me on the manoeuvres that are to be executed and the marches that are to be performed. Once convinced that he is right, I drive my troops through hell towards the goal and never stop until the desire goal has been accomplished–yes, even though the officers trained in the old school may pout and complain and all but mutiny.” Regarding an offer for von Blücher to receive an honorary degree at Oxford University following the Napoleonic War, Parkinson quotes him as saying: “Well, if I am to become a doctor, you must at least make Gneisenau an apothecary, for we two belong together always.”

An informed guess by greatcharlie is what has likely been a reliable intuition that had served him well along the way and allowed him a leg-up in giving subjects light were darkened with regarding parsing out the many aspects of this massive enterprise in Ukraine. Imagining Putin with his mind set on invading Ukraine come hell or high-water and refusing hear any suggestion that he delay until Russian forces were fully prepared to act, maximize every advantage and exploit the liabilities of Ukrainian forces to the fullest extent, and cope with all contingencies, if one might dare discuss such with him as noted earlier. 

One can only imagine Putin’s outward attitude and behavior at that time. The thought of it all curiously reminds greatcharlie a song sung by the renowned comic, Groucho Marx in the comedy film “Horse Feathers” (1932), not that there is anything remotely humorous about any aspect of the Ukraine War. When Marx’s  character, Professor Quincy Adams Wagstaff, is made the new head of Huxley College, and asked to offer some suggestions for his administration, the first verse of his musical response was: “I don’t know what they have to say / It makes no difference anyway / Whatever it is, I’m against it / No matter what it is or who commenced it / I’m against it.”

Putin Was Blinded by Rage

A dislike of Biden administration members inflamed the ardor of Putin and closest acolytes and they became determined to hurt Kyiv for siding with them. Imagining Putin’s mindset, he likely firmly believed before the invasion of Ukraine that he had a good understanding of the way many senior foreign and national security policy officials in the administration of US President Joe Biden, many of whom had held senior posts in the Obama administration, would respond to a move toward Ukraine. As discussed in greatcharlie’s January 25, 2022 post, Putin had experienced considerable dissatisfaction and disappointment in his dealing with Obama administration officials, particularly on Ukraine. As he may have perceived their actions in the past, they found it rather piquant to interact with him as if he were a lesser party, and given his positions and concerns no consideration. He likely believed they saw him as undeserving of respect. Communications were condescending, actions were often insulting. In an explosion of aggression, in part a response to his treatment, he grabbed Crimea with military force and fomented civil war in the Donbas. He engaged in other destabilizing efforts. Apparently, he was not completely satisfied with those actions, and held in his mind the idea of doing more. Seeing the appointment of many of those same officials in even higher posts in the Biden administration, most likely inflamed his sense with ardor to lash out violently. Everything those officials did in the Biden administration, Putin surely viewed with their past actions firmly in mind.

One might theorize that although he could not conventionally strike directly at those officials, Putin could reach the Zelensky government, members of which he may view as something worse than traitorous. He could well imagine the the fall of the Zelensky government would beset the Biden administration officials that he despised with a sense of loss and failure. Secondly, he would hope to cause torment and anguish among their “Ukrainian followers”. To that extent, perhaps it is not too fanciful to imagine that given current attitudes and behaviors of Putin, the invasion of Ukraine may also have been in part an opportunity for Putin to have a return engagement, a rematch, with former senior Obama administration officials serving in the Biden administration and settle an old score. 

Putin (seated left) during a Russian Federation Security Council meeting just days before the special military operation was launched. A dislike of senior members of the administration of US President Joe Biden likely inflamed the ardor of Putin and closest acolytes and they became determined to hurt Kyiv for siding with them. Imagining Putin’s mindset, he likely firmly believed before the invasion of Ukraine that he had a good understanding of the way many senior foreign and national security policy officials in the Biden administration, many of whom had held senior posts in the administration of US President Barack Obama, would respond to a move toward Ukraine. One might theorize that although Putin could not conventionally strike directly at those officials, he could reach the Zelensky’s government, members of which he may view as something akin to “traitorous”. He knew what anguish and loss the fall of Zelensky’s government would cause those US officials and secondly, their “Ukrainian followers”. To that extent, perhaps it is not too fanciful to imagine that given current attitudes and behaviors of Putin, the invasion of Ukraine may also have been in part an opportunity for Putin to have a return engagement, a rematch, with former senior Obama administration officials in the Biden administration and settle a score.

The Way Forward

It certainly appears to many reasonable people around the world since the Ukraine War began that currently there is a dearth of rational thinkers in the Kremlin. As is so often the case in the history of warfare, perception, better still, misperception, and not reality, drove the decisionmaking of Russian Federation Armed Forces commanders and war planners. Intriguingly, in parsing out the possibilities of this pivotal moment in the war’s planning, it would seem Putin’s special military operation did not necessarily have to turn out as it has.

Too many human lives have been lost in this war. The common wisdom is that the war never should have transpired, and no one should have died. No amount of gain in Ukraine would match the degree of loss in the cold terms of blood and treasure by Russia which started the war. Nevertheless, it will likely go on and plenty more dying will be done.

Conforming to the concept and intent of their political leader, Putin, senior commanders of the Russian Federation Armed Forces mistakenly thought that the campaign would be a short one, and that the Ukrainians would give in after suffering the shock of massive initial defeats. Being responsive to the concept and intent of their political leadership was, by their training and oath, the correct thing to do, but the very wrong thing to do at the same time. Res ipsa loquitur! Perhaps the only real hope for its end on the battlefield is Ukraine’s capture of every bit of sovereign territory, to include Crimea. As mentioned here, that is within the realm of possibility. Yet, Putin would hardly find that outcome satisfactory. If a satisfactory solution cannot be found for both sides on Ukraine, there will be good reason for the world to fear the worst from him. In the cavernous assembly halls of the Kremlin where Putin speaks before top officials of his government, the Russian Federation Duma, other key political leaders at the federal provincial and local levels–nationalists, ultranationalists, and Communists–prominent supporters of the United Russia Party, and business leaders, one will not spy happy faces, filled with optimism over the future ahead. There are mainly the morose visages of people who likely whisper among themselves that the genuine end to everything may be near. Perhaps Putin is equal to his rhetoric, and Russian Federation ICBM’s will make their way out of their kennels. His supporters would likely believe that. A solution to the Ukraine War must be found soon. Utere, non numera. (Use the hours, do not count them.)

Brief Meditations on the Role of Deception, Deceit, and Delinquency in the Planning, Preparations, and Prosecution of Russia’s Invasion of Ukraine

A T80BV tank of the Russian Naval Troops, featuring the distinctive “Z” marking and explosive armor (above), sits on the side of a road after being destroyed by Ukrainian forces in the Luhansk province in February 2022. Due to his confidence in the capabilities of his Russia’s armed forces and intelligence services, Putin unlikely believed Ukrainian forces would pose too much a problem. In a pinch, Putin perhaps believed there might be ingenious maneuvers and techniques that would see Russian forces through and thereby lead Russia to inevitable success. That would hardly be a reasonable schema, and indeed, perhaps the last thing one might consider. However, it may be the case that Putin was not thinking or acting reasonably before the invasion and perhaps he hoped to be covered by some miracle. Through this essay, greatcharlie has sought to briefly consider the thinking within, and actions directed from the top floors of the headquarters of the Russian Federation intelligence services and the general staff of the armed forces before the invasion and during to a degree. It highlights a few of the points at which leaders of those national security bureaucracies served Putin poorly.

While Russian Federation President Vladimir Putin’s February 24, 2022 televised address made just hours before the invasion of Ukraine was not a comprehensive expression of his ideas and theories to include subjects neo-Nazis and Ukrainian sovereignty called attention to here, although in declaring the right to move Russian forces into Ukraine, he plainly indicated that he did not recognize the sovereign rights of the country. He put before his audience a review of his sense of the threat to Russia from the West, more specifically the threat from the US. Looking back, one might argue that Putin cut a foolish figure, speaking so boldly about the actions and intentions of Russian forces and the notion that Ukrainian forces should lay down their arms. 

Putin surely had too much imagination to expect the Ukrainians not to respond to a Russian invasion the second time around. Certainly, Putin learned long ago that there are patterns one can discern that establish order in the human mind. Awareness of that should have factored into calculations on moving against Ukraine. Placidity should hardly have been expected of Kyiv by anyone thinking clearly in the Kremlin. Allowing Russia to walk into Ukraine the first time in 2014 doubtlessly had tormented leaders in Kyiv since, believing it was a gross error. For Kyiv to allow Russia to walk into Ukraine a second time would surely have been an historical act of gross negligence. Putin was always concerned with Western influence on Ukraine in essays, speeches, and interviews. Perhaps it could be said that Putin had too little imagination to recognize how much the West was involved in correctly preparing the Ukrainians for the possibility of a Russian invasion. In reality, the influence that the West had on Ukraine, something he was so concerned with, likely turned out be far greater than he ever imagined.

In setting unrealistic expectations, one sets oneself up for hurt. Never choose illusion over fact. Illusions disintegrate when confronted by reality, confronted by truth. A leader with unrealistic expectations regarding an enterprise can often be the cause of problems from the start. Presumably due to his confidence in the capabilities of Russia’s armed forces and intelligence services, Putin could not imagine Ukraine would pose too much a problem. In a pinch, Putin perhaps believed there might be ingenious maneuvers and techniques that would see Russian forces through and thus lead Russia to inevitable success. That is hardly a schema, and indeed, perhaps the last thing one might reasonably consider. However, it may be the case that Putin was not thinking or acting reasonably before the invasion. What proved to be truer than anything else was the aphorism that anything which can go wrong will go wrong. That is especially true when the lack of preparedness, readiness, and awareness are stark factors in an undertaking. To bend, to retreat back away from the matter of Ukraine is impossible.

Some questions do not have available answers, and one must learn to live with that. Through this essay, greatcharlie has sought to briefly consider the thinking within, and actions directed from, the top floors of the headquarters of the Russian Federation intelligence services and the general staff of the armed forces before the invasion and somewhat during. It highlights a few of the points at which leaders of those national security bureaucracies served Putin poorly. It hopefully provides readers with insights on what may be the tone within the meeting rooms of those bureaucracies and thinking somewhere deep inside top officials. Many of the latest public sources on prewar thinking in Moscow have been utilized for the discussion. However, much within the essay has been conceptualized in the abstract. In public statements, optimism, the best and most available elixir for defeatism, has been employed liberally. Yet, presumably, senior commanders of Russia’s armed forces and executives in the intelligence services concerned may be feeling a bit stuck and stagmating, clutching at straws, and listening to the wind. Given all that has transpired, perhaps those feelings are well-earned. Some current and former military commanders and military analysts in the West observing Russia’s situation must be able to appreciate the predicament of Russian officials given the experience their armies and national security bureaucracies recently in the Middle East and Southwest Asia. Omnia præsumuntur rite et solenniter esse acta. (All things are presumed to have been done duly and in the usual manner.)

Putin (above) in the Kremlin attending a meeting with his advisers. Putin, the final authority on all matters that concerned the invasion, the ultimate decisionmaker, believed assessments on conditions in Ukraine produced by the Russian intelligence services, Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU, and Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB augured well with regard to taking military action. Perchance, he never thought that much of it was faulty, perhaps even rubbish.

Blindness Bordering on Madness

In The Civil War, Book III, 68, the Roman Emperor Gaius Julius Caesar writes: Sed fortuna, quae plurimum potest cum in reliquis rebus tum praecipue in bello, parvis momentis magnas rerum commutationes efficit; ut tum accidit. (Fortune, which has a great deal of power in other matters but especially in war, can bring about great changes in a situation through very slight forces.) The undeniably disastrous initial results of Russia’s invasion of Ukraine appear to stem from challenges faced in the planning of the “special military operation.” As noted earlier, Putin, the final authority on all matters that concerned the invasion, the ultimate decisionmaker, believed assessments on conditions in Ukraine produced by the Russian intelligence services, Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU, and Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB augured well with regard to taking military action. He never thought that much of it was faulty, perhaps even rubbish. As he should have been aware, in the intelligence industry, the only truth unfortunately is that which those at the top declare it to be.

As for his military forces, Putin surely felt they were well-trained and well-equipped to bring vistory. To be fair, even to Putin, in practical terms, he mainly had the well-choreographed Zapad military and naval exercises to use as a measure of the Russian Federation armed forces effectiveness. The scenarios rehearsed in those exercises were apparently poor preparation for the invasion at hand. The scenarios rehearsed in those exercises were apparently poor preparation for the invasion at hand. There is also the issue that the Zapad exercises were not exactly all that they were made to appear to be in terms of demonstrating their true strength and capabilities of the Russian armed forces, as well as the possibilities for their use. The truth was likely concealed from Putin.

For his own part, he indubitably sought to glean as much as he could about Western actions and intentions by interacting with foreign leaders and officials, and applying that to calculations on probable responses to an invasion of Ukraine. (Without any intention of finger pointing, greatcharlie can only imagine what may have been said in camera and hope nothing uttered off-handedly had no influence in the wrong direction.) Putin was able to not only learn more about but confirm his understanding of what cards the West was holding to use against Russia in case he moved ahead with the invasion. He likely believed at that time that his intelligence services had provided him with a picture of Ukraine that indicated he could proceed with confidence and some assurance. The variable of intelligence seems to have been the weakest link of the chain given ceratin revelations, some discussed here.

The indications and implications of it all for Putin were that he could get all that he wanted. Putin could deal a devastating blow to what he perceived to be the expansionist plans of the US and West.  As important perchance would be having the opportunity to act as a sort of avenging angel of ethnic Russians in Ukraine, a protector of the Russian Orthodox church–a holy warrior, a defender the Russian people and all that is Russian. It is possible that Putin genuinely believes he serves in that role. Putin was so comfortable with the whole matter to the extent he left it to the world to see who he is and what he is doing, and how others might feel or respond was either of no concern or of little real interest to him.

Assumedly, the compounded impact of the intelligence failures and military blunders has doubtlessly had a chilling effect on the thinking of Gospodin Vladimir Vladimirovich with respect to political stimmung at home beyond the Ukraine matter. That likely in turn has added to Western anxieties concerning his mental state.

Putin (left) observes Zapad Exercise alongside Chief of the General Staff of the Armed Forces of the Russian Federation, General of the Army Valery Gerasimov (right). As for Russia’s military and naval forces, Putin surely felt they were well-trained and well-equipped to bring vistory. To be fair to Putin, in practical terms, he mainly had the well-choreographed Zapad military and naval exercises to use as a measure of the Russian Federation armed forces’ effectiveness. The scenarios rehearsed in those exercises were apparently poor preparation for the invasion at hand. There is also the issue that the Zapad exercises were not exactly all that they were made to appear to be in terms of demonstrating their true strength and capabilities of the Russian armed forces, as well as the possibilities for their use.

The Intelligence Services

Qui ipse si sapiens prodesse non quit, nequiquam sapit. (A wise man whose wisdom does not serve him is wise in vain.) Perhaps Putin would been better of seeking assistance from an intuitive empath, who, allegedly with confidence bolstered by assistance from spirits, likely would have been better able to predict the response of the Ukrainians to a Russian invasion. Putin is far more than just familiar with the workings of Russian’s intelligence services. It is well-known that he achieved the rank of Lieutenant Colonel in the in the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. Some commentators and analysts prefer to emphasize that his behavior is reflective of the nature of that erstwhile organization’s cold-blooded reputation, brutish methods, and the sinister mindset of its leadership. He was appointed by President Boris Yeltsin as director of the FSB, during which time he reorganized it and dismissed several top personnel. Yet, knowing that problems can exist not only with the behavior of personnel as well as the leadership of the intelligence services, and knowing that reporting from them should be examined with a fine-tooth comb, especially concerning a matter of utmost importance as Ukraine, he seemed to proceed, accepting whatever was handed to him with a blindness that bordered on madness. Whatever his inner voice may have saying, he closed his ear to it. 

Of course, there is the possibility that Putin, knowing what he knows, experienced as he is, wanted to be deceived because he so badly wanted to invade Ukraine and needed to show his decision could not be viewed as wreckless, but rather based in reason that would be generally accepted. Conceivably, Putin may have recognized that there would be no need for him to potentially light the fuse of a figurative political bomb by trying to explain why he took the risk of invading Ukraine knowing Russian forces might face considerable challenges where there were self-crafted patsys in the intelligence services that he could “learn” to be the cause for his “miscalculation.” A most trusted aviser could serve to uncover the malfeasance and identify the patsys involved and present the wrongdoer and the report of their crimes to Putin all tied with a neat bow. The many aspects that could potentially be part of such a line of analysis that cannot be broached in this brief essay. Indeed, greatcharlie is not absolutely certain it possesses the faculty to properly parse out, in the abstract, all of intricacies and psychological angles involved in the round. (Sometimes that sort of tricky approach suggested here works, sometimes it does not. Vice-Admiral Horatio Nelson, 1st Viscount Nelson, 1st Duke of Bronte, KB, also known simply as Admiral Nelson, the renowned 18th century British flag officer in the Royal Navy is best known for his victory at the Battle of the Trafalgar in 1805. However, he became a national hero long before then due to his prowess as a naval tactician. In 1801, Nelson destroyed the Danish Navy at the Battle of Copenhagen. During the battle he was sent a signal to break off action by the Admiral Sir Hyde Parker. Nelson supposedly put his telescope to his blind eye and told to his Flag Lieutenant, “You know Foley I have only one eye. I have a right to be blind sometimes. I really do not see the signal.” It is unlikely Nelson had a plan for covering himself in case his bit of jiggery-pokery failed.)

When directed by Putin to place greater emphasis on Ukraine, it may very well have been the case that intelligence collected prior to the capture of Crimea in March 2014 was recycled and used as a yardstick to parse out falsehoods on Ukraine. It would not be the first time that a sophisticated intelligence service of an advanced industrialized power engaged in such behavior and subsequently led to a large-scale military action that might have be averted otherwise. That is a hard saying. Perchance many other top officials in the Russian intelligence services never imagined Putin would invade Ukraine full-scale. As is the case, such ignorance often dissolves into tragedy.

Je m’en fiche! When asked to provide assessments on the situation there, they apparently sought to simply placate Putin, responding to his sentiments on Ukraine. The benefit of taking such a risk would be to stay in his good graces. Thus, they substituted what they understood he believed to be true feeling Putin would brook anything else. It is possible that some took this step not out of delicacy toward him but rather due to contempt. To reach a position of such influence in Putin’s government, one would image such a flaw in character would have been twinkled out much earlier. Apparently, none of the intelligence services presented anything to contradict that information to the extent that it caused Putin any pause. Their assessments were illusions without substance, appearances only. The result was a catastrophe for all involved. The problem can by no means eased out of the way. There was no possibility to put the toothpaste back into the ttube. Those left at the top of their respective intelligence services know they serve at the pleasure of Putin and his whims. The best way for them to survive at this point is to look good, focus on the US, find moles, leaks, and seek help that might make a difference from allies as the Chinese. They know that it would be a mistake to show up at any National Security Council meeting in the Kremlin with nothing to say.

Alexander Bortnikov director of the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB. Although it is not parsed out here, there is the possibility that Putin, knowing what he knows, experienced as he is, wanted to be deceived because he so badly wanted to invade Ukraine and needed to show his decision could not be viewed as wreckless, but rather based in reason that would be generally accepted. Conceivably, Putin may have recognized that there would be no need for him to potentially light the fuse of a figurative political bomb by trying to explain why he took the risk of invading Ukraine knowing Russian forces might face considerable challenges where there were self-crafted patsys in the intelligence services that he could “learn” to be the cause for his “miscalculation.” A most trusted aviser could serve to uncover the malfeasance and identify the patsys involved and present the wrongdoer and the report of their crimes to Putin all tied with a neat bow.

Carelessness or Conspiracy?

Some intelligence services apparently did more in the direction of providing fabrications than others.. From what can be gathered from newsmedia reports about its findings, the FSB foreign intelligence service seemed to have laid it on thick. There were allegedly many unproven torrid statements on the nature of Ukrainian society made concerning the destructive impact of the West on the culture, morality, spiritually, self-image of the people, ultranationalists, and the leadership in Kyiv, and the Ukrainian people’s willingness to stand fast against an invasion. 

According to Western newsmedia reports, the head of FSB foreign intelligence service, the organization’s 5th service, Sergey Beseda, was been placed under house arrest. Arrested with Beseda was his deputy and head of the operational information department, Anatoly Bolyukh. The 5th Service is a division that was established in 1998, when Putin was director of the FSB, to carry out operations in the countries that were formerly republics of the erstwhile Soviet Union. Its mission was to help ensure those countries remained within Russia’s orbit. Western commentators initially alleged the accusations were made against the officers because there was a search on in Moscow to find scapegoats to blame  for the “poor progress” of the Ukraine invasion. However, as the FSB is under the control of one of Putin’s most faithful and most dangerous officials, Alexander Bortnikov, it is more likely that the FSB head, himself, had determined that there were problems with the intelligence officials’ actions. Indeed, firstly, Beseda and Bolyuhk had been charged with the embezzlement of funds allocated for subversive and undercover work in Ukraine, as well as false information. Embezzlement is an ill that can plague even the most esteemed intelligence service at all levels. Some sardonically call it “creating a second retirement fund.” It was reported secondly that Beseda and Boyuhk had cooked up intelligence suggesting that Ukraine was weak, riddled with neo-Nazi groups, and would give up easily if attacked. Beseda and Boyuhk were apparently among those in the intelligence services who gambled that there would not be an invasion and lost. The criminal actions by the two intelligence officers were acts of madness. Rather than allowing Bortnikov to handle the matter in his usual fashion, Putin initially chose to have the officials placed under house arrest and allow for a fuller investigation of the matter. He likely wanted to determine the depth of the disloyalty and infidelity of Beseda and Bolyuhk and discover whether were acting on behalf of another country’s foreign intelligence service.

It could have reasonably be expected that within the FSB, some investigation was likely launched to identify any possible intelligence leaks that occurred before the invasion began. Some proposal surely would be made for the broader exploitation of whatever they might have discovered. Such an investigation would very likely start with a discrete look at those who may have put a foot wrong in the intelligence services. Presumably, there was no penetration by the West of a kind that any standard counterintelligence investigation might have the slightest potential to uncover immediately or identify clearly. Nevertheless, if some potential activity might have been discovered under such a hypothetical probe suggested here, it could potentially have been of enough significance to convince Moscow that it had some influence the initial outcome of the invasion and influence follow-on efforts by Russian forces in the field against Ukraine. 

To go a step further, delving into the realm of conjecture, there is the possibility that plans for the Russian invasion were captured by Western intelligence. However, given the performance of Russian forces so far, there was clearly a strategy and resources mismatch. Results in the field have spoken volumes about what Russian forces can and cannot do. The conquest of Ukraine was something Russian forces could not have accomplished, factoring in the tenacity and will of Ukrainian forces, even on their best day or should have even contemplated. Of course, the successes and movements of Ukrainian forces will have greater influence on how Russia forces proceed.

In the end regarding the FSB scandal, Putin engaged in the process of elimination in the truest sense of the term. Nearly 150 FSB officers were reportedly dismissed from the service, including Beseda and Bolyuhk who were already under arrest. The head of the department responsible for Ukraine was sent to prison. Gravis ira regum [est] semper. (The wrath of kings is always severe.)

Sergey Beseda, head of FSB foreign intelligence service, the organization’s 5th Service. The 5th Service is a division that was established in 1998 to carry out operations in the countries that were formerly republics of the erstwhile Soviet Union. Beseda and his deputy Anatoly Bolyuhk had been charged with the embezzlement of funds allocated for subversive and undercover work in Ukraine, as well as false information. It was also reported that Beseda and Bolyukh had cooked up intelligence suggesting that Ukraine was weak, riddled with neo-Nazi groups, and would give up easily if attacked. Beseda and Boyuhk were apparently among those in the intelligence services who gambled that there would not be an invasion and lost.

Looking Good Rather Than Being Good: Finding Work To Do

Leading up to the invasion, Washington supposedly plucked a spate of information from classified intelligence on the actions and intentions of Russian forces deployed near the border with Ukraine and inside Belarus and provided to newsmadia houses from reporting and offered in official government statements. By the time the invasion began, real-time reports of movements of Russian forces were being reported daily. The purpose of this step, among others, was to indicate to the world that an invasion was around the corner, Putin was acting aggressively, and the world needed to unite concerning sanctions and all other economic measures to make any action by Putin unprofitable. This schema of using real-time intelligence from exquisite technical collection capabilities of the US Intelligence services to forewarn of what was coming next was declared as a unique and skillful approach to information warfare by US newsmedia commentators friendly to the administration of US President Joe Biden. It ostensibly would serve to stymie the Kremlin’s ability to effectively calculate and establish plans, and stripped Putin of any chance of acting with surprise. The outcome of that effort is now quite clear for all to see.

Tanto est accusare quam defendere, quanto facere quam sanare vulnere, facilius. (It is just so much easier to accuse than to defend, as it is easier to inflict than to heal a wound.) Readers are asked to indulge greatcharlie as it moves further on this point. Surely, if that US effort had continued, as well as the relative peace, it is likely that the SVR and GRU, much as the FSB, among other things, would have tried to dress-up false pieces of information, chicken feed of a sort, moved it back and forth through channels of communication, through encrypted signals, to determine, off of a long list questions, what the US Intelligence Community and its Western partners are listening to, their preferred source, and what US cryptologists had broken into. Nonetheless, an investigation was doubtlessly launched.

More than that, the Russian intelligence services might look for and discover other secure channels were being monitored from the outside and the encrypted messages of their services were being read. If foreign penetration was not discovered authentically, it might even be fabricated. As alluded to earlier, other Russian intelligence services were apparently reporting nothing prewar that definitively contradicted what the FSB was reporting. Going further down the path of deception might appear counterintuitive. Surely, it is not a prescribed practice in any intelligence service. However, despite the risk, continuing to please Putin would possibly be seen as the best chance for survival. The hope of greatcharlie at this point is that its readers will remain willing to follow along, even stumble along, with its cautious discussion of this novel idea.

The discovery of some penetration, or a bit of fabrication about a penetration, would create the requirement to dig further. Imaginably, the alleged compromised channel or channels would not be shut down immediately. Chicken feed would likely be sent along the channel. Specific movements in the field might be ordered to confirm information was being pick-up on the outside or sent from within. To ensure they would grab attention, the movements ordered would be those of some importance to the overall Russian operation in Ukraine As things have gone, reports of Russian plans to move might appear in the Western newsmedia before they have even begun or have been completed. SVR and GRU counterintelligence services would likely also look at all communications made on particular channels and codes use, and among several Western actions, match them up with Western movements, statements, urgent communications between allies outside of normally scheduled ones, and if the capability actually exists, monitor collection requirements of Western intelligence officers in the field by exploiting counterespionage and counterintelligence successes. Any move by Ukrainian forces which SVR and GRU counterintelligence might discern was likely impacted by an awareness of Russian Federation plans and intentions would also be heavily reviewed. Russian intelligence services would not have been enabled to possibly take such steps if the West had not taken the tack of releasing publicly, freshly collected information and intelligence assessments that normally would have been marked classified. As suggested earlier, perhaps, something disturbing was found. 

On its face, at the full distance of the journeys of exploration by SVR, GRU, and FSB counterintelligence, for Putin it would be unpleasant and disappointing to find that US. Intelligence Community had successfully managed to penetrate the Russian intelligence services at such a high level. However, if SVR, GRU, and FSB counterintelligence hypothetically ran through all the intelligence dumps from the West on Russia’s plans for Ukraine and reviewed the aggregate of past communications sent and actions taken and some network or group of disassociated individuals providing information or making it accessible was uncovered, Putin, himself, would want to roll it up, hide and hair, as well as furtively exploit it for the maximum counterintelligence gain.

More than troubling technical defeat for Russian intelligence services, for Putin, the political implications of the possibility of a US operation to mislead Moscow about Ukraine would be considerable and perhaps work in Russia’s favor. Any US effort to convince the Kremlin that Ukraine was vulnerable to attack would  reveal the intention of the US to dangle the country as low hanging fruit for Russia to grab militarily. Kyiv might be reviled by the idea that the Ukrainian people were used as a goat tethered to a tree along the riverside as the lure for a blood-thirsty Russian tiger. To that extent, Kyiv might conclude that was calculated well-beforehand that if war came, the Ukrainian people would be intentionally used as fodder to wear Russian forces down. As it turned out, the Ukrainians fought admirably as the well-armed, well-trained proxies of the West. They have gnawed voraciously at Russian forces. Still, at the nub of the matter for Putin would be showing the Ukrainian that the war could have been avoided, he would insist that the war was sought by the US, and that there was no true intention by the West to pursue peace. Looking at all the devastation and destruction in the country, Kyiv would hardly be open to much that Putin might say. However, Putin might hope despite everything to a score political warfare victory and convince Kyiv not to stand so closely on the side of West. (Readers should note this partial analysis of the Ukraine war’s causation is not compatible with greatcharlie’s belief at all. The theory was certainly not offered with the intention by greatcharlie to speak against the national interest.)

 

People’s Republic of China Minister of State Security, Chen Wenqing (above). On a closely associated intelligence issue, there is the matter of Washington’s decision to share intelligence with Beijing on preparations by Russian forces for the attack on Ukraine and evidence supporting the likelihood of an attack which Washington shared with Beijing prior to the actual invasion. Washington was clearly groping for alternatives, given it was unable to see any good options. The Chinese would hardly have done anything to influence Russia’s position on the Ukraine as the US wished. The entire schema likely revealed to the Chinese the level of desperation in Washington to find answers to the Russian invasion threat. It may have been the case that Washington’s very apparent pre-invasion fears that Russian forces would rapidly overpower Ukraine stoked Putin’s unwarranted confidence.

Dealing With Beijing

On a closely associated intelligence issue, there is the matter of Washington’s decision to share intelligence with Beijing on preparations by Russian forces for the attack on Ukraine and evidence supporting the likelihood of an attack which Washington shared with Beijing prior to the actual invasion. Washington was clearly groping for alternatives, given it was unable to see any good options. It may have been the case that Washington’s very apparent pre-invasion US fears that Russian forces would rapidly overpower Ukraine stoked Putin’s unwarranted confidence. 

Washington should have understood that leaders of the Communist Party of China and People’s Republic of China Ministry of Foreign Affairs officials did not come in with yesterday’s rain and would vigorously review the information before doing anything with it. To confirm that the US was truly sharing valuable information–one cannot be so sure that Beijing was not already in possession of it, the Communist Party of China would  involve the best counterintelligence capabilities of the People’s Republic of China PLA Central Military Commission (CMC) Joint Staff Department Intelligence Bureau and Ministry of State Security. The head of MSS foreign counterintelligence, Dong Jingwei, a favorite of Xi, was once the subject of what his organization likely presumed to be an apparent US counterintelligence effort in which reports were leaked to the newsmedia that he had defected to the US along with his daughter. (See greatcharlie’s June 30, 2021 post entitled The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax.”) Imaginably, to the MSS foreign counterintelligence service, the potential benefits of the US Intelligence Community from promulgating false information on Dong would be clear. Top officials and managers in Beijing likely would have concluded that a goal could have been the breaking of morale among the alleged 25,000+ Chinese intelligence officers and operatives in the US. Hearing the false report of the MSS counterintelligence head’s defection might have stirred some disgruntled or disillusioned Chinese civilian or military intelligence officers and operatives to do the same. There might have been the presumption that the information was designed to unnerve a specific Chinese intelligence officer or operative that was being targeted by US counterintelligence services. Surely, the use his “good name”, putting his loyalty to China, to the Communist Party of China, and his comrades at MSS in question, enraged the infamous Dong. When the US presented its intelligence information on the build up and activities of Russian forces near Ukraine, Dong surely viewed it with skepticism and viewed the gesture as some ploy. His position on the matter would surely help shape the position the Communist Party of China’s leadership on the matter. The Chinese would hardly have done anything to influence Russia’s position on the Ukraine as the US wished. The entire schema likely revealed to the Chinese the level of desperation felt in Washington to find answers to the Russian invasion threat. 

Additionally, hardline Communist Party of China officials may have viewed the gesture as an effort to impress Beijing with the prowess of US intelligence capabilities, and to that extent issue a subtle warning. In the end, both PLA Major General Chen Guangjun, Chief of CMC Joint Staff Department Intelligence Bureau and Minister of State Security Chen Wenqing likely recognized the easiest and beneficial way to confirm the validity of the intelligence and enable China to better understand US intelligence human and electronic collection capabilities would be to share the information with their counterparts in Russia’s SVR, GRU, and FSB. Evidently, after the gifted US intelligence moved up through appropriate Communist Party of China channel, People’s Republic of China President Xi Jinping green-lit presentation of the information to Moscow. Getting Russian confirmation on the validity of the information would be important. 

Conceivably, Moscow believes that whatever China might have about the US is likely genuine. One might presume, there is some history of intelligence sharing has been established. Perhaps the greatest caveat for the Russians concerning what Beijing had to share would be the knowledge that officials in Communist Chinese foreign and national security bureaucracies absolutely detest the US and conclusions of Chinese intelligence services might very well be colored at certain points by such strong feelings. Yet, as important would be using the opportunity to strengthen China’s position at the intelligence table with its ostensible ally Russia, garner appreciation directly from the Kremlin, and perhaps encourage Moscow to provide a regular stream of information from its human and electronic intelligence sources concerning US military plans and activities in China’s area of interest. It would satisfying for Chinese intelligence to acquire information from Russia that could significantly add to what China already knows and is trying to keep track of. The Chinese also would not mind having the Russians eating out of their hands and the Russians would not put themselves in that position.

The Chinese, knowing what they seem to just know in some way about the daily inner workings of the US Intelligence services– the result of which their intelligence services seemingly operate with impunity and comfortably in the US supposedly in the tens of thousands–would presumably see the Russian intelligence service as just one big leaky ship. Surely, the respective headquarters of the MSS and the PLA’s Joint Staff Department Intelligence Bureau in Beijing would be hesitant to share anything with headquarters of the SVR Russian civilian foreign intelligence and GRU military intelligence services both based in Yasenevo that might be of the utmost importance to China’s security. One might safely wager that the Chinese were somewhat aware of the deficiencies of foreign intelligence service of the FSB Russia’s domestic security organization given any experiences with it. Beijing, knowing how tense the situation was regarding Ukraine, particularly as it concerned Putin, would have recognized that it would have been counterintuitive to do anything that might stir the pot, muddy the waters with regard to what the Kremlin understood about what the US was doing. Surely, Beijing has strived to avoid playing a part in bringing the world closer the nuclear Armageddon. That would be the rational choice.

The Wagner Group was first called into action on behalf of the Russian Federation government in March 2014 during Russia’s annexation of Crimea. They were among the “green men” who marched in the region unopposed. Nearly 1,000 members of the Wagner Group also supported ethnic-Russian separatists in the Donetsk and Luhansk provinces of Ukraine which have have since declared themselves the independent Donetsk People’s Republic and the Luhansk People’s Republic. Experts in Russian military affairs suggest that the Wagner Group is funded and directed by the GRU. The organization’s base is located in Mol’kino, in Southern Russia, within close proximity to a Russian Army base, perhaps to allow for better control and oversight.

Deflecting: An Possible Effort To Feed Into Kremlin Paranoia About the US

Additionally, it is very likely that some in the Kremlin, perhaps only in private thoughts, may have concluded by now that the Ukrainians could hardly have been so lucky against Russian forces on their own. They may have had intimations, that much of their success was really due to assistance from, and the “handiwork” of, the same well-trained folks who have done among many things, lent significant support to the forces of the late General Ahmad Shah Massoud of the Northern Alliance in their fight against the Taliban in Afghanistan, swept away the Taliban and Al-Qaeda in Afghanistan immediately after the September 11, 2001 terrorist attacks in the US, drove the campaign that destroyed the so-called Islamic Caliphate that cut across Syria and Iraq that was created by the ISIS terrorist organization, and while in that fight destroyed in self-defense, a formation of Russian private military contractors from the infamous Gruppa Vagnera (Wagner Group) in Syria as well. Without direct evidence, however, such imaginings, even in the Kremlin, can only have life in the realm of conjecture. Perchance the Russian Federation General Staff has the GRU investigating that foreign military advisers are covertly on the ground assisting Ukrainian forces, planning operations, controlling maneuvers and supporting attacks. The SVR would also likely reach out to its sources world wide to discover if any evidence or hints exist that such covert operations are underway. If the GRU and SVR are actually studying the matter, their conclusions, either confirming or refuting the possibility, would surely be startle consumers of the information.

The Wagner Group was first called into action on behalf of the Russian Federation government in March 2014 during Russia’s annexation of Crimea. They were among the “green men” who marched in the region unopposed. Nearly 1,000 members of the Wagner Group also supported ethnic-Russian separatists in the Donetsk and Luhansk provinces of Ukraine which have have since declared themselves the independent Donetsk People’s Republic and the Luhansk People’s Republic. Experts in Russian military affairs suggest that the Wagner Group is funded and directed by the GRU. The organization’s base is located in Mol’kino, in Southern Russia, within close proximity to a Russian Army base, perhaps to allow for better control and oversight. Reportedly, just before the invasion of Ukraine, the GRU directed the Wagner Group to conduct false flag operations in Eastern Ukraine to ensure such provocations would be available should Putin want to use one or more as a pretext for an attack on Ukraine. (To the extent that reports concerning an engagement between the Wagner Group and US special operations forces are true, the private military organization may be rushing to get to Ukraine not only for financial gain but with the hope of getting a possible rematch ostensibly with US operators defeated their units in Syria and leveled a severe blow to their egos given any real belief on their part that such US operators are indeed present on the ground. If there is a chance that conditions exist for a clash, it may very well turn out even worse than the first for the Wagner Group.)

“Kamerad, ich komm ja gleich!” On March 31, 2022, several hundred Syrian mercenaries arrived in the country, including soldiers from an army division that worked with Russian officers supporting the Assad regime. Russia has previously deployed Syrian fighters in Ukraine but in smaller numbers. In March 2022, Russian Federation Defense Minister, General of the Army Sergei Shoigu, announced that approximately 16,000 volunteers from the Middle East had signed up to fight on behalf of Russia in Ukraine. The same month, the Kyiv Independent reported that Ukrainian intelligence learned Russia had reached an agreement the Libyan commander Khalifa Haftar to recruit mercenaries. Official European sources have gone further to report that along with members of the Wagner Group.fighting in the Donbas, Russia has deployed as many as 20,000 Syrian and Libyan fighters there.

Ostensibly all Russian paramilitary units and foreign fighters operating in Ukraine or anywhere on behalf of the Russian Federation would be the province of the GRU. Indeed, the GRU would likely be responsible for their control, would be their link to Russian commanders and would be responsible for their oversight. much as with the Wagner Group. Handling the Wagner Group and foreign fighters would certainly provide plenty for GRU intelligence chief to report to Putin beyond counterintelligence efforts. Most of the reporting from the field about the Wagner Group and the foreign fighters would be good news, too. The GRU, of course, falls directly under the control of the General Staff of the Armed Forces of the Russian Federation.

The headquarters of the Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU in Yasenevo. On March 31, 2022, several hundred Syrian mercenaries arrived in the country, including soldiers from an army division that worked with Russian officers supporting the Assad regime. Russia has previously deployed Syrian fighters in Ukraine but in smaller numbers. In March 2022, Russian Federation Defense Minister, General of the Army Sergei Shoigu, announced that approximately 16,000 volunteers from the Middle East had signed up to fight on behalf of Russia in Ukraine. Ostensibly all Russian paramilitary units and foreign fighters operating in Ukraine or anywhere on behalf of the Russian Federation would be the province of the GRU. Indeed, the GRU would likely be responsible for their control, would be their link to Russian commanders and would be responsible for their oversight much as with the Wagner Group.

The Armed Forces of the Russian Federation: Expectations Versus Realities in Ukraine

On the eve of war, Russia’s invasion force was still considered formidable. Reportedly, this belief was based on the assumption that Russia had undertaken the same sort of root-and-branch military reform that America underwent in the 18-year period between its defeat in Vietnam and its victory in the first Gulf War. Prior to the Russian invasion of Ukraine, many analysts in the West speculated that the Russian operation would be something akin to a one act drama with an early curtain. The US Intelligence Community concluded that Kyiv would fall in days. Some European officials thought it might just hold out for a few weeks. 

However, starting on the first day of the of the invasion of Ukraine, all of the walls came down on the Russian Federation armed forces. Based on their overall performance in Ukraine, the forces that Russia sent into battle seemed almost counterfeit, poorly imitating what was expected by reputation. One could reasonably suggest  that in recent years their capabilities have been subject to hyperbole. Most wide-eyed observers might conclude that the General’nyy shtab Vooruzhonnykh sil Rossiyskoy Federatsii (General Staff of the Armed Forces of the Russian Federation) is fortunate that they are not facing US forces. Copious amounts of supporting evidence for that argument has been presented on the battlefield daily in Ukraine. How the mighty have fallen. 

Mea culpa

From what greatcharlie could gather about the situation before the February 24, 2022 invasion, the US Intelligence Community has concluded that the Kremlin could be planning a multifront offensive involving up to 175,000 troops. An estimated 100,000 Russian troops have already been deployed near the Russia-Ukraine border. Satellite imagery has revealed a buildup of Russian tanks and artillery as well as other gear near the border, too. Reportedly, online disinformation activity regarding Ukraine also has increased in the way it did in the run-up to Russia’s 2014 invasion of Crimea. According to the New York Times, the most evident scenario given the scale of troop movements on the ground is a Russian invasion of Ukraine may not be to conquer the entire country but to rush forces into the breakaway regions around the cities of Donetsk and Luhansk, or to drive all the way to the Dnieper River. Purportedly at the Pentagon, “five or six different options” for the extent of a Russian invasion are being examined. Suffice it to say, Moscow calls such assessments of Russia’s intentions slanderous ravings. Russia denies it is planning an invasion and, in turn, accused the West of plotting “provocations” in Ukraine. Russian Federation Ministry of Foreign Affairs spokeswoman Maria Zakharova, who unfortunately does not exactly have a watertight record for tying her statements to reality, laid it on thick in the newsmedia, alleging Western and Ukrainian talk of an imminent Russian attack was a “cover for staging large-scale provocations of their own, including those of military character.” It is really disempowering to put out such a message. 

In the abstract, greatcharlie also had assessed that If Putin decides to go in, firepower, astronomically massed, from ground, air, and possibly the sea assets, would most likely be used to destroy Ukrainian forces in the field, and in depth as far back as units held in reserve or even on training bases. Relentless fire from air and ground would be utilized to support the movement of forces inside Ukraine. What might have been identified as the front line of Ukraine’s defense would figuratively become a map reference for Hell. Russian forces would most likely be deployed in a way to prevent the resurrection of Ukrainian forces in areas which Russian forces have captured. As for reinforcements or reserves, the rest of Russia’s armed forces would be right across the border in Russia. Imaginably, the main objective of the deployment of Russian forces would be to create a sufficient buffer in Ukraine between Russia and “ever expanding NATO forces.” In performing this task, Russian forces would ensure territory and forces that might remain in Kyiv’s control would be of less utility to NATO as potential a launching pad for a ground attack on Russia and could not be used as part of a larger strategy to contain Russia at its own border.

Highly motivated Ukrainian troops riding a BMP push forward against Russian forces in the Donbas. Starting on the first day of the of the invasion of Ukraine, all of the walls came down on the Russian Federation armed forces. Based on their overall performance in Ukraine, the forces that Russia sent into battle seemed almost counterfeit, poorly imitating what was expected by reputation. One could reasonably suggest  that in recent years their capabilities have been subject to hyperbole. Most wide-eyed observers might conclude that the General’nyy shtab Vooruzhonnykh sil Rossiyskoy Federatsii (General Staff of the Armed Forces of the Russian Federation) is fortunate that they are not facing US forces. Copious amounts of supporting evidence for that argument has been presented on the battlefield daily in Ukraine. How the mighty have fallen. 

Delinquency Upon Delinquency

The renowned 19th century Irish poet and playwrite Oscar Wilde explained: “To expect the unexpected shows a thoroughly modern intellect.” Yet, during the Russia’s invasion hardly anything that might have been expected was seen. Russian forces moved oddly. Russian information warfare, technological strengths nowhere. Russian air power was not present where it should have been, for example, flying, over Ukraine preparing the battlefield, providing cover for mobile forces, attacking the opponent in depth. 

Russian forces were not organized for war with precision. Units were not ready for battle. Soldiers had no idea of what to expect. Ukraine was allowed use its strengths against Russian weaknesses. Ukraine’s smaller units was able to achieve relative superiority force on force initially in the field. One might have expected that occasionally good fortune would shine upon the relatively lightly-armed Ukrainian forces, and a Russian Army or Russian Naval Troops patrol rolling around or crossing into a danger zone might face ambush, a well-organized ambush, and losses would be suffered. With so many patrol ordered in the different avenues of attack by Russian forces, the greater the chance there would be losses. However, Ukrainian forces outrightly routed Russian units over and over on the battlefield and that line of successes would force Russia to adjust its strategy. This outcome was surely far greater than most military experts around the world could have imagined before February 24, 2022. The possibility of endsieg, victory against the odds, has become all the more real.

Some observers looking through the lens of history might reason that incurring high losses in attack are an aspect of Russian warfighting. Perhaps they might cite as statement allegedly made by Soviet Army Marshall Georgy Konstantinovich Zhukov to US General Dwight Eisenhiwer in 1945 as cited on page 207 in Robert Kaiser, Russia: The People and the Power (Atheneum, 1976): “If we come to a minefield, our infantry attacks exactly as it were not there.” Some might recall how Russian forces in the 2008 a war with Georgia had faced difficulties against the rather diminutive Georgian forces. True, Russia had achieved the goal of securing Georgia’s sovereign territory to pass on to the breakaway states of South Ossetia and Abkhazia. The many deficiencies of the Russia Army exposed during the fighting were stark. Russia troops utilized obsolete equipment, struggled to direct counterbattery fire at Georgian artillery, and the command and control of forces was inept. Still, in 2022, expectedly, everything would be done by commanders sending troops out to obviate that possibility, or mitigate it as best as possible by taking every reasonable precaution. The numbers and regularity of successful attacks on Russian troops would rationally lead one to think commanders have been careless.

The concept of fighting in three dimensionally, with ground forces receiving support from the air and ground receiving support from artillery fires and air and artillery, cross-communicating in real time, coordinating attacks to mass fires and airstrike with the objective of maximizing their impact, did not appear to be part of Russian Army battlefield tactics, at least not in practice. Somewhere on paper, something may be written. In modern armies, a those of the US and its allies, a synchronization matrix enables understanding of what everyone is doing at a particular time and which assets will be supporting which unit. Mission analysis identifies gaps in information required for further planning and decision making during preparation and execution. During mission analysis, the staff develops information requirements. Russian commanders forces clearly did none of this before they attacked. Amat victoria curam. (Victory loves preparation. [Victory favors those who take pains.])

Russian Federation Minister of Defense, General of the Army Sergey Shoigu conducts meeting with commanders of the armed forces. What has been discovered since the invasion began is that Russia had been running its military campaign against Ukraine out of Moscow, with no central commander on the ground to coordinate air, ground and sea units. Reportedly, that tack assists in explaining why the invasion struggled against an unexpectedly stiff Ukrainian resistance, and was plagued by poor logistics and flagging morale. In situations that require fexibility, improvisation, thinking through problems, armies whose unit commanders at the squad, platoon, company, and even battalion levels, advanced armies tend avoid being as unbending as the Russians. The failure and inability to effectively adapt in unfavorable situation once in contact will suffer considerably.

Calamity

Anyone trying to paint a picture of what was happening in the Russian command over the Ukrainian security operation would accurately produce an ugly daub. What has been discovered since the invasion began is that Russia had been running its military campaign against Ukraine out of Moscow, with no central commander on the ground to coordinate air, ground and sea units. Reportedly, that tack assists in explaining why the invasion struggled against an unexpectedly stiff Ukrainian resistance, and was plagued by poor logistics and flagging morale. In situations that require fexibility, improvisation, thinking through problems, armies whose unit commanders at the squad, platoon, company, and even battalion levels–the battalion being the main tactical formation of the a Russian Army–advanced armies tend avoid being as unbending as the Russians. The failure and inability of Russian forces to effectively adapt in unfavorable situation once in contact–since it is not taught and trained into Russian officers and nonconmissioned officers–would result in them suffering considerably. Often commanders of many units handled their troops and equipment as if they were participating in an exercise–parking companies and battalions of T-90 tanks and BMP armored personnel carriers on open roads without air cover or organic antiaircraft systems providing security–rather than moving in strength behind enemy lines in a shooting war. Disorganized assaults reportedly also contributed to the deaths of several Russian generals, as high-ranking officers were pushed to the front lines to untangle tactical problems that Western militaries would have left to more junior officers or senior enlisted personnel.

From what can be seen in broadcast and online videos albeit most provided by the Ukrainian Armed Forces and Ukrainian Ministry of Defense, no security was set up for units not in contact with their opposing forces in forward battle areas. There were visibly no pickets for armored and mechanized units while halting on roads, no moving pickets, no flank security, no air defense even watching the skies with heavy machine guns. This was the case despite foreknowledge that Ukrainian tank hunters with javelins and Turkish drones were lurking on the ground and in the air in their vicinities. Javelins and stingers provided to Ukraihian forces by the West were exploited to the point at which they had a multiplier effect on the battlefield. To that extent, a popular feature in the broadcast and online newsmedia on the Ukraine War are videos of formations of Russian T-90s and BMPs being identified and destroyed by Ukrainian drones or being hit by Ukrainian troops using javelins. Highways roads, and even trails were seemingly used as a means to locate Russian armored and mechanized units, which were naturally travelling in the direction toward Ukrainian lines on them. Suffice it to say, practically the whole world via the international newsmedia learned this was the situation in the field. No amount of spin by the Russian Federation Ministry of Defense could alter the truth of what was witnessed. Russian commanders at the company and battalion levels virtually sabotaged their units as a result of their repeated delinquencies. 

A term Russian armored and mechanized commanders seemed strangely unfamiliar with is “defilade.” Turning a tank into a static low caliber artillery piece, in a protected position while ostensbly awaiting new orders or resupply, is better than having whole companies travelling on roads much as a convoy of singing ice cream trucks. The lives of tank crewmen and mechanized troops were simply thrown away. There was just too much wrong going on for one even now to fully come to terms with the horror of it all. (Feeling dread over the circumstance of another human being should not be conflated with taking sides between warring parties. That is certainly not the case here. To conclude such about these comments would be wrong.)

Strangely, artillery fires have not been used, at least not effectively or robustly, to support movement by armor and infantry, it has not been used to divert, disrupt, and destroy targets on the axis of advancing units, or used for attacks in depth. Surely, these practices should have been rehearsed in military exercises and regular training. In a very archaic manner, artillery fires have at best been used whereas movement is concerned, to mitigate direct fire from opposing forces which was a regular practice during World War I. It would appear that artillery fires, if any are made available, have been lifted as armor and infantry made contact with the opponent allowing the opponent advantages in defense. Artillery has failed to play a dominant role in the field in Russia’s war. That is baffling. Apparently, Ukrainian forces are using artillery fires to support maneuver in their counterattacks and using them effectively to attack in depth. Counterbattery radar sets must have been left back in garrison by most Russian artillery units as Russian counterbattery fires have been ineffective, practically nonexistent.

To be forthright, greatcharlie senses that whatever was really going on at Zapad, the truth of the value of the exercises has come to the surface. In away not too different the director and deputy director of FSB foreign intelligence, military commanders simply went through the motions with elaborate displays of firepower and mobility with little to no concern about how it would all come together in real world situations. As alluded to earlier, it would seem the bigger and better Zapad exercises since 2017, lauded by the leadership of the Russian Federation armed forces, were simply full of sound and fury, signifying nothing. Putin, himself, had regularly observed the Zapad exercises and everything seemed fine enough, but it was not. In a way not too different the director and deputy director of FSB foreign intelligence, military commanders simply went through the motions with elaborate displays of firepower and mobility with little to no concern about how it would all come together in real world situations. To onlookers at the Zapad exercises, as Putin had regularly been, everything seemed fine enough, but things certain were not.

One NATO commander caught on to what had been happening at Zapad and other Russian military and naval exercises before the invasion and could predict Russian military action in Ukraine might prove for Moscow to be catastrophic. When he was commander of American naval forces in Europe and Africa, US Navy Admiral James Foggo had the duty to plan US military exercises recognized that planning the huge Russian exercises were enormous undertakings. As Russia was planning the Vostok exercises in September 2021 in Siberia, Russian Federation Defense Minister Sergei Shoigu, declared it would be the largest since the Soviet Union’s Zapad exercise of 1981. It would involve 300,000 troops, 1,000 aircraft and 80 warships. However, Foggo discovered there was quite a bit of deception involved. Rather than actually field large numbers of soldiers, sailors, airmen and marines, a company of troops (150 at most) at Vostok, for example, was inflated and counted as a battalion or even a regiment (closer to 1,000). Single warships were passed off as whole squadrons. Negligentia sempre habet infortunam comitem. (Negligence always has misfortune for a companion.)

How spectacularly did the illusion created by Russian Ground Force commanders disintegrate when challenged by reality! It is a sad lesson for commanders in all armies to learn from. The Russian Army of 2022 appears to mimic, albeit unintentionally, much of the Soviet Army of the 1980s. Without pretension, greatcharlie states that after reviewing what has transpired concerning the failures of Russian forces, for at least a fleeting moment, one might get the impression that Russian commanders want to lose. (Intriguingly, despite all that has been witnessed since February 24, 2022, the US Department of Defense continues to regard Russian Federation Armed Forces as an acute threat the US and its interests.)

Russian Federation Minister of Defense, General of the Army Sergey Shoigu (center) and Chief of the General Staff of the Armed Forces of the Russian Federation, General of the Army Valery Gerasimov (left), and Russian Federation General of the Army Aleksandr Dvornikov,  who took command of military operation in Ukraine in April 2022 (right) hold a meeting aboard an aircraft. As a part of what the General Staff of the Armed Forces of the Russian Federation called the shift from Plan A and Plan B, it was announced that Russian forces would focus its special security operation in Ukraine on “liberating” the east.” A very folksy aphorism that greatcharlie has come across recently is, “There is no education in the second kick of a mule.” Being aware of past thinking, capabilities, and and practices, it seems almost fallacious to expect any novel maneuvers by Russian forces that may be nuanced or special in such a way to make a great difference in their performance in Ukraine.

Resurrection?

An army can not change over night.What Russian military commanders can do is ensure that the many parts of the Ground Forces, Aerospace Forces, and Naval Forces to their utmost in harmony to achieve success is what will change the course of things. Once more, greatcharlie ingeminates a most apposite quote, an old chestnut, from the renowned theoretical physicist Albert Einstein said: “Probleme kann man niemals mit derselben Denkweise losen, durch die sie entstanden sind.” (We cannot solve our problems with the same thinking we used to create them.)

As a part of a shift from “Plan A” to “Plan B”, the General Staff of the Armed Forces of the Russian Federation announced on March 25, 2022 that Russian forces would focus its special security operation in Ukraine on “liberating” the east.” According to the Chief of the Main Operational Directorate of the General Staff of the Armed Forces of the Russian Federation Colonel General Sergei Rudskoy, head of the General Staff’s main operations administration stated “The main tasks of the first stage of the operation have been carried out.” He further stated: The combat capabilities of the Ukrainian armed forces have been substantially reduced, which allows us to concentrate our main efforts on achieving the main goal: the liberation of Donbas.” On April 9, 2022, Russian Federation General of the Army Aleksandr Dvornikov was appointed commander of the special military operation in Ukraine.

This shift from “Plan A” to “Plan B” has left little doubt in the minds of observers outside of Russia that an apparent initial plan to move rapidly to capture major cities in Ukraine and replace the national government had failed or at least had not gone as planned. There was an attempt to spin the matter as a success. As aforementioned, a big part of that was to omit any discussion of the terrible costs in troops, materiél, and treasure for the military’s blunders. The focus of Rudskoy’s spin was an effort to convince that efforts to encircle key Ukrainian cities as Kyiv and making them subjecting them the multiple airstrikes and artillery onslaught was to pin down Ukrainian forces elsewhere in the country in order to allow Russian forces to focus on the east. 

Since the announcement of the new plan of attack was made, Russian forces have met with some greater success in southern Ukraine. Well reported have been itheir efforts to capture towns and cities such as Kherson, Mariupol, Kreminna, and making some gains in the east. Russian troops also displaced Ukrainian forces from Zarichne and Novotoshkivske in Donetsk as well as Velyka Komyshuvakha and Zavody in the Kharkiv region. Following the shift, Moscow announced that 93 percent of the Donbas region of Luhansk had come under the control of Russian-backed separatists. However, over 33.3 percent of the Donbas was already under the control of ethnic-Russian separatist control before the invasion. It is hard to determine just how well things are going for Russian forces by listening to Moscow’s reports. Only 54 percent of Donetsk province of the Donbas is actually under Russia’s control. While achieving some success in the Kharkiv region, Russia made little vigorous progress in capturing Kharkiv, Ukraine’s second largest city. It was essentially the same story witnessed in Kyiv, huge losses and meager results. Ukrainian forces were fighting so well in the region that Russian forces were eventually forced to withdraw from Kharkiv, so close to their own border, in order to protect supply line and Russian territory as well. There was a US assessment in March the stated that Ukraine could recapture Kherson.

A very folksy aphorism that greatcharlie has come across recently is, “There is no education in the second kick of a mule.” Being aware of past thinking, capabilities, and and practices, it seems almost fallacious to expect any novel maneuvers by Russian forces that may be nuanced or special in such a way to make a great difference in their performance in Ukraine.

A test launch of Russia’s Satan-2 (above) on April 20, 2022 at the Kura Missile Test Range in the Russian Federation’s Kamchatka region. While the intercontinental ballistic missile (ICBM) has been dubbed Satan 2 by NATO, it is officially known in the Russian armed forces as the RS-26 Sarmat.  The ICBM carries multiple warheads and has an estimated range of 6200 to 11,800 miles. Doubtlessly through Putin’s eyes, Russia, his world, would stand at the edge of doom if “the West” wins the war. If that occurred, in brief, he would be driven to consider the vulnerable position in which he would ostensibly leave Russia by allowing a well-trained, well-experienced, and well-equipped military force remain intact and powerful on its western border. Putin would surely choose to act as violently as possible now to protect Russia’s existence into the future. Additionally and importantly, all forms of conflict would be permissible in Russia’s defense, including the use of thermonuclear weapons. Putin has repeatedly expressed a willingness to use the crown jewels of his defense arsenal.

The Way Forward

As expressed in greatcharlie’s March 31, 2022 post entitled “The Russian Invasion of Ukraine: Brief Meditations on Putin and Small Suggestions That May Support Achieving Peace Through Diplomacy”, there are those who speak freely on taking on Russia in the nuclear dimension, and suggest mightily that Moscow be reminded that the US has a formidable thermonuclear arsenal and will respond fiercely with it if Russia uses its weapons. Such thoughts appear to have been expressed with a complete lack of regard for their own self-interests, the interest of the US. It is unlikely that those individuals have steeled themselves against the possible consequences. The possibility of a thermonuclear attack from Russia are actually more real, more likely, than they might imagine. Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.)

Additionally mentioned in greatcharlie’s March 31, 2022 post is the well-viewed exchange between Putin and Sergei Naryshkin, head of the Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Naryshkin, an absolute Putin loyalist, known for his aggressive anti-western statements, became visibly uncomfortable as Putin interrogated him on Ukraine. Among his very top advisers, there was likely a palpable sense that a fiery sea of anger, rage, and hatred was churning violently inside of him. Perhaps Putin’s exchange with Naryshkin might be considered a new context. It is possible the exchange between Putin and Naryshkin may directly relate to a plan Putin may have of far greater conception what has publicly postulated in the West so far.

As the scene was set, Putin was seated at a desk in a grand, columned Kremlin room with his advisers, seemingly socially distanced from him and each other. Putin asked his advisers to step forward to a podium to offer their respective views on recognizing Luhansk People’s Republic and the Donetsk People’s Republic. Putin was being very sharp with his advisers. When Naryshkin was asked to present his views, he appeared uncomfortable even initially as Putin interrogated him. Naryshkin stumbled with his words. Surely noticing his discomfort, Putin exorts Naryshkin to speak more directly. To hear Naryshkin speak, some might immediately be left to believe the matter at hand is far more complicated than the challenging matter of that moment, recognizing the Luhansk People’s Republic and the Donetsk People’s Republic.

Putin, impatient and insistent, pushes Naryshkin even further. He tells Naryshkin twice, “Speak directly!” Eventually, when he was able to get the words out, When he spoke, Naryshkin uttered that he supported “the LNR and DNR becoming part of Russia.” Putin told him that wasn’t the subject of the discussion; it was only recognition being weighed up. Naryshkin then stated that he supported attempting negotiations first. Putin responded that the discussion was not about negotiations. Finally, Naryshkin was able to state that he supported Putin’s plans. According to newsmedia reports, some Russia experts have suggested that the whole scene might have been a carefully scripted artifice to demonstrate to the West that other options might be available. However, it is Naryshkin’s genuinely flustered expression that does the most to convince much more might have been involved.

The post of director of the SVR, is not for the faint hearted. Naryshkin is understood to be a srurdy individual and good at his job. He is a Putin loyalist and regularly expresses hardline anti-Western views. It is difficult to fathom why he would be so nervous, clearly under stress, when reporting to Putin. Perhaps he was uncertain how it would all play out. Perhaps as greatcharlie has suggested here, reporting from SVR concerning Ukraine has not been as accurate as it could have been as aforementioned due to delicacy toward Putin and is concerned he will be called out on the quality of his organization’s product. Indeed, maybe he thought that he was being burned by Putin. Perhaps the moment has been scripted to serve Putin’s purposes and Naryshkin is nevertheless concerned things may not pan out as planned. Perhaps he has seen that happen to others.

Rationale enim animal est homo. (Man is a reasoning animal.) At the risk of being obvious, greatcharlie suggests that is unlikely that Putin would not have approved the broadcast of the video of the security council meeting, and particularly “the Naryschkin moment” unless he intended to convey a message. Much as a good attorney in court, he would not ask a question of anyone testifying unless he already knew the answer. So much else, was edited out of the Russian newsmedia coverage. Surely, one might have expected much of that segment, a relative confrontation of the Russian President as compared to other exchanges, would have hit the cutting room floor. The video clip, itself, amounted to something akin to a chamber piece in which the theme–though the notion was brushed of by Putin during the meeting–was thermonuclear war. It was expressed via the subtle reference to it in the exchange between Putin and Naryschkin. Indeed, the message was that thermonuclear war is more than just a potentiality in the security council but a part of planning as it concerns halting NATO expansion and perceived Western plans to push into Russia’s sovereign territory to despoil its riches in natural resources.

To that extent, it might be worthwhile to revisit the notion of Putin’s awareness of the danger of setting unrealistic expectations as well as the notion of Plan A and Plan B as it relates to Russia’s special security operation. He has seen the Russian Federation armed forces in action and likely recognizes there is a real chance he could lose the conventional war with Ukraine. Putin, the central focus West, must consider the mass psychological implications of losing a ground war on its border. That would be the bitter end. Some newsmedia houses in Europe have been willing to promulgate the apocryphal rumor that Putin is suffering from pancreatic cancer. It would be difficult to imagine how those sources would have come upon such information as the US Intelligence Community has indicated that the Kremlin remains what intelligence officials call a “hard target”–incredibly difficult to penetrate through traditional espionage.” CNN reported, based on information from an official source, that there has not been any new comprehensive assessment by the US Intelligence Community that indicates a particular change to Putin’s overall health. That being stated, the follow-on thinking would be that if Putin finds himself in deep trouble in Ukraine, he might take the murder-suicide route on an Apocalyptic scale. However, more realistically, other considerations would likely be involved. 

Doubtlessly through Putin’s eyes, Russia, his world, would stand at the edge of doom if “the West” wins the war. If that occurred, in brief, he would be driven to consider the vulnerable position in which he would ostensibly leave Russia by allowing a well-trained, well-experienced, and well-equipped military force remain intact and powerful on its western border. Perhaps as discussed in the preceding March 31, 2022 post, Putin has indeed considered what will he will leave for future generations of Russians to contend with. Perhaps he believes now is the time to confront not just Ukraine, but the West. He has stated many times that he believes the West wants to destroy Russia and strip it of its natural resources. In greatcharlie’s preceding post, it was also suggested that the next generation of Russians will most likely want a future that reflects their own choices, their own desires, not those of a dark past. Russia never became das land des lächelns under his leadership despite his “best” efforts, and it seems that it will never become so. Critics in the West might say that Putin has achieved nothing except create new forms of the old misery. It could very well be that in Putin’s mind, everything that can be done must be done now to make certain future generations of Russians will not be left with the worst choice possible, to give in to Western demands, or worse, possibly surrender to conventional military threat or action. To that extent, and with a lot more factored in, Putin would surely choose to act as violently as possible now to protect Russia’s existence into the future. Additionally and importantly, all forms of conflict would be permissible in Russia’s defense, including the use of thermonuclear weapons. Putin has repeatedly expressed a willingness to use the crown jewels of his defense arsenal. 

Conceivably, the use of such weapons was considered and plotted out as a contingency by Putin long before the eve of invasion. Perhaps the knowledge of that was being telegraphed through Naryshkin’s body language at the National Security Council meeting before the invasion. A hardliner, yet a thinking man and shrewd individual, it may have troubled Naryshkin to think that the situation was drawing closer to such a dire outcome. Surely, in his possession, as the head of foreign intelligence, were true assessments of what might happen in Ukraine and that possible result may have troubled him greatly given the end state scripted by Putin.

Praemonitus, praemunitus. (Forewarned is forearmed.) It has always been up to the respective masters of thermonuclear weapons to maintain peace and stability or use them to their full terrifying potential as weapons of mass destruction. For Putin, the underlying thought for every step at the moment may very well be that it is now or never. Here, greatcharlie will go out on a slender thread to state that in his position taking everything into the round, that if defeated in a conventional struggle with Ukraine Putin would feel left with no choice but to destroy Russia’s opponent by whatever nonconventional means he might see fit. Everyone does not think the same. Things do not always turn out the way one might hope. It was by any reasonable standard daylight madness for Putin to invade Ukraine. Using thermonuclear weapons, although a far more monstrous transgression, would fit well within the mindset of one who do the former.

Everyone knows how the Cold War ended and who won. The history is clear. This critical episode between the West and Russia will likely be much shorter in duration. At the time of this writing, however, Its outcome is still unclear. Perhaps the legacy of the former struggle, thermonuclear weapons, will play a role and put an end to matters once and for all. If the US and rest of West should begin to threaten Russia with their weapons to reign Putin in it would would unlikely have that impact. As aforementioned, for Putin, the underlying thought for every step may be that it is now or never. He will most likely attack them. Omnia jam fient, fieri quæ posse negabam; et nihil est de quo non sit habenda fides. (All things will now come to pass that I used to think impossible; and there is nothing that we may not hope to see take place.)

The Russian Invasion of Ukraine: Brief Meditations on Putin and Small Suggestions That May Support Achieving Peace Through Diplomacy

Russian Federation President Vladimir Putin (above). in preceding posts, greatcharlie attempted to plunge a little deeper into Putin’s mind to better understand how he thinks and offer not just insights on decisions that he has made, but foresight on decisions he might make in the immediate future and beyond concerning Ukraine. What Western decisionmakers require is some reliable foresight into Putin’s actions. This essay will be too brief to put one in the full picture, even if greatcharlie had that faculty. The hope instead is to present glimmers of light that may stimulate thinking among readers on new lines of thought and provide kernels of ideas on how to proceed for foreign and national security policy analysts and decisionmaking.

On February 24, 2022, frightful predictions of a Russian invasion were realized as Russian forces moved into the country from several points, to include attacks from the territory of Belarus. So many had hoped that the possibility of war would remain just a possibility, and good minds in Western capitals would find some solution and reach an agreement with Moscow by which Ukraine, Russia, and NATO, and the West in general would be satisfied. Evidently, in Ukraine, many wanted to avoid war to the extent they acted as if it were an unlikely possibility. With the surprise and shock barely worn off most Ukrainians at the time of this writing, some have scrambled to move West in order to escape the oncoming death and destruction, and others have joined the Ukrainian Armed Forces or have simply taken up arms in order to be part of a planned insurgency. They are ready and regularly giving all in defense of their homeland.

Not unexpectedly, at the center of it all is Russian Federation President Vladimir Putin and his mindset. Concerning the Ukraine crisis, the matter with Putin runs deeper, more subtle than it seems many might suppose. One might be aware of this given the multitude of reports on Putin attempting to see reason in his actions. With considerable discomposure, greatcharlie states that many one sided analyses of Putin and the current crisis continue to stifle the advancement of understanding about him. That in turn may be hampering effective action and keeping diplomacy stagnated. One sided analyses fail to genuinely consider the other party’s thoughts and needs. In preceding posts, greatcharlie attempted to plunge a little deeper into Putin’s mind to better understand how he thinks and offer not just insights on decisions he has made but foresight on decisions he might make in the immediate future and beyond. To be effective, top foreign and national security policy decisionmakers need to attain a full understanding of both Putin and new situations as they begin to develop. This essay will be too brief to put one in the full picture, even if greatcharlie had that faculty. The hope instead is to present glimmers of light that may stimulate the thinking of readers on new lines of thought and kernels of ideas on how to proceed mainly for US foreign and national security policy analysts and decisionmakers, as well as analysts and decisionmakers of other Western governments, too. The word heart-wrenching marginally describes scenes viewed worldwide on broadcast and online newsmedia of Ukrainians ruined by war. One cannot look without compassion at what is happening there. With emotions about Ukraine running high, greatcharlie approaches the subject of Ukraine with caution. What comes to mind are words of the 17th century French actor and master of comedy in Western literature, Jean-Baptiste Poquelin, known as Molière. In one of his best-known dramas, “The Misanthrope” or “Le Misanthrope ou l’Atrabilaire Amoureux”, Molière writes the sardonic advisory to which greatcharlie has always paid heed: “That any gentleman should always keep in stern control this writing itch we’re seized with; That he must hold in check the great impatience We feel to give the world these idle pastimes; For, through this eagerness to show our works, ‘Tis likely we shall cut a foolish figure’.”

Putin at press conference following bilateral meeting with Hungarian Prime Minister Victor Orban on February 1, 2022 (above). Putin insists that his government invaded Ukraine for the sake of the Russian people and ethnic-Russians in Ukraine. Surely, Putin doubtlessly believes that everything he does is for the sake of the Russian people. To go a step further, Putin very likely sees himself as a sort of avenger of ethnic-Russians in Ukraine, defender of the people of Russia, and protector of the Russian Orthodox Church and all else that is Russian.

Putin’s Explanation for the War

In his February 24, 2022 televised speech on Ukraine, Putin laid out the reasoning behind his decision to invade Ukraine. Outlining his authority to invade Ukraine, in his own words, Putin explained: “In accordance with Article 51 (Chapter VII) of the UN Charter, with permission of Russia’s Federation Council, and in execution of the treaties of friendship and mutual assistance with the Donetsk People’s Republic and the Lugansk People’s Republic, ratified by the Federal Assembly on February 22, I made a decision to carry out a special military operation.” As for his reasoning for the invasion, Putin stated: “The purpose of this operation is to protect people who, for eight years now, have been facing humiliation and genocide perpetrated by the Kiev regime. To this end, we will seek to demilitarise and denazify Ukraine, as well as bring to trial those who perpetrated numerous bloody crimes against civilians, including against citizens of the Russian Federation.” As for the scope of the special military operation, Putin explained: “It is not our plan to occupy the Ukrainian territory. We do not intend to impose anything on anyone by force. At the same time, we have been hearing an increasing number of statements coming from the West that there is no need any more to abide by the documents setting forth the outcomes of World War II, as signed by the totalitarian Soviet regime. How can we respond to that?”

Boiled down, Putin stated with conviction that his government invaded Ukraine for the sake of the Russian people and ethnic-Russians in Ukraine. Surely, Putin doubtlessly believes that everything he does is for the sake of the Russian people. To go a step further, Putin very likely sees himself as a sort of avenger for ethnic-Russians in Ukraine, defender of the people of Russia, and protector of the Russian Orthodox Church and all else that is Russia. For almost every other national leader, there is no valid argument to support his choice. Most of the world would likely agree that what he has done is brustschmerzangst, strange and just wrong. In taking this dark, murderous route of invading Ukraine, Putin has sufficiently made the case, once again, that he can be a cruel monster. Few could reasonably deny that Putin cuts the figure of an immoral and cruel ethno-religious nationalist, not exactly steered spiritually by the precepts and strictures of the Russian Orthodox Church, but seemingly by obsession with his own hatred. Hardly any newsmedia commentators in the West, just to stir debate, would go through any pains to single out the points in Putin’s favor. Given choices of whom to alienate on the world stage, Putin has made the top of list. 

In Book X, Section 38 of his Meditations (161 AD-180 AD) the Roman Emperor and Stoic philosopher, Marcus Aurelius Antoninus (April 26, 121 AD-March 17, 180 AD), stated the following about the inner thinking of individuals: “Remember that what pulls the strings is the force hidden within; there lies the power to persuade, there the life,—there, if one must speak out, the real man.” In continuing its discussion on Putin, greatcharlie recognizes that many readers may not find the discussion immediately following satisfying, but it is asked that readers allow some room for maneuver on the following points.

All that has transpired in Russia since Russian President Boris Yeltsin declared the Russian Federation as a sovereign country, no longer a republic of the collapsed Soviet Union, has been the manifestation of Putin’s vigorous, and yes, masterful mind. Even the criminal mind can be regarded as masterful. Coldly exploring Putin, given his accomplishments despite his atrocious actions, it could be assessed that Putin is indeed a noteworthy individual. (The same might be said of Satan!) Perhaps some might coldly assess that Putin has been somewhat brave in the way that he spoke for what he says he believes in, brave in the way he takes on challenges presented to him and challenges he creates. He is ruled by his passions. if an Russian Orthodox Catholic priest, he would become the Primate. If a musician, he would rule the stage. None of this is not stated out of any respect or deference, but clear-headed consideration.

Within the foreign and national security bureaucracies of Western governments, formulating the best response diplomatically on Ukraine will mean better understanding Putin and how he thinks. Analyses within the US foreign and national security bureaucracies, given their access of analysts to intelligence reports, access to classified information collected by friendly foreign governments, their institutional knowledge and experience, etcetera, are understood to be a cut above that of the mainstream newsmedia. Stating this with no intention to offend, it would seem given outcomes and newsmedia reporting on the matter, that presently despite special sources, greater capabilities, and nuances, those bureaucracies are seemingly producing analyses somewhat similar to what the aforementioned newsmedia has on Putin. As a result, finding answers to cope effectively with Putin has been made far more challenging. It was once common wisdom that significant US involvement alone in earlier times would have had a steading effect. However, it does not appear to have such powers at the present. Neither promises nor “vague” threats from the US could induce Putin to pull back his forces and refrain from invading Ukraine. International law and maintaining international peace and security mean absolutely nothing to Putin any more.

The agreement Moscow signed promising not to invade Ukraine is the Budapest Memorandum. Drawn up in 1994, the Budapest Memorandum essentially states that Ukraine, having agreed to relinquish its nuclear arsenal which at the time was the third-largest in world, would be assured its sovereignty and territorial integrity by the other countries that signed the deal. Ukraine’s nuclear warheads would be transferred to Russia for decommissioning, and Ukraine would join the Nuclear Nonproliferation Treaty as a non-nuclear state. Other than then Ukrainian President Leonid Kuchma, the memorandum was signed by then US President Bill Clinton, Russian Federation President Boris Yeltsin, and the United Kingdom Prime Minister John Major. With regard to assuring Ukraine’s sovereignty and territorial integrity, Ukraine was only provided a politically binding security assurances to respect its independence and sovereignty which guaranteed its existing borders. The US was unwilling to agree to intervene then should Ukraine’s sovereignty be breached, and it clearly remains unwilling today. The government in Kyiv in 1994 very strangely put Ukraine in a wickedly precarious situation, relying too heavily on the goodwill of other countries. They did not know what the future would bring. Surely, they could not forsee or imagine the present-day Russian invasion. For Ukrainians, the deal reached in Budapest was a very bad one.

Putin interrogating the head of the Russian Federation Foreign Intelligence Service on February 21, 2022 during a Security Council meeting the Kremlin. (above). Western analysts have created the impression that they are unable to see Putin straight. CNN on March 1, 2022 reported that the US intelligence community has made evaluating Putin’s state of mind a top priority, seeking to establish how that is affecting his handling of the rapidly escalating Ukraine crisis. Although the US intelligence community has spent many years evaluating Putin, and possesses a considerable institutional knowledge about him, CNN noted that it has “a notoriously poor view into his day-to-day decision-making. The Kremlin remains what intelligence officials call a “hard target”–incredibly difficult to penetrate through traditional espionage.”

The Hopeless Search for a ‘Good Reason” for This War

Concerning the reasons for things,, the renowned “spy novelist” John Le Carre in his blockbuster work Tinker Tailor Soldier Spy (Simon & Schuster, 1972) had his main character explain reason can be founded in three ways: “reason is logic”; “reason is motive”; and, “reason is a way of life.” Among those who examine Putin regularly, some surely would find his recent decision-making very difficult to reconcile within the settled order of nature. To that extent it is worth examining because it is inexplicable. The rational part of greatcharlie insists upon it.

A common theme heard in Western foreign policy circles and newsmedia concerning Putin’s attitude and behavior before and during the first few days of the invasion was that Putin was bent on reestablishing the Soviet Union as it existed before its collapse. Standing in the way of that expansion, was his perception of alleged expansionist aims of NATO. That perceived NATO expansion into Ukraine, which remains a real “threat,” an absolutely horrifying possibility to Putin and his advisers. Boastfully, provokingly Ukrainian President Volodymyr Zelensky amplified the notion of Ukraine joining NATO before and more so right after the invasion. and before the invasion, his words likely stayed with Putin much as a song that would not get out of his head. In the fragile negotiations organized on the initiative of Ukraine and Russia since the invasion began, and endorsed by the US and other Western countries, Zelensky has back tracked on the matter, saying NATO membership is no longer an immutable position of Kyiv. However, that is due to the fact that far greater matters concerning Ukraine’s future, including the retention of its territory, are now at stake. Once a very weighty issue is now a simple bargaining chip of value yet to be fully determined at the negotiating table.

Intriguingly, US intelligence officials have made their assessments that Putin cannot be seen straight. CNN on March 1, 2022 reported that the US intelligence community has made evaluating Putin’s state of mind a top priority, seeking to establish how that is affecting his handling of the rapidly escalating Ukraine crisis. Although the US intelligence community has spent many years evaluating Putin, and possesses a considerable institutional knowledge about him as greatcharlie alluded to earlier when discuss the US foreign and national security bureaucracies, CNN noted that it has “a notoriously poor view into his day-to-day decision-making. The Kremlin remains what intelligence officials call a “hard target”–incredibly difficult to penetrate through traditional espionage.” In fact, CNN reported, based on information from an official source, that there has not been any new comprehensive assessment by the US Intelligence Community that indicates a particular change to Putin’s overall health. (It would appear that Gospodin Vladimir Vladimirovich has been terribly unhelpful concerning US efforts to evaluate him!) The fact that such a gap in knowledge and understanding about aspects of Putin’s life exist should not at all be satisfactory for the US Congress or for executives and managers within the Intelligence Community, itself.

Interestingly enough, there was also no serious discussion of Putin being off-key in the months leading to the invasion or even on February 24, 2022. In preceding posts on Ukraine, greatcharlie noted with curiosity that national leaders in the West, despite declaring Putin a violent, loathsome man, rarely if ever put into question his mental state. Thiere was no discussion of Putin’s mental state as he began the build up of Russian forces near Ukraine in 2021. On March 31, 2021, when the US European Command raised its awareness level to “potential imminent crisis” in response to estimates that over 100,000 Russian troops had been positioned along its border with Ukraine and within Crimea, in addition to its naval forces in the Sea of Azov. Indeed, European Command made it quite clear that there were signs of potential violence. An assessment of Putin’s mental state that greatly called into question his ostensible preparations to blindly inflict harm on the people of Ukraine may have changed everything for top decisionmakers in Western governments..

Observing how Putin was being perceived in Moscow, there was apparently no concern among political leaders about his mental state. indeed,, he was actually provided even greater powers by Russian political leaders to carry out his plans for Ukraine. On February 15, 2022, Russia’s parliament, the State Duma, voted overwhelmingly to ask Putin to formally recognize Donetskaya Narodnaya Respublika (Donetsk People’s Republic)or Donetsk and Luganskaya Narodnaya Respublika (Lugansk People’s Republic or Luhansk People’s Republic) or Luhansk. Before the invasion, Donetsk and Luhansk were still inhabited by somewhat large populations despite the heavy fighting between Ukrainian forces and separatists within them. According to the World Population Review, in 2021, the population in Donetsk was 899,325 and in Luhansk was 398,505. Fighting in both areas was exceedingly heavy. Eventually both movements declared their provinces independent republics. Putin took the step authorized by the Duma. The greatest concern in the West when Hi did so was the fact that it meant a formal end to Russia’s role in maintaining the integrity of the ceasefire between Ukrainian and separatist forces constructed under the Minsk Agreements. Duma Speaker Vyacheslav Volodin said on Telegram after the vote: “Kyiv does not comply with the Minsk agreements. Our citizens and compatriots living in Donbas need help and support,” He went on to state: “In this regard, [Duma lawmakers] believe the recognition of the Donetsk and Luhansk People’s Republics will create grounds for guaranteeing the security and protection of their inhabitants from external threats.”

Returning more directly to the issue of Western perceptions of Putin’s mental state, surely, there are those among US foreign and national security policy analysts who conversely would assess that his recent actions are consistent with those prior. An example provided in greatcharlie’s January 25, 2022 post entitled, Resolving the Ukraine Crisis: How Better Understanding Putin and the Subtle and Profound Undercurrent Influencing His Thinking on the West Might Help”, Putin would be willing to Russia to challenging and uncertain military operations. The prime example offered was the second on Chechnya by Russian forces in 1999. Russian forces went in depite having been unsuccessful in an operation there three years earlier. Speculation about Putin’s mental health became most popular after his broadcast address on his decision to order a special military operation against Ukraine. Reportedly, the most shocking aspect of the address for top officials was the justification he gave for the invasion. On February 25, 2022, US Senator Marco Rubio relayed on Twitter @marcorubio that Putin “has always been a killer, but his problem now is different & significant,” suggesting he was basing his assessment on intelligence briefings given to him as the vice chair of the Senate Intelligence Committee. He tweeted further: “I wish I could share more,but for now I can say it’s pretty obvious to many that something is off with #Putin.” Summing up all that he could say publicly what he gleaned from the briefing Rubio stated: “It would be a mistake to assume this Putin would react the same way he would have 5 years ago.”

CNN on March 1, 2022 noted that following the Congressional briefing that Rubio attended, the floodgates further opened regarding Putin’s mental state. Former US Ambassador to Russia Michael McFaul who served in that post during the administration of US President Barack Obama tweeted that Putin had “changed,” and sounded “completely disconnected from reality” and “unhinged.” Former Director of National Intelligence Jim Clapper, who also served under Obama, referred to Putin on CNN as “unhinged” and warned, “I worry about his acuity and balance.”

A photo from the Stasi archives in Dresden picture of Putin (second from the left) standing with a group of senior Soviet and East German military and security officers and officials. There are those who would point to Putin’s service in the Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, and emphasize that his behavior is reflective of the virtual nature of that erstwhile organization’s cold-blooded reputation, brutish methods, and the sinister mindset of its leadership. Yet, through that service, he certainly would be aware of numerous acts of sacrifice and valor by Ukrainians in the service of the KGB. It would seem remembering those KGB comrades would cause Putin pause and compel him to reflect hard on such a decision to invade Ukraine. Fraternité! However, clearly such thoughts about his KGB service provided no barrier to his actions.

When one moves into the realm of conjecture, one guess is as good as another. What may not make sense to one, might speak volumes to another. Among other, more recherché, even outré, explanations for Putin’s behavior are the following. There are those who would point to Putin’s service in the behemoth Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, and emphasize that his behavior is reflective of the virtual nature of that erstwhile organization’s cold-blooded reputation, brutish methods, and the sinister mindset of its leadership. Yet, that same KGB service surely had Putin working alongside Ukrainians who he appreciated and observed serving the service well in what was once East Germany. He certainly would be aware of numerous acts of sacrifice and valor by Ukrainians in the service of the KGB. It would seem remembering those KGB comrades would cause Putin pause and compel him to reflect hard on such a decision to invade Ukraine. Fraternité! However, clearly such thoughts about his KGB service provided no barrier to his actions. Interestingly, as Putin place much concern over the history of Ukraine in his calculus of how to proceed, he conversely would likely say thoughts of his KGB would not be relevant. What is most pertinent are circumstances as they exist today! Hearing his thoughts on the intersection of these matters would surely reveal an intriguing duality. 

Putin himself has played a active deliberate role in glazing over any prospective windows into him with staged scenes for worldwide newsmedia distribution. The truth of the moment is anyone’s guess. Putin likely has a near bottomless bag of tricks. The more recherché his behavior, the greater attention it gets and the greater its chances of retention. In the aforementioned CNN report of March 1, 2022, it is noted that one US official told the newsmedia house that US intelligence officials “have been on guard for the possibility that Putin’s strategy may well be to project instability, in an attempt to push the US and allies to give him what he wants for fear that he could do worse.” Still further, Putin, after all, is a fan of comedy. Supposedly, one of his films was “Ivan Vasilyevich Menyayet Professiyu” (“Ivan Vasilyevich Changes Profession”) (1973), a Soviet comedic film in which Ivan IV “The Terrible” is accidentally transported by time a machine in a apartment building to the present and the apartment building superintendent and a petty thief are sent to the 16th century a try to require themselves as Ivan the Terrible and a duke of his court. Absolute madness ensues. Russian cultural references, dry humor, and crni humor, is found in many of the characters’ lines. What may have tickled Putin about the film is not so much what was unexpected, but those things that were also outré. (When Putin is in a good mood, certainly unlikely the way he is today, one might speak figuratively that even the heavy planet Saturn which symbolizes maturity, responsibility, discipline, and stewardship, would laugh and leap with him. Yet, this is beside the question.) Surely, there is nothing humorous about anything Putin has done in Ukraine, but again concerning the diplomatic front and political warfare front, as mentioned the US Intelligence Community might agree, he is well-aware of the type of impact certain images, some possibly facetious, would most likely have upon Western observers.

Considering Putin’s recent behavior, perhaps it is not so much that Putin has changed, it may be the case that he has just gotten a little older, and that could have been expected. With age everything changes. Without any intention to appear ageist, greatcharlie suggests that this is an idea lost of many under 65. Of course, not every senior is the same. Some individuals actually shine brighter and find their true selves. Some do not change at all, either for the better or for the worse. Yet, perhaps it is very well the case that Putin, at 69, has entered a new era and has lost interest in what he might perceive as shoe-horning himself into Western constructs to gain some sense of attainment, sense of arrival, sense of assuring Russia a place on the world stage, the first tier. Knowing that Russia is a superpower, whether foreigners agree or not, may now be enough for him. Ukraine evinces this suggested mindset well.

While greatcharlie always senses it is moving out on shaky ground when suggesting medical causality for an individual’s behavior, but perchance Putin may have a B1 vitamin deficiency. As an odd symptom of B1 vitamin deficiency, one can become disconnected from reality, not rational, or reasonable. 

Surely, the notion that there may be something supernatural about Putin’s attitude and behavior at this time would offend all reason of most observers and analysts alike. Yet, perhaps Putin may have been put under the control of a dark shaman who has sinister intentions. Hopefully on this point, greatcharlie will not be accused of faulty humor. What would be most supportive of efforts to get to heart of the matter would be an explanation from disciplined reasoning that would be albeit more prosaic, not guesses that boil down to nonsense. As touched upon earlier, claiming that Putin is unstable and behaving irratically is not an answer. It is an expression of symptoms of observed, associates them with actions,  but that information does not explain their cause. To that extent, such assessments presumably unintentionally mask the failure to find real answers, develop useful information. National leaders and policymakers cannot neither develop worthwhile plans nor comfortably base decisions on such.

Watching the West interact with Ukraine since the collapse of the government led by his stern ally former Ukrainian President Viktor Yanukovych following the Orange Revolution and Euromaidan, Putin likely felt more and more that  remnants of the former Soviet Empire which he hoped to hold on to were being chipped away by the West, bit by bit. Surely, from his lens, the military dimension of the relationship remains at the forefront as he surely perceives it as an important feature of Western efforts expand eastward toward Russia’s border. Indeed, NATO forces are creeping closer to Russia’s border, and that the government in Kyiv has been pulled far from Moscow’s political reach. Putin might believe any reasonable observer would accept and agree with his thinking about a threat from the West, and that he has logically reached that conclusion. given Western actions.

With further regard to Euromaidan, since then, national administrations in Kyiv that came to power after the exit of Yanukovych have gambled on what they wanted and saw as a sure bet, partnership with the West, which attendantly meant the exclusion of nearly everything from Russia that they could exclude safely, reasonably. Kyiv believed Ukraine, its growing partnership with the West, seemingly formalized with the US-Ukraine Strategic Security Pact along with existing agreements such as the Budapest Memorandum, the Minsk Agreements, meant greater security for Ukraine. Kyiv took a considerable risk taking that approach, and it lost. Although it should not have happened, but nonetheless did happen, Putin responded. He figuratively closed the casino and all the winnings on the tables. By tethering itself to the West, Ukraine surely did not become more secure. Perhaps the real issue is that Putin sees Ukraine as a whole-minus the Luhansk People’s Republic and Donetsk People’s Republic–traitorous, since Kyiv, under its present leadership, for all intents and purposes, has turned its back to Russia immutably. Ukraine had become the object of Putin’s pain.

One might consider that Putin’s most recent behavior and choices may possibly be part of a pattern of expression and actions seemingly given too little serious attention in not just the run up to the invasion but years before. Indeed, for greatcharlie, an reliable undemanding, uncomplicated way to develop an understanding of Putin’s perspectives on Ukraine would be to thumb through his expressions on the Ukraine matter. There have been numerous reports and transcripts of chief executive level telephone conversations, speeches, statements, and declarations that should not have left anyone in doubt that he was coming for Ukraine at some point if the matter were not addressed in some fulsome way beforehand. A brief sampling of pertinent expressions by Putin, to avoid being “too prolix,” reveals his concerns, sense of vulnerability to the West and that these expressions were both persistent and consistent.

US President Barack Obama during a 90-minute phone call with Putin from Washington on March 2, 2014 (above). One might consider that Putin’s most recent behavior and choices may possibly be part of a pattern of expression and actions seemingly given too little serious attention in not just the run up to the invasion but years before. There have been numerous reports and transcripts of chief executive level telephone conversations, speeches, statements, and declarations that should not have left anyone in doubt that he was coming for Ukraine at some point if the matter were not addressed in some fulsome way beforehand. During their March 2014 call, Putin told Obama that the US-backed interim Ukraine administration was threatening “the lives and health of Russian citizens and the many compatriots” in Crimea. Putin declared, “Russia retains the right to protect its interests and the Russian-speaking population of those areas.”

2014 Telephone Conversation with Obama

Reportedly, during a 90-minute phone call with Putin from Washington on March 2, 2014, Obama warned that Russia could face “serious repercussions” unless it halted military operations in Ukraine. Obama further stated to Putin that his actions were a “clear violation of Ukrainian sovereignty and territorial integrity, which is a breach of international law.” Obama additionally urged Putin to pursue “direct engagement with the government of Ukraine” and support the “dispatch of international observers under the auspices of the United Nations Security Council or the Organisation for Security and Cooperation in Europe (OSCE). In a reported statement from the Kremlin, Putin told Obama, bluntly, that the US-backed interim Ukraine administration was threatening “the lives and health of Russian citizens and the many compatriots” in Crimea. Putin reportedly went on to say, “In the case of any further spread of violence to eastern Ukraine and Crimea,” and he warned, “Russia retains the right to protect its interests and the Russian-speaking population of those areas.” However, in an official statement from the Kremlin concerning the telephone call Putin had Obama on March 2, 2014, it was declared that “in reply to Obama’s concern over the possibility of the use of Russian armed forces on the territory of Ukraine, Vladimir Putin drew his attention to the provocative and criminal actions on the part of ultranationalists who are in fact being supported by the current authorities in Kiev.” The Kremlin statement further noted that “The Russian President spoke of a real threat to the lives and health of Russian citizens and the many compatriots who are currently on Ukrainian territory. Vladimir Putin stressed that in case of any further spread of violence to Eastern Ukraine and Crimea, Russia retains the right to protect its interests and the Russian-speaking population of those areas.” Themes from the Russian side of that conversation still heard today were the threat of ultranationalists (neo-Nazis) and threat to the lives and health of Russian citizens and compatriots who were in Ukraine. Notably, Putin deliberately describes Ukraine, a sovereign country as a territory. It was a subtle utterance Obama might have missed the significance of.

Putin’s Speech at the State Duma on March 18, 2014

One of Putin’s greatest expressions of vulnerability in his March 18, 2014 speech declaring Russia’s annexation of Crimea. In the official Kremlin transcript of that speech, Putin is quoted as stating the following on Ukraine and the rise of ultranationalists: I would like to reiterate that I understand those who came out on Maidan with peaceful slogans against corruption, inefficient state management and poverty. The right to peaceful protest, democratic procedures and elections exist for the sole purpose of replacing the authorities that do not satisfy the people. However, those who stood behind the latest events in Ukraine had a different agenda: they were preparing yet another government takeover; they wanted to seize power and would stop short of nothing. They resorted to terror, murder and riots. Nationalists, neo-Nazis, Russophobes and anti-Semites executed this coup. They continue to set the tone in Ukraine to this day. On the matter of ethnic-Russians in Ukraine, to which Putin refers directly as Russians, he stated: “The new so-called authorities began by introducing a draft law to revise the language policy, which was a direct infringement on the rights of ethnic minorities. However, they were immediately ‘disciplined’ by the foreign sponsors of these so-called politicians. One has to admit that the mentors of these current authorities are smart and know well what such attempts to build a purely Ukrainian state may lead to. The draft law was set aside, but clearly reserved for the future. Hardly any mention is made of this attempt now, probably on the presumption that people have a short memory. Nevertheless, we can all clearly see the intentions of these ideological heirs of Bandera, Hitler’s accomplice during World War II.” Putin would add further in the speech: “Those who opposed the coup were immediately threatened with repression. Naturally, the first in line here was Crimea, the Russian-speaking Crimea. In view of this, the residents of Crimea and Sevastopol turned to Russia for help in defending their rights and lives, in preventing the events that were unfolding and are still underway in Kiev, Donetsk, Kharkov and other Ukrainian cities.” As for the legitimacy of the government in Kyiv and attendantly the sovereignty of Ukraine itself, Putin explained: “It is also obvious that there is no legitimate executive authority in Ukraine now, nobody to talk to. Many government agencies have been taken over by the impostors, but they do not have any control in the country, while they themselves – and I would like to stress this – are often controlled by radicals. In some cases, you need a special permit from the militants on Maidan to meet with certain ministers of the current government. This is not a joke – this is reality.” Then, declaring his authority to act of what he perceived as a dangerous situation, Putin stated: “Naturally, we could not leave this plea unheeded; we could not abandon Crimea and its residents in distress. This would have been betrayal on our part.” The same the three elements were repeated in the speech as in the telephone call with tge March 2014 Obama telephone call, Ukraine was a base for neo-Nazis, ethnic-Russians lives were endangered, and Ukraine’s sovereignty was questionable.

Concerning Putin’s sense of vulnerability to the West, it was laid out in the open for all to hear. To summarize, Putin vented his anger at the US and EU, enumerating Western actions that fostered his contempt. He mentioned: Russia’s economic collapse, which many Russians recall was worsened by destructive advice and false philanthropy of Western business and economic experts that did more to cripple their country; the expansion of NATO to include members of the Soviet Union’s own alliance, the Warsaw Pact; the erroneous Russian decision to agree to the treaty limiting conventional forces in Europe, which he referred to as the “colonial treaty”; the West’s dismissal of Russia’s interests in Serbia and elsewhere; attempts to bring Georgia and Ukraine into NATO and the EU; and, Western efforts to instruct Russia on how to conduct its affairs domestically and internationally. Doubtlessly, the aggregate of US moves eastward in Europe over time so inflamed Putin’s sense of ardor to respond militarily.

Putin’s July 2021 Essay on Ukraine

During the Summer of 2021 and more so during the run up to the invasion, many passed their eyes over Putin’s July 12, 2021 essay entitled, “On the Historical Unity of Russians and Ukrainians” All in all, it is very interesting as a piece of history but has little to do with the present realities in the minds of reasonable thinkers and could hardly be the sort of thing that civilized, technologically advanced, industrial societies would go to war over. In greatcharlie’s view, it is essential to take note of Putin’s understanding of the matter to discern his true mindset lies, how his thinking works on the matter. It will doubtlessly have an impact on how he may settle on the matter as events take shape on the battlefield. 

Although Putin goes as far back as the odyssey of the Ancient Rus, dwells in the history of the 14th, 15th, and 16th centuries and moves more expediently through the 17th and 18th centuries, to explain the historical ties and the bond between Ukrainians and Russians, perhaps most relevant to his view of Ukraine’s place as a sovereign country starts with the Bolsheviks. Boiled down what can be gathered by greatcharlie from the essay as concisely as possible, greatcharlie recounts the following highlights from the essay. Putin explains that following the February Revolution, in March 1917, the Central Rada was established in Kiev, intended to become the organ of supreme power. In November 1917, in its Third Universal, it declared the creation of the Ukrainian People’s Republic (UPR) as part of Russia. In December 1917, UPR representatives arrived in Brest-Litovsk, where Soviet Russia was negotiating with Germany and its allies. At a meeting on 10 January 1918, the head of the Ukrainian delegation read out a note proclaiming the independence of Ukraine. Subsequently, the Central Rada proclaimed Ukraine independent in its Fourth Universal. Putin then explains that Ukrainians after signing a separate treaty with German bloc countries  Rada delegates signed a separate treaty with the. Germany and Austria-Hungary which needed Ukrainian bread and raw materials. In order to secure large-scale supplies, they obtained consent for sending their troops and technical staff to the UPR. Putin states that in fact, this was used as a pretext for occupation, by 1918, Ukraine was in his view essentially under German protectorate. Following the revolutionary events in Germany and Austria-Hungary in 1918, Ukrainian nationalists proclaimed the West Ukrainian People’s Republic (WUPR) and, in January 1919, announced its unification with the Ukrainian People’s Republic. 

Putin goes on to explain that in July 1919, Ukrainian forces were crushed by Polish troops, and the territory of the former WUPR came under the Polish rule. According to Putin, in April 1920, Symon Petliura signed a secret conventions on behalf of the UPR Directorate, giving up–in exchange for military support–Galicia and Western Volhynia lands to Poland. In May 1920, Petliurites entered Kiev in a convoy of Polish military units. Yet, as early as November 1920, following a truce between Poland and Soviet Russia, the remnants of Petliura’s forces surrendered to those same Poles. Putin, however, also reflects back to note that in early 1918, when the Donetsk-Krivoy Rog Soviet Republic was proclaimed, it asked Moscow to incorporate it into Soviet Russia. This was met with a refusal. During a meeting with the republic’s leaders, Soviet Premier Vladimir Lenin insisted that they act as part of the pre-existing Soviet Ukraine. On 15 March 1918, the Central Committee of the Russian Communist Party (Bolsheviks) directly ordered that delegates be sent to the Ukrainian Congress of Soviets, including from the Donetsk Basin, and that ”one government for all of Ukraine“ be created at the congress. The territories of the Donetsk-Krivoy Rog Soviet Republic later formed most of the regions of south-eastern Ukraine. 

Putin explains that under the 1921 Treaty of Riga, concluded between the Russian SFSR, the Ukrainian SSR and Poland, the western lands of the former Russian Empire were ceded to Poland. However, he reminds that in 1939, the USSR regained the lands earlier seized by Poland. A major portion of these became part of the Soviet Ukraine. In 1940, the Ukrainian SSR incorporated part of Bessarabia, which had been occupied by Romania since 1918, as well as Northern Bukovina. In 1948, Zmeyiniy Island (Snake Island) in the Black Sea became part of Ukraine. Imaginably, poignant to Putin was relaying the fact that in 1954, the Crimean Region of the RSFSR was given to the Ukrainian SSR, in gross violation of legal norms that were in force at the time. Putin’s reality on that matter founded his action to capture Crimea in 2014. It may be enough to comment on the this part of essay by quoting the 20th century US financier and statesman, Bernard Baruch, who remarked: “Every man has a right to his opinion, but no man has a right to be wrong in his facts.”

As for the Ukrainian identity, Putin explained that “In the 1920’s-1930’s, the Bolsheviks actively promoted the ”localization policy“, which took the form of Ukrainization in the Ukrainian SSR. Symbolically, as part of this policy and with consent of the Soviet authorities, Mikhail Grushevskiy, former chairman of Central Rada, one of the ideologists of Ukrainian nationalism, who at a certain period of time had been supported by Austria-Hungary, was returned to the USSR and was elected member of the Academy of Sciences. Putin emphasized that “The localization policy undoubtedly played a major role in the development and consolidation of the Ukrainian culture, language and identity. At the same time, under the guise of combating the so-called Russian great-power chauvinism, Ukrainization was often imposed on those who did not see themselves as Ukrainians.”

The decision of the Ecumenical Patriarch of Constantinople Bartholomew I to allow a separate Ukrainian Orthodox Catholic Church from the Russian Orthodox Church for many in Russia may have oddly validated Putin’s concern that West was using its influence to pull Ukrainians away from their cultural traditions. Putin’s position on the matter has garnered support from thehead of the Russian Orthodox Church, Patriarch Kirill. There are not too many issues that could potentially reach the majority of the Russian population on the West’s alleged intention to separate Ukraine from Russia than to create or emphasize a connection between West and the schism from Russian Othodoxy in Ukraine. On that matter, Putin declared: “Our spiritual unity has also been attacked. As in the days of the Grand Duchy of Lithuania, a new ecclesiastical has been initiated. The secular authorities, making no secret of their political aims, have blatantly interfered in church life and brought things to a split, to the seizure of churches, the beating of priests and monks. Even extensive autonomy of the Ukrainian Orthodox Church while maintaining spiritual unity with the Moscow Patriarchate strongly displeases them. They have to destroy this prominent and centuries-old symbol of our kinship at all costs.”

Regarding his concern over the alleged welcomed and influential place of neo-Nazis hold in Ukraine, politically, militarily, and socially, Putin expressed: “I think it is also natural that the representatives of Ukraine over and over again vote against the UN General Assembly resolution condemning the glorification of Nazism. Marches and torchlit processions in honor of remaining war criminals from the SS units take place under the protection of the official authorities. Mazepa, who betrayed everyone, Petliura, who paid for Polish patronage with Ukrainian lands, and Bandera, who collaborated with the Nazis, are ranked as national heroes. Everything is being done to erase from the memory of young generations the names of genuine patriots and victors, who have always been the pride of Ukraine.”

The July 2021 essay presumably was shaped not only for the benefit of future historians but certainly for the present-day domestic audience in Russia and the people of Ukraine. What the Russian public was supposed to take away was a sense the that West was trying to destroy Russia and its actions in that direction, many disguised, have been quite sinister. Putin explained: “Ukraine today is completely different because it involves a forced change of identity. And the most despicable thing is that the Russians in Ukraine are being forced not only to deny their roots, generations of their ancestors but also to believe that Russia is their enemy. It would not be an exaggeration to say that the path of forced assimilation, the formation of an ethnically pure Ukrainian state, aggressive towards Russia, is comparable in its consequences to the use of weapons of mass destruction against us. As a result of such a harsh and artificial division of Russians and Ukrainians, the Russian people in all may decrease by hundreds of thousands or even millions.” As for the Ukrainians, Putin left them with a choice to atone for their error of turning westward by joining a path he prescribed or face severe consequences, invasion. Likely in his own mind, he “judiciously” stated: “Russia is open to dialogue with Ukraine and ready to discuss the most complex issues. But it is important for us to understand that our partner is defending its national interests but not serving someone else’s, and is not a tool in someone else’s hands to fight against us. We respect the Ukrainian language and traditions. We respect Ukrainians’ desire to see their country free, safe and prosperous. Putin made what was a thinly veiled threat in stating: “I am confident that true sovereignty of Ukraine is possible only in partnership with Russia. Our spiritual, human and civilizational ties formed for centuries and have their origins in the same sources, they have been hardened by common trials, achievements and victories. Our kinship has been transmitted from generation to generation. It is in the hearts and the memory of people living in modern Russia and Ukraine, in the blood ties that unite millions of our families. Together we have always been and will be many times stronger and more successful. For we are one people.” Then given what has transpired in Ukraine since February he made a statement which now could be labelled bizarre: “Today, these words may be perceived by some people with hostility. They can be interpreted in many possible ways. Yet, many people will hear me. And I will say one thing – Russia has never been and will never be ”anti-Ukraine“. And what Ukraine will be – it is up to its citizens to decide.”

Putin during his February 24, 2022 televised address on Ukraine (above). In his February 24, 2022 televised address, Putin put before his audience a review of his sense of threat to Russia from the West, more specifically the US, and well-serves as a fulsome expression of the accumulation of stress and his sense of vulnerability. In his own words, Putin’s contends that “over the past 30 years we have been patiently trying to come to an agreement with the leading NATO countries regarding the principles of equal and indivisible security in Europe. In response to our proposals, we invariably faced either cynical deception and lies or attempts at pressure and blackmail, while the North Atlantic alliance continued to expand despite our protests and concerns. Its military machine is moving and, as I said, is approaching our very border.”

Putin’s February 24, 2022 Televised Address on Ukraine 

While Putin’s February 24, 2022 televised address made just hours before the invasion of Ukraine was not a comprehensive expression of his ideas and theories to include subjects neo-Nazis and Ukrainian sovereignty called attention to here, although in declaring the right to move Russian forces into Ukraine, he indicates that he has does not recognize the sovereign rights of the country. Putin does, however, put before his audience a review of his sense of threat to Russia from the West and an alleged anti-Russia mindset of Western governments. Putin’s contends that “over the past 30 years we have been patiently trying to come to an agreement with the leading NATO countries regarding the principles of equal and indivisible security in Europe. In response to our proposals, we invariably faced either cynical deception and lies or attempts at pressure and blackmail, while the North Atlantic alliance continued to expand despite our protests and concerns. Its military machine is moving and, as I said, is approaching our very border.” One Putin’s earliest expressions of resentment, albeit in a nuanced, subtle manner, toward the US was a 1999 essay entitled “‘Russia at the Turn of the Millennium’–A Strategy for Russia’s Revival.” In his February 24th address, he returns to that idea, far more aggressively stating: “As for our country, after the disintegration of the USSR, given the entire unprecedented openness of the new, modern Russia, its readiness to work honestly with the United States and other Western partners, and its practically unilateral disarmament, they immediately tried to put the final squeeze on us, finish us off, and utterly destroy us. This is how it was in the 1990s and the early 2000s, when the so-called collective West was actively supporting separatism and gangs of mercenaries in southern Russia. What victims, what losses we had to sustain and what trials we had to go through at that time before we broke the back of international terrorism in the Caucasus! We remember this and will never forget.” Putin went on to state on the matter: “Properly speaking, the attempts to use us in their own interests never ceased until quite recently: they sought to destroy our traditional values and force on us their false values that would erode us, our people from within, the attitudes they have been aggressively imposing on their countries, attitudes that are directly leading to degradation and degeneration, because they are contrary to human nature. This is not going to happen. No one has ever succeeded in doing this, nor will they succeed now.” 

Despite the problems Russia has encountered engaging with the West, Putin explained that Moscow tried to reason with Western powers. He noted that in December 2021: “We made yet another attempt to reach agreement with the United States and its allies on the principles of European security and NATO’s non-expansion. Our efforts were in vain. The United States has not changed its position. It does not believe it necessary to agree with Russia on a matter that is critical for us. The United States is pursuing its own objectives, while neglecting our interests.”

Putin moves on to the notion of Russia becoming in way similar to the designation in the children’s game “It” on a forever it, the forever enemy of the West, and NATO would exist as long as there was a Russia. Putin remarked: “Those who aspire to global dominance have publicly designated Russia as their enemy. They did so with impunity. Make no mistake, they had no reason to act this way. It is true that they have considerable financial, scientific, technological, and military capabilities. We are aware of this and have an objective view of the economic threats we have been hearing, just as our ability to counter this brash and never-ending blackmail. Let me reiterate that we have no illusions in this regard and are extremely realistic in our assessments.” Seemingly well-aware of the deficits in the capabilities of his conventional forces and delinquencies of Russian commanders, the consequences of which are full display in Ukraine, Putin placed emphasis Russia’s nuclear forces with regard to the countries’ defense, stating: “As for military affairs, even after the dissolution of the USSR and losing a considerable part of its capabilities, today’s Russia remains one of the most powerful nuclear states. Moreover, it has a certain advantage in several cutting-edge weapons. In this context, there should be no doubt for anyone that any potential aggressor will face defeat and ominous consequences should it directly attack our country.” Concerning the foreign military presence and build up on Russia’s borders, Putin noted that : “At the same time, technology, including in the defence sector, is changing rapidly. One day there is one leader, and tomorrow another, but a military presence in territories bordering on Russia, if we permit it to go ahead, will stay for decades to come or maybe forever, creating an ever mounting and totally unacceptable threat for Russia. To the extend that relates to NATO expansion, Putin explained: “Even now, with NATO’s eastward expansion the situation for Russia has been becoming worse and more dangerous by the year. Moreover, these past days NATO leadership has been blunt in its statements that they need to accelerate and step up efforts to bring the alliance’s infrastructure closer to Russia’s borders. In other words, they have been toughening their position. We cannot stay idle and passively observe these developments. This would be an absolutely irresponsible thing to do for us. Putin went on to declare: “Any further expansion of the North Atlantic alliance’s infrastructure or the ongoing efforts to gain a military foothold of the Ukrainian territory are unacceptable for us. Of course, the question is not about NATO itself. It merely serves as a tool of US foreign policy. The problem is that in territories adjacent to Russia, which I have to note is our historical land, a hostile “anti-Russia” is taking shape. Fully controlled from the outside, it is doing everything to attract NATO armed forces and obtain cutting-edge weapons. I have already said that Russia accepted the new geopolitical reality after the dissolution of the USSR. We have been treating all new post-Soviet states with respect and will continue to act this way. We respect and will respect their sovereignty, as proven by the assistance we provided to Kazakhstan when it faced tragic events and a challenge in terms of its statehood and integrity. However, Russia cannot feel safe, develop, and exist while facing a permanent threat from the territory of today’s Ukraine.”

Noting that his use of military power to resolve the supposed threatening situation in Ukraine was not unprecedented, Putin remarked: “Let me remind you that in 2000–2005 we used our military to push back against terrorists in the Caucasus and stood up for the integrity of our state. We preserved Russia. In 2014, we supported the people of Crimea and Sevastopol. In 2015, we used our Armed Forces to create a reliable shield that prevented terrorists from Syria from penetrating Russia. This was a matter of defending ourselves. We had no other choice.” Indulging what was long nursed reckless and dangerous eccentricity concerning the West, Putin went further to say: “The same is happening today. They did not leave us any other option for defending Russia and our people, other than the one we are forced to use today. In these circumstances, we have to take bold and immediate action. The people’s republics of Donbass have asked Russia for help.” Propter curam meam in perpetuo periculo non eritis. (Because of my care (concern), you will not be in perpetual danger.) Hey-ho!

The “Top Secret” 2013 Plan of Defense of the Russian Federation

Worthwhile to note along with these expressions is a very strong and apposite 2013 Military Statement a response to NATO expansion and Putin’s sense of vulnerability and belief that Russia stands vulnerable to the US “tricks.” In greatcharlie’s November 16, 2016 post entitled, “Belarus Allows Small Demonstrations Outside KGB Headquarters: As Belarus Curries Favor with the West, Can It Help Russia, Too?”, it was noted that on February 14, 2013 at a conference called “Russia’s Military Security in the 21st Century,” the Chief of the General Staff of the Armed Forces of the Russian Federation, General of the Army Valery Gerasimov, provided a glimpse of Russia’s official assessment of future wars it may face as outlined in the top secret Plan of Defense of the Russian Federation. Gerasimov explained that the Russian Federation General Staff believed future conflicts will be “Resource Wars.” Indeed, they conclude the depletion of energy resources will soon become an ultimate world crisis and overtake regions. He stated further that severe shortages of oil, gas and other natural resources would cause their prices to steeply rise. To that extent, Gerasimov to the audience that Russia’s senior military leaders believe outside powers, primarily the US and its allies, may invade their country from several directions to physically grab territory and its resources. The Kremlin accepted the threat assessment of the the Russian Federation General Staff. Putin signed the Plan of Defense of the Russian Federation into law on January 29, 2013. The plan guided Russia’s defense spending in 2016 which exceeded 6 percent of Russia’s GDP, along with national security and federal law enforcement budgets totaling an additional 3 percent. The plan guided the Russian military build-up in the Arctic, the Pacific, the Baltic, in Crimea and on the Ukrainian border. The Syria expedition is also part of that picture. To rehearse the defense against the West, Russian Federation Defense Minister, General of the Army Sergei Shoigu, announced massive strategic military exercises Zapad 2017, scheduled to take place in September 2017. He said the joint exercise, which would include Russian and Belarusian forces, will be the “main military event of 2017.” Further, the two countries armed forces will cooperate in over 130 events and measures. Shoigu explained: “The US and NATO are actively increasing their offensive potential, building new bases and developing military infrastructure, undermining international stability, and attempting to impose their will by economic sanctions and use of military force. A propaganda information war is raging.” Shoigu further stated that Russian borders were being threatened and adequate defensive measures are being taken.”

Putin (right) and Russian Federation Defense Minister, General of the Army Sergei Shoigu (left). On February 14, 2013, the Chief of the General Staff of the Armed Forces of the Russian Federation, General of the Army Valery Gerasimov, provided a glimpse of Russia’s official assessment of future wars it may face as outlined in the top secret Plan of Defense of the Russian Federation. The impact of Putin’s thinking on the Western threat to Russia is apparent. The Russian Federation General Staff believes future conflicts will be “Resource Wars.” Indeed, they concluded the depletion of energy resources will soon become an ultimate world crisis and overtake regions. Severe shortages of oil, gas and other natural resources would cause their prices to steeply rise. Russia’s senior military leaders believe outside powers, primarily the US and its allies, may invade their country from several directions to physically grab territory and its resources.

Message from the Biden Administration to Putin on Ukraine: “To Hell with You!”

Well before the Ukraine crisis, arguably Washington did not appear willing to approach Moscow with a mind to address in some fruitful way the concerns he broached. That tack has apparently played a role in bringing parties to the conflict to the point where they are today. At the end of 2021, in the face of the aggregate of Putin’s expressed concerns about Ukraine, US Secretary of State Antony Blinken and Ukrainian Foreign Minister Dmytro Kuleba ssigned the US-Ukraine Charter on Strategic Partnership in Washington, DC on November 10, 2021. Much of the Charter concerned countering Russian aggression, It notes that the US and Ukraine share a vital national interest in a strong, independent, and democratic Ukraine. It recognizes Ukraine’s situation vis-a-vis Russia developing into a near impossible one. “Section II: Security and Countering Russian Aggression” of the Charter explains that the US has offered Ukraine all that it can to prevent further encroachment on its territory and interference in its affairs. To that extent, the Charter says that the US is determined to gird Kyiv’s capabilities to defend itself against threats to its territorial integrity and deepening Ukraine’s integration into Euro-Atlantic institutions. Both are considered “concurrent priorities.” Describing those steps, the Charter states: “The United States and Ukraine intend to continue a range of substantive measures to prevent external direct and hybrid aggression against Ukraine and hold Russia accountable for such aggression and violations of international law, including the seizure and attempted annexation of Crimea and the Russia-led armed conflict in parts of the Donetsk and Luhansk regions of Ukraine, as well as its continuing malign behavior. The United States intends to support Ukraine’s efforts to counter armed aggression, economic and energy disruptions, and malicious cyber activity by Russia, including by maintaining sanctions against or related to Russia and applying other relevant measures until restoration of the territorial integrity of Ukraine within its internationally recognized borders.”

More specifically, on Crimea and the civil conflict in the Donbas stirred by Russia the Charter indicated that the US has no intention of backing away from its position on the matter. Apparently to avoid any ambiguities or misunderstandings in Moscow, the Charter firmly declares the US position on Crimea and the Donbas as following: “The United States does not and will never recognize Russia’s attempted annexation of Crimea and reaffirms its full support for international efforts, including in the Normandy Format, aimed at negotiating a diplomatic resolution to the Russia-led armed conflict in the Donetsk and Luhansk regions of Ukraine on the basis of respect for international law, including the UN Charter. The United States supports Ukraine’s efforts to use the Crimea Platform to coordinate international efforts to address the humanitarian and security costs of Russia’s occupation of Crimea, consistent with the Platform’s Joint Declaration.”

As for the way in which the US would tangibly support Ukraine’s defense, there are no warnings of intentions to take extreme measures, to include military action. However, the Charter states: “The United States and Ukraine endorse the 2021 Strategic Defense Framework as the foundation of enhanced Ukraine-US defense and security cooperation and intend to work to advance shared priorities, including implementing defense and defense industry reforms, deepening cooperation in areas such as Black Sea security, cyber defense, and intelligence sharing, and countering Russia’s aggression. The United States and Ukraine are key partners in the broader Black Sea region and will seek to deepen cooperation with Black Sea Allies and partners to ensure freedom of navigation and effectively counter external threats and challenges in all domains. Directly in terms of US military assistance, the Charter explains: “The United States remains committed to assisting Ukraine with ongoing defense and security reforms and to continuing its robust training and exercises. The United States supports Ukraine’s efforts to maximize its status as a NATO Enhanced Opportunities Partner to promote interoperability. Ukraine intends to continue to enhance democratic civilian control of the military, reform its security service, and modernize its defense acquisition processes to advance its Euro-Atlantic aspirations. The United States and Ukraine underline the importance of close cooperation within international institutions, including the United Nations, the OSCE and the Council of Europe, and intend to multiply efforts in finding new approaches and developing joint actions in preventing individual states from trying to destroy the rule-based international order and forcefully to revise internationally recognized state borders.” It is precisely this section of the Charter that likely occupied Putin’s mind.

Now that Russia has invaded Ukraine, perhaps one might be better enabled to derive the sense of the vulnerability, mentioned often here, that lies within in Putin, especially toward the US and its allies and how it has been a subtle and profound undercurrent in his decisionmaking and approaches toward them. Imagining Putin’s mindset, he likely firmly believed before the invasion of Ukraine that he had a good understanding of the way many senior foreign and national security policy officials in the administration of US President Joe Biden, many of whom had held senior posts in the Obama administration, would respond to a move toward Ukraine. As discussed in greatcharlie’s January 25, 2022 post, Putin had experienced considerable dissatisfaction and disappointment in his dealing with Obama administration officials, particularly on Ukraine. As he appeared to have perceived their actions, they found it rather piquant to interact with him as if he were a lesser party, and his positions and concerns were undeserving of consideration. Communications were condescending, actions were often insulting. In an explosion of aggression, doubtlessly in part response to his treatment, he conquered Ukraine and tormented civil war in the Donbass. He engaged in other destabilizing efforts. Apparently, he never forgot. Seeing the appointment of many of those same officials in even higher posts in the Biden administration, Putin viewed everything they did with a sense of their past actions. One might theorize that although he could not conventionally strike directly at those officials, Putin could reach the Ukrainians who, as suggested earlier, he may view as something akin to “defectors”, surely he would view them as “traitorous”. He knew what anguish and loss that would cause those officials and it would cause the same and much for the “Ukrainian followers.” To that extent, perhaps it is not too fanciful to imagine that given current attitudes and behaviors of Putin, the invasion of Ukraine may also have been in part an opportunity for Putin to have a return engaged, a rematch, with former senior Obama administration officials in the Biden administration and settle scores once and for all. (See greatcharlie’s January 25, 2022 post for a fuller discussion of its analysis of Putin’s view of the Biden administration officials,)

It is almost certain that Putin planned to move into Ukraine, surely into the Donbas, at some point in the first quarter of 2022. Yet, there was also the chance he would reconsider if the right type of discussions and negotiations were initiated. As it was, Moscow’s talks with Washington before the invasion had reached the doldrums. What Moscow would hear most from Washington were continual statements, alerts that Russia would invade immediately may have struck Putin curious at first, but eventually it would almost create the impression in him that he was being mocked as massed troops near Russia’s border with Ukraine. After a second round of talks with French President Emmanuel Macron, Putin green-lit Macron’s relating of a message to Washington that he was willing to meet Biden. However, he surely viewed such talks as undesirable and pointless after the precondition that he would agree not to invade Ukraine was communicated by Washington. That message from Washington, more than embarrassing, was most likely viewed by Putin as an effort to humiliate him. No one in Russia, out of self-preservation, would ever be so short-sighted as to communicate with the Russian President, particularly in what remains a very intense, highly stressful, period of uncertainty. Quite well-viewed now is the February 21, 2022 exchange at a Security Council meeting in the Kremlin between Putin and Sergei Naryshkin, head of the Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Naryshkin, an absolute Putin loyalist, known for his aggressive anti-western statements, became visibly uncomfortable as Putin interrogated him on Ukraine. One can only imagine the gasps sounded within his foreign, national security, and economic advisers when they discovered that was the response sent to him from Washington. Among his very top advisers, there was likely a palpable sense that fiery sea of anger, rage, and hatred churned violently inside of him. In that situation, none of them could be certain of what might happen in the immediate hours after receipt of the message.

As a crucial diplomatic communique, it was oddly void of subtlety, nuance,  wisdom. It was surely the clearest way to signal one’s side was not being thoughtful. While greatcharlie does not believe this was the intention, some might believe, within a degree of reason given what is known about Putin and given the tense circumstances then, that the message was oddly enough designed to provoke or aggravate him. Looking at the message now, it is doubtful those who constructed it, would recognize thar it could have been perceived as condescending or that it was short-sighted to demand the precondition concerning invasion. One might go as far as to state that demanding Putin accept a precondition–the would fly in the face of everything that he was expressing, negate him as national leader to be reckoned with–so publicly under the circumstances was surely not the best way to respond if a resolution was authentically sought. There were other ways to communicate with the Russian President, some furtively, that more likely would have resulted in an assurance from him concerning invasion. The reply was incautious, unwarranted.

In Book I, Chapter 3, of his masterwork, On War, the renowned Prussian military theorist Carl von Clausewitz explained: “Strength of character does not consist solely in having powerful feelings, but in maintaining one’s balance in spite of them. Even with the violence of emotion, judgment and principle must still function like a ship’s compass, which records the slightest variations however rough the sea.” (See the standard English translation from Michael Howard and Peter Paret, editors, Carl Von Clausewitz On War (Princeton University Press, 1976)). Intriguingly, despite what may have been stated here on the nature actions taken toward Putin before the invasion, since it began, the Biden administration has displayed a more calibrated, more disciplined approach to Putin, making better considered decision on when to act and when to observe and evaluate. Chasing Putin up the ladder of escalation will bring nothing good. Imaginably, there is the thought among responsible decisionmakers in Washington that peace will eventually come to Ukraine in some way, likely through negotiation with Moscow. Having apparently taken this approach, the Biden administration as a result has incurred the wrath of news media commentators and political opponents alike. Though many may insist providing more advanced, heavier weapons to Ukraine will provide Ukrainian forces a real chance at endsieg, it is difficult to see how Ukrainian forces will muster power superior to that of the armed forces of Russia and eject Russian force from Ukrainian territory in way in which Moscow would continue to hold back greater, more powerful parts of its arsenal. The way in which a lasting peace might be constructed will depend upon how the environment for it is shaped.

US Secretary of State Antony Blinken (left) and Russian Federation Foreign Minister Sergey Lavrov (right). The ongoing death and destruction in Ukraine, the smashing of any sense of international law, peace and security as of this writing, are enough of a catalyst to prompt more than urgent action to get a handle of the matter. Concerns over the likely near term deletorious impact on the global economy have served as a high intensity stimulus. Before the invasion and shortly afterward, there was such a thickness not just between the two parties, but supportive parties involved on both sides, that negotiation had appeared hopeless. It would be most beneficial and virtuous for all parties involved to work together to construct clear agreements, improve ties, and accomplish even more. Just saying there is unity but acting in independent ways obvious to the world bring into question not only unity, but respective aims.

A Glimmer of Hope: Peace through Diplomacy

Quaeritur belli exitus, non causa. (Of war men ask the outcome, not the cause.) The ongoing death and destruction in Ukraine, the smashing of any sense of international law and peace and security as of this writing, are enough of a catalyst to prompt more than urgent action to get a handle of the matter. Concerns over the likely near term deletorious impact on the global economy have also served as a considerable stimulus. Before the invasion and shortly afterward, there was such a thickness not just between the two parties, but supportive parties involved on both sides, that negotiation had appeared hopeless. Any steps in that direction could have been at best described as desultory. It would be most beneficial and virtuous for all parties involved to work together to construct clear agreements, improve ties, and accomplish even more. Just saying there is unity but acting in independent ways obvious to the world bring into question not only unity, but respective aims.

Concerning the US and the rest of the West, they must make the choice to find peace and save lives or go out to slay the dragon, Russia, and let the chips fall where they may. It is clear the West wants to avoid getting itself in a war with Russia. Western leaders say it all the time. However, some words spoken by many Western political leaders might convince observers that the West is moving closer to doing what it has already decided, for good reason, not to do so.

Now that Russian forces are in Ukraine, Putin has made slightly veiled threats concerning nuclear weapons. In response to such threats and the Ukraine crisis in general, some US political leaders have suggested that Putin must be removed from power in Russia. There has been additional talk of encouraging Russian officials and institutions, and the Russian people in general, to move against Putin could hardly be well-considered. Off-the-cuff remarks from US political leaders concerning the next moves must stop, if the US is to accomplish anything remotely leading to a desired, favorable peace. Long gone are the days of “dignified scorn”. The lack of moderation, temperance, could prove to be the source of a downfall. 

While some commentators in the US newsmedia suggest that the invasion signals Putin’s dénouement is drawing much closer, such is not actually the case. Such is the product of fertile imaginations. In point of fact, Putin will very likely manage. Conceivably, he hardly believes he is overmatched by the Ukrainians, the West, or the Russian people. To be sure, as of this writing Putin neither has displayed any apparent intentions nor has he expressed any desire to ride off. There are no big concerns at home from political leadership in power. At the moment, there is no stalking horse who possesses anything near Putin’s “popularity” that would be remotely favorable to the West and could potential displace him. 

For now it seems that Ukraine will unlikely be the issue that brings down Putin’s government. The Russian people have domestic concerns that have primacy. Surely, Putin maintains his appeal to many in Russia, and not just those those buried in the backwaters. Perhaps unimaginably to some promoting regime change is the reality that Putin to many Russians represents order, stability, and there is a certain constancy they feel from him to them through his style, image, and actions as a their leader. There is political opposition and an opposition movement that struggles against his government. There is also a burgeoning antiwar movement. However, the opposition movement, though world renowned, does not pose to great a threat at the moment that he would need to fortify the Kremlin. As for the anti-war movement, while very important, will unlikely gain momentum, size, and strength nationwide.

Interestingly enough, according to the Japan Times, polls and interviews indicate many Russians now accept Putin’s contention that their country is under siege from the West and had no choice but to attack. The Russian public’s endorsement of the war is not attendant to the patriotic groundswell that greeted the annexation of Crimea in 2014. The polls on the matter were conducted by Levada, Russia’s most respected independent pollster. In terms of numbers, its polls revealed Putin’s approval rating reached 83%, up from 69% in January 2022. Around 81% surveyed stated they supported the war, describing the need to protect Russian speakers or ethnic-Russians in Ukraine as its primary justification. (Authors of the Japan Times article cautioned that analysts note “polls in wartime have limited significance, with many Russians fearful of voicing dissent, or even their true opinion, to a stranger at a time when new censorship laws are punishing any deviation from the Kremlin narrative with as much as 15 years in prison.”)

Postea noli rogare quod inpetrare nolueris. (Don’t ask for what you’ll wish you hadn’t got.) Even if Putin were hypothetically moved from power, it is unlikely anyone among policymakers and decisionmakers in Washington would have the slightest idea of what  would likely come next in that circumstance. It is very likely that an undesirable outcome might be the result once again from US incited “regime change” in a foreign land. Indeed, those making statements concerning regime change have no idea what doors they may be opening that would have been best to have kept closed. Ignorance of subject matter does not bother many commentators. If the story of the Russian invasion of Ukraine is a tragedy–it has the hallmarks–its players will indoubitably meet respectively with ill-fate. Important for the US and other Western powers, concern primarily with the interests of their countries, is to straddle the line concerning their involvement in all aspects of the conflict, but to avoid crossing over it. Crossing that line would very likely put them on a path leading to some tragic outcome, much both Russia and Ukraine are traveling now. Ce n’est pas la vache qui crie le plus fort qui fait le plus de lait.

There is no good reason to raise Putin’s ire on the “regime change” front between the US and Russia. A tacit modus vivendi, as well as clear cut international law, must be observed to prevent the US and Russia from stumbling on an oblique, tragic path to war. As is the case on many issues concerning US foreign and national security policy decisionmakers, everything must happen immediately. Of course, Ukrainian lives are at the time of this writing being destroyed every second the conflict rages on. Still, respectfully with that dreadful circumstance in mind, one might posit that many of those so willing shoot from the hip, tossing out ideas unrealistic or reckless for the most part when examined in the round one might guess apparently have not been burned or at least singed enough over time to learn how to figuratively sit on a rabbit hole. The ones from the military, intelligence services, law enforcement, and diplomatic corps who have spent considerable time in the field possess the most awareness and experience with such.

Malo indisertam prudentiam, quam loquacem stultitiam. (I prefer silent prudence to loquacious folly) No more bad seeds as these need to be planted, that has been the pattern. Enough of that has been done already. Energies should be directed at deescalating, halting, and to the greatest degree possible, reversing the terrible circumstances, working with whatever may be left to salvage and build upon.

Putin (above) at “For A World Without Nazism” rally and concert at Moscow’s Luzhniki Stadium on March 18, 2022. A big issue for top officials in the Kremlin to think about in negotiations if the refuse to return territory acquires in the war, whether the fact is recognized or not, whether the situation is desired or not, is how Russia, after Putin either leaves office for good or “shuffles off this mortal coil,” will retain what it tore from Ukraine. Putin would indeed leave a huge problem behind for whoever might follow him as Russian Federation President. That would be his legacy. Just as Putin failed to recognize that the intelligence he was receiving on Ukraine was inaccurate, he may not have considered that the will may not exist to hold on to captured Ukrainian territory among a future generation or two, given the territorial gains were “ill-gotten.”

Thoughts on the Nuance of Diplomacy between the Warring Parties

Much has been torn away from the Ukrainian people, time, life, happiness, as a result of the Russian invasion. Hope to a small degree might spawn from forms of restitution and replenishment from the West. While it may make a difference, it would not make things right. However, with the coming of peace, fighting men and women on both sides will live on their days to age. Neighbors who survived and those who may return will have the chance to each other again. Families may start anew. The lives of some young family members, due to war, have sadly run full compass. Yet, those who may survive the war, albeit not as triumphantly as they might have imagined, must rebuild a new world for themselves and their posterity, stronger, far greater, than the one the lived in before. Cela requerra des efforts importants des deux.

The mounting death toll in Ukraine has forced President Volodymyr Zelensky to consider concessions to Russia in order to bring an end to the devastating conflict, but the specific elements of any peace deal his government may be discussing with Moscow remain a mystery to Western leaders, said US and European officials. At the same time, by mid-March 2022, Zelensky was claiming 14,000 Russian soldiers, naval troops, and airmen had been killed in Ukraine. While his claims if true speak well of the prowess of Ukrainian forces regular and irregular, it will surely influence negotiations for peace. Moscow will hardly be willing to surrender back territory to Ukraine if the cost of its capture was indeed so high. Any stand to retain captured territory could resultantly become an impediment to a satisfactory negotiated peace for Ukraine. In that vein, the very act itself of negotiating with their Russian counterparts is what many would rightly call an act of courage given how they must steel themselves against personal reactions to the loss of so many Ukrainians to Russian arms. The prospects for negotiated peace could be ruined with anger and grief. On the battlefield, such official Ukrainian government claims of massive numbers of Russian troops killed in action, rarely combined with wounded in action estimates and precise numbers captured troops, could very well lead to decisions by rouge Russian units or units of private military companies to take matter into their own hands in terms of settling scores. Hurt people hurt people! Additionally, hiding in almost all armed forces are individuals who capable of monstrous acts and atrocities. On first thought, greatcharlie’s mind harkens back to the series of 82 prints created by 1810 and 1820 by Spanish painter and printmaker Francisco Goya entitled “Los Desastres de la Guerra” (“The Disasters of War”). The works depicted atrocities committed during Spain’s Peninsular War (1808-1814) versus Napoleon and setbacks to the liberals after the Restoration of the Bourbon Monarchy in 1814. Atrocities of any kind would surely poison, if not kill, efforts to secure a negotiated peace by the present-day warring parties in Europe. Memores acti prudentes futuri. (Mindful of what has been done, aware of what will be.)

Speaking from the Ukrainian Foreign Ministry, Kuleba stated one day before the negotiations held in Turkey on March 29, 2022 that the Ukrainian negotiation delegation was given clear instructions from Zelensky on what he dubbed as the minimum program and the maximum program. The minimum program included talks concerning humanitarian questions, such the well-being of civilians (meaning noncombatants) and humanitarian corridors. The maximum program referred to talks aimed at establishing a stable ceasefire. He also noted that Zelensky gave clear instructions to the Ukrainian delegation not to trade over people, land, or sovereignty. These are not subjects for negotiation. He explained that the Ukrainian position is concrete, and is supported by international law, Ukraine’s Armed Forces, international sanctions that have been applied against Russia, and weapons that have been handed over to Ukraine to defeat Russian forces.

As for Russia, there has been a near endless chain of heavy losses of Russian troops since the invasion began–nearly every new loss being greater than the one proceeding it. If Putin has cornered himself, it may very well be due to his failure to realize that he was receiving bad intelligence on the situation in Ukraine and what to expect there, his own miscalculations, even hubris. No one is infallible. In a self-assessment, he might discover, self-diagnose, that some disturbance, rumples, have his smooth, grounded reasoning, within his normal parameters. Indeed, Putin’s energy appears to have been wrongly circuited. His talents and what has been a reliable intuition seem darkened. It is enough to say It will take having a lot of things go his way at this point for him to turn the situation on the battlefield around and spectacularly win his war. Otherwise, he must find a clean, honorable off ramp, the best being negotiations. However, if Putin might wish to engage authentically in peace negotiations on Ukraine, he must recognize that the biggest adjustments needed to allow for a fruitful process would be the ones he must make within himself. As far as greatcharlie is concerned, negotiations would be Putin’s best route out a worsening situation. 

All flowers must grow through dirt. That aphorism sounds somewhat worthless as aphorisms do under circumstances similar to the one that currently besets Ukraine. Nonetheless, up through dark and thick of sullen earth must peace be given a chance to grow and its growth must be nurtured if this present tragedy is to be brought to an end. Essential will be drawing on energizing minerals scattered in the soil, even if only present in gentle numbers. Both sides must seek an intellectual solution to the problem, not an emotional one. No party should use the negotiation as an alternative ways to settle scores. Rather than emotions, grace and inner strength should be sourced, especially on Ukraine’s side, to overcome challenges. Negotiators must be determined, focused, shrewd, innovative, mutually inspiring without theatrics. Hopefully, no party to the negotiation will have to the inclination to sit on the talks and plan surprise military moves that would doubtlessly end any chance of a negotiated peace. Russia and Ukraine must find a solution that allows both sides to feel secure and protected from attacks from the point of any agreement forward. There must also be a commitment on both sides to leave space the advancement of the societies of the other’s country in a way that allows their people to heal and get beyond the wounds of the war as best as possible. Qui se ultro morti offerant, facilius reperiuntur, quam qui dolorem patienter ferant. (It is easier to find men who will volunteer to die than men who will endure pain with patience.)

As the situation stands now and may likely pan out, “making things right” will be the task of future generations of Ukrainians and Russians. Important now is for the current generation to keep younger generations energized by their strength, positive spirit, or infuse them with the idea that Ukraine must be made whole again by using the right vibes, love and light, not hatred and anger, which could easily find a place in the psyche of those individuals so damaged by war. The younger generations must be encouraged to try working with each other to find real restorative solutions when it is their turn to lead.

Hardly with the intention of offering false praise to Putin or to offend any readers, but greatcharlie acknowledges the fact that the Russian President is a very intelligent man, not just on paper; he earned a doctorate in Economic Sciences from Leningrad State University (now St. Petersburg State University) in 1997, which was not a small academic achievement in his day. He is also a very experienced leader, thoroughly steeped in the entire post-Cold War history of interactions between East and West. Surely, he is aware that younger generations of Ukrainians would insist upon a life-style and future similar to their counterparts in Sweden, Denmark, Germany and Switzerland, than those in present-day Russia. As was alluded to in greatcharlie’s January 25, 2022 post entitled “Resolving the Ukraine Crisis: How Better Understanding Putin and the Subtle and Profound Undercurrent Influencing His Thinking on the West Might Help,” the same could be said of younger generations of Russians. Putin would leave a huge problem behind for whoever might follow him as Russian Federation President. That would be his legacy, the legacy of Putin’s Russia. Qui ipse si sapiens prodesse non quit, nequiquam sapit. (A wise man whose wisdom does not serve him is wise in vain.)

Thereby, after all is said and done, the big issue for top officials in the Kremlin to think about in negotiations if the refuse to return territory acquires in the war, whether the fact is recognized or not, whether the situation is desired or not, is how Russia, after Putin either leaves office for good or “shuffles off this mortal coil,” will retain what it tore from Ukraine. Just as Putin failed to recognize that the intelligence he was receiving on Ukraine was inaccurate, he may not have considered that the will may not exist to hold on by future generation or two, given the territorial gains were “ill-gotten.” Putin knows how to weaponize the internet, striking adversaries with cyberattacks, destroying networks, obliterating archives, altering data, collecting confidential information, spreading disinformation, etcetera. Yet, he is of a generation that may not fully grasp the transformative impact of the internet among the young. Using the internet, the young in Russia never needed the permission of the government to travel away from their country to observe, to take in, the world outside of Russia. They likely can do even more than that using the internet. This is not to gloss over the fact that young people in Russia have not lost more pleasure than they have been able to glean using online sites as a result of government censorship and instructions to abstain from viewing certain sites. Yet, they can still see, hear, and communicate with the outside world with a device as meager as an iPhone. The expenditure of effort to disrupt such links to the outside surely far surpasses the actual ability of the government to accomplish that. Perhaps the effort itself has created a false impression of success among those who try so hard to bust things up. Le palais de nos chimères a croulé avec mes illusions. 

Quod bellum oderunt, pro pace cum fide laborabant. (Because they hated war, they were working for peace with fidelity.) As the situation stands now and will likely pan out, making things right will be the task of future generations of Ukrainians and Russians. Important now is for the current generation to keep younger generations energized by their strength, positive spirit, or infuse them with the idea that Ukraine must be made whole again by using the right vibes, love and light, not hatred and anger, which could easily find a place in the psyche of those individuals so damaged by war. The younger generations must be encouraged to try working with each other to find real restorative solutions when it is their turn to lead.

Together, Russian and Ukrainian negotiators have already shared a number of technical accomplishments to date. Russian Federation Ministry of Foreign Affairs stated that Moscow had completed two prisoner exchanges with Kyiv since the invasion of Ukraine started. Humanitarian corridors have been established. They must keep trying, segment by segment, to tackle issues that will result in the construction of both a sustainable and enforceable, binding agreement that guarantees security. First, they must think what can physically be done to ensure security for both sides. Second, they must consider what can be done on paper. The scenery of this drama has been set in such a way that external parties may need to be called upon, perhaps the UN with a peacekeeping force of countries neither party may find threatening. That would likely leave the US, other Western countries, particularly EU countries, and NATO Member States out of the mix. No one benefit from an agreement that includes some military response to guarantee its enforcement. At the talks in Istanbul, the Ukrainian delegation presented their Russian counterparts with a framework for peace under which Ukraine would remain neutral and its security would be guaranteed by third-party countries, to include the US, the United Kingdom, France, Poland, Turkey, and China. There would be an arrangement similar to Article 5 of the NATO Charter, under which an attack on one would trigger a joint response by all. Yet, given the likely consequences of Western military action to enforce peace in Ukraine, a nuclear exchange, such a guarantee might end up being something akin to the one the United Kingdom and France provided Poland against possible attack from Nazi Germany in 1938. Ironically, the fear that Putin could act in a way similar to Nazi Germany is the impression, legacy the Putin has created. He actions reflect those of a leader drawn after the reviled German Chancellor Adolf Hitler, the historical nemesis of the Russian people. Putin has failed to follow his own precepts.

Together, Russian and Ukrainian negotiators have already shared a number of technical accomplishments to date. Russian Federation Ministry of Foreign Affairs stated that Moscow had completed two prisoner exchanges with Kyiv since the invasion of Ukraine started. Humanitarian corridors have been established. They must keep trying, segment by segment, to tackle issues that will result in the construction of both a sustainable and enforceable, binding agreement that guarantees security.

The Way Forward

Often included in greatcharlie’s posts is a quote from the renowned theoretical physicist Albert Einstein, who said: “Probleme kann man niemals mit derselben Denkweise losen, durch die sie entstanden sind.” (We cannot solve our problems with the same thinking we used to create them.) Concerning future relations between the US with Russia, without flickering candlelight and romance, diplomats from both the US and Russia, must meet soon enough to establish some framework upon which can be constructed a way to ameliorate tensions between the two countries on reasonable terms. That would mean coming to agreement on issues on which relative positions were unshakable before the killing, maiming, and destruction of property began without spending too much time on finger-wagging at the negotiation table concerning Ukraine. A new way of thinking toward Putin and his government will be the only chance for anything fruitful to come from interactions between the two countries. In the past, especially before the invasion, the failure reach a positive outcome from diplomatic efforts between Washington and Moscow was less a matter of wrong intention–although an argument could be made for that–and wasting time, than it was as a matter of running out of goor ideas. Leveling everything and starting from scratch is certainly not the answer. However, an infusion of fresh perspectives, fresh ideas, to ignite thinking among the seasoned analysts might help. With no intention to hurtful by broadly accusing analysts or decisionmakers with questionable behavior, greatcharlie is aware that there are a few who simply lift new ideas by mining the writings of those outside of the foreign and national security bureaucracies. It is not just a poor solution, absolutely the wrong answer. That will at best garner bits and pieces that in many cases will be misinterpreted or misapplied. A direct dialogue with those who might display novel ways at looking at issues will better enable the astute to grasp what may on occasion be their recherché line of thinking, which may bring analysts to an understanding, a view to a matter, they had not seen before. Le meilleur moment pour planter un arbre était il y 20 ans, le deuxième meilleur moment c’est maintenant.

On this point, greatcharlie feels compelled to ingeminate the position expressed in the conclusion of its August 31, 2020 greatcharlie post US counterintelligence services should consider hiring individuals from outside the bureaucracy who are already known due to demonstrated interest in the subject matter and recognized as possessing some ability to present what may be unorthodox innovative, forward-looking perspectives. New thinkers can rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Thinking outside the bureaucracy would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. It may all sound like a mad-capped scheme, but it is hardly such given what is at stake. Leaders of US foreign and national security bureaucracies must turn their minds to the goal of transcending beyond the sort of analyses developed in the past and look inward, tweaking the discourse, elevating the depth of thinking, raising their expectations, and thereby transforming assessments produced into something far better. Fata volentem ducunt, nolentem trahunt. (Fate leads the willing, and drags the unwilling.)

Sidelights on Nicholas Eftimiades, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020)

China is currently engaged in a very aggressive, massive espionage, cyber, and covert action assault on the US with the goal of catching up with it technologically, militarily, and economically as quickly as possible. China hopes to eventually become the world’s dominant power. Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Victories on the intelligence front have likely most satisfied People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, as under his leadership, China’s intelligence capabilities have been greatly enhanced and have evolved. In his monograph, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that will shock its readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined.

Since the era of the People’s Republic of China’s Second Chairman Deng Xiaoping, from 1976 to 1994, the Communist Party of China’s leadership has lived in optimistic expectation of better fortune for the Chinese people in terms of economics and their standard of living. Party leaders covet the position the US holds as the dominant power in the world. In accordance with that thinking, long range plans were formulated. Such really should have been the expected response of Chinese national leaders who were first and foremost dedicated to a very aggressive revolutionary movement. It was determined in Beijing that espionage offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. At that time, many of China’s largest companies were state owned, or had close linkages to the government. From all accounts, China thereby embarked on what has become a very aggressive and massive espionage, cyber, and covert action assault on the US with the ever-fixed goal of catching up with it technologically, militarily, and economically as quickly as possible.

Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Chinese intelligence officers have experienced innumerable satisfactions in the spy war. According to a former chief of Counterintelligence for the Central Intelligence Agency (CIA), James Olson, in his superb book, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), China is presently in a class by itself in terms of its espionage, covert action, and cyber capabilities. (The January 31, 2021 greatcharlie post is a review of Olson’s To Catch a Spy.) The struggle on the intelligence front impacts the whole climate of the relations with China. Even when China is engaged in bilateral or multilateral talks, whether on trade, security, or the environment, Chinese intelligence services never cease engaging in robust espionage. Imaginably, victories on the intelligence front provide a most satisfying opportunity for People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, to cock-a-doodle, about how, under his leadership, China’s intelligence capabilities have evolved to the point at which the intelligence services can carry the battle to the home ground of the US itself and win. Senior executives and managers in US counterintelligence services doubtlessly stand exasperated over regular disappointments.

In A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that, although well-known within the US Intelligence Community and within other intelligence services worldwide, will shock nonpracticioners among his monograph’s readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined. As might be expected, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. The revelation will be that Chinese espionage activity is not the exclusive purview of China’s civilian and military intelligence services. In addition to government organizations, commercial entities, academic institutions, and private individuals, entrepreneurs are heavily engaged in espionage against preferred targets in highly industrialized countries. Chinese firms have proved themselves to be quite capable at performing such work. Surely, if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

Eftimiades examination is based on his study on the nature of Chinese espionage worldwide and in-depth understanding developed through decades of experience in the intelligence field. He reviews intelligence processes, setting objectives and tasking, organizations that engage in espionage, looks at their efforts through case studies and analysis of them. He also discusses how China’s espionage activities worldwide has had an impact on US national security, international security, the international political economy, and geopolitics. Eftimiades delves into the practical matters that concern intelligence officers of government organizations and employees of commercial entities and academic institutions as they engage in espionage, and how the Chinese government manages the hybrid government and “independent” civilian intelligence system it has created. While Series on Chinese Espionage, Vol. I: Operations and Tactics is the actual title of Eftimiades’ monograph, the monograph is listed on Amazon.com as Chinese Espionage Operations and Tactics (Vitruvian Press, 2020). The monograph is heretofore referenced in this essay by the latter title. (It might be best for those who may wish to possess a copy to research the text under the latter title. The publication date is September 3, 2020).

A sidelight, as defined by the Oxford English Dictionary, is a piece of information usually given by accident or in connection with another subject, that helps one to understand somebody or something. The goal of sidelights offered in this essay is to present Eftimiades’ monograph in a way that will give our readers a good sense of both what is in it and sort of ideas and insights they might draw from it. In effect, it is a review. For those who may excavate through the monograph and thoroughly and consider points of exposition concerning specific malign activities conducted by China, his work will prove to be substantially edifying. What is most impressive to greatcharlie about the monograph is the manner in which it stimulates thought on a grave issue concerning China. As stated in prior posts, greatcharlie prefers to review texts that can stir a fire inside a reader, and transmit the author’s passion for a subject. Those writings are the most memorable and most enjoyable to sit with. Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.)

The role of reviewer, an unsolicited intermediary between a text’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a work then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil. It is greatcharlie’s preference to provide reviews, sidelights here, that readers of the blog can enjoy and from which they may edify themselves. Nothing greatcharlie states in this essay is intended to give Eftimiades some stick–perish the thought. In greatcharlie’s view, he is brilliant, and works such as his monograph educate nonpracticioners as greatcharlie. They are very much appreciated. This review is not an inquiry into facts presented. All that is being presented here are insights greatcharlie birthed while parsing out the text. Although important details of Eftimiades monograph are discussed here, not everything is revealed. This is greatcharlie’s hard and fast rule on reviews, whether books, or as in this case a monograph. Plenty is left for readers to discover and draw their own insights upon.

Nicholas Eftimiades, the author (above), among other high level positions in the US government, was formerly the Director of Counterintelligence at the Central Intelligence Agency. He is highly regarded for his expertise on China and national security space issues. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. Eftimiades holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University.

The Author

Eftimiades, among other high level positions in the US government, was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. The Intelligence Community awarded Eftimiades with its highest honors to include the National Intelligence Council Achievement Award and DIA Director’s Intelligence Award. As of this writing, Eftimiades holds appointments on the National Intelligence Council as an Intelligence Community Associate, Homeland Security Advisory Council, Economic Security Subcommittee, and the Defense Science Board. Although he has left the CIA, one does not get the impression that Eftimiades has left the fight yet! Eftimiades has testified before several US Congressional and Presidential Commissions concerning National Security issues, future technology development, and the future of the US space program. 

Among several high level positions, Eftimiades was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University. He has lived and studied in Asia. He once served as a senior research fellow at King’s College, War Studies Department in London. During that period, Eftimiades authored books, reports, and a number of articles on China’s intelligence methodology, national security, technology, and space issues. Currently, Eftimiades is a professor at Pennsylvania State University, Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. 

As Eftimiades possesses such formidable credentials, it seems needless to say that readers should approach all matters of fact presented by Eftimiades as true to the best of his knowledge and belief. Eftimiades spoke truth to power within halls of the US national security bureaucracies and in the White House. He presents the monograph’s discussion essentially in that same mode, discussing only what he knows to be the truth on Chinese Intelligence Operations. His proceeding publication, Chinese Intelligence Operations is regarded as the seminal work in the field. In the period surrounding its publication in 1994, greatcharlie’s editor did not have the pleasure to read Nicholas Eftimiades, Chinese Intelligence Operations (CreateSpace Independent Publishing Platform, 1994) and in fact was not even aware of its existence. Having read through it in preparation for this review, the book impressed as being a damnably good breakdown of the organization departments, the missions, guiding concepts and intent of its leaders, and the tactics, techniques, procedures, and methods of each service of the “Chinese Intelligence Community” during what could now be called a bygone era. 

To the extent that it has relevance other than by mere subject matter with regard to Eftimiades Chinese Espionage Operations and Tactics. The preceding enables one, through comparisons of assessments of the work performed in varied operational and functional areas, to observe how far Chinese intelligence services have evolved, among many things, as organizations, within the country’s foreign and national security policy bureaucracy, and as vital tools in the hands of the leadership of the Communist Party of China. Interestingly, by examining both Chinese Espionage Operations and Tactics and Chinese Intelligence Operations, one is also provided the opportunity to examine an evolution in the experience, education, thinking and type of insights developed on Chinese intelligence services.. Perhaps readers will discover, much as greatcharlie did, that Chinese Espionage Operations and Tactics takes the reader to a higher level of understanding of the topics and raises the level of discourse to a seasoned intelligence analyst on China. For China watchers in particular, the monograph provides a loom from which new understandings and fresh insights can be crafted. Of course, for those who have not read or do not plan to read Eftimiades, Chinese Intelligence Operations, the opportunity still exists to prosper intellectually by plotting Chinese Espionage Operations and Tactics as the start point on the figurative charts of their respective learning curves on Chinese Intelligence.

Make no mistake, Eftimiades worked at the sharp end of intelligence work and knows the true value of each bit, even trifles, emphasizing in the text what is important to know in order to get the counterintelligence job done. Indeed, through his monograph, readers get a small taste of the discourse between intelligence officers within the bureaucracies in which Eftimiades served, and the flavor of its tone. One might as far as to say that by reading Eftimiades monograph, one gets a sense of the thinking within key US national security bureaucracies on Chinese intelligence activities in the US in the current climate.

Previous Reviews

Among reviews of Chinese Espionage Operations and Tactics published on Amazon.com are a few from former and current US senior executives and intelligence officers of the US Intelligence Community. Their glowing expressions of satisfaction and appreciation,reviews attest to the value, positive impact the monograph had on their thinking and their work. One such review was by Maryann Fialdini, Former Chief, Counterintelligence Operations of the US Defense Intelligence Agency (DIA). She explained: “Mr Eftimiades has broken new ground on his closely researched series on Chinese Espionage Operations and Tactics. His work on Chinese espionage spans 30 years in the intelligence community. In the 90’s he sounded the alarm on China’s rising espionage activities directed against US corporate and government entities. His current series on Chinese Espionage identifies for the reader China’s massive “whole of Society” approach to espionage activity and offers the exceedingly rare combination of insight and judgement from a professional who has a wealth of firsthand experience. Eftimiades work fills an important gap in US literature as it relates to Chinese intelligence. I highly recommend this book!” Another fine review was from David Tsai, formerly of the Library of Congress. He stated: “Most up-to-date comprehensive and detailed treatment of the subject based on the author’s objective analysis of close to 600 cases! An intelligence practitioner as well as academic scholar Mr. Eftimiades has given his readers a clear picture of Chinese espionage doctrine and tradecraft, based on a combination of his experience and scholarship. This excellent and insightful book is highly recommended for both professionals and novices who are interested in this subject.” A review from Nicholas Kikis, former Director of the DIA’s Defense Clandestine Service and Chief of East Asia Division, that appears on the back of the monograph, proffers: “A must-read for professionals in Counter intelligence, security and government affairs. The author has crafted the most detailed account ever published on China’s espionage operations and tactics . . . The USA is loosing its secrets and technology to China’s “whole of society” approach . . . Our Nation’s need for good counterintelligence has never been greater . . . Mr. Eftimiades is the real deal, a veteran of the Intelligence Community who describes the challenges and provides recommendations on how to do a better job in protecting America.”

Interestingly, Eftimiades does not mention anything about having to submit his monograph to the Publications Review Board of his former employer, CIA, for review. For security reasons, it is a requirement for officials from the US Intelligence Community with backgrounds as his. One might expect his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any of that information could possibly provide some important bit, some nuance on what the US knows about China’s espionage operations and tactics in the US. Surely, the Publications Review Board stopped anything from going into the text if in its view it even approximated classified information. Hypotheses and arguments are a bit more challenging to judge for security reasons. Certain facts, even if left out hypotheses and arguments, can be assessed as being confirmed by some clever sorts in an adversaries camp seeing that those facts might alone be the sole solid basis upon which a particular inference might logically be made.

Sidelights

Eftimiades’ monograph is divided into 12 sections. They are entitled as follows: Section1: “Preface”; Section 2: “Key Findings”; Section 3: “Introduction”; Section 4: “Analytical Methodology”; Section 5: “China’s Legal Framework for Espionage”; Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; Section 9: “Analysis of Espionage Tradecraft”; Section 10: “Impact”; Section 11: “Summary”; and, Section12: “Link to video Analysis of China’s Economic Espionage Tactics.” Since the monograph is only 56 pages in total, it seemed apropos for this review to condense the discussion of 8 of its 12 sections, highlighting from each what might be its most intriguing elements/aspects for our readers. For 9 of the monographs sections, to include one not précised, greatcharlie provides sidelights.

Section 1: “Preface”

From the outset, Eftimiades makes it clear that the focus of his monograph, although there is some emphasis on espionage activities against the US, is on China’s worldwide human intelligence operations. The monograph does not include a discussion of China’s intelligence analysis capabilities, technology collection, not domestic operations against perceived internal threats. He indicates that cyber espionage is only addressed in select cases which were enabled by humans providing insider access. Eftimiades notes that he brings his own experiences and perceptions into his interpretations of those cases.

Eftimiades also gives notice to readers that the monograph only reflects known Chinese intelligence operations. Even with a review of hundreds of espionage cases, he recognizes that certain matters are left open such as the number of individuals engaged in espionage activities worldwide for China, and whether the cases he analyzed represent as much as 90 percent of the total or as little as 10 percent. (The word “worldwide” qualified the former statement of the two. Perchance the number operating in the US is known!) Eftimiades insists that even the Chinese government does not know the precise number of individuals spying on its behalf. He suggests that uncertainty about that total would be due to China’s decentralized “whole of society” approach to intelligence collection. Still, he felt enabled due to the volume of cases and careful–experienced, astute–analysis of operational details, he could draw certain conclusions about China’s espionage operations and tactics.

Eftimiades’ statement about Chinese intelligence operations and tactics practiced in the US is a very bold one to make starting off from scratch in his “Preface”. Writing in that manner, Eftimiades was sure to create more questions than anything else. Reading what was stated by a number of reviewers of the monograph from outside the US national security bureaucracies, this point could perhaps be deemed as the metaphorical low-hanging fruit for criticism. Given the strength of the mind of a man as Eftimiades, it could be the case that he has dangled this statement on the number of Chinese officers and operatives around the world, aware that it would draw a strong reaction among close readers and light the fire that would ignite a lively discourse within and among them. He is a former director of CIA Counterintelligence, which makes him a member of a rather unique caste of singular individuals who would hardly do anything without considerable forethought. To go a bit further, given Eftimiades background one might think perhaps there is some counterintelligence benefit in refusing to confirm publicly, not allowing an adversary to discover what the accepted size and strength of its espionage operations are. Imaginably that information might aid them in planning around US thinking, potentially finding some advantage if the estimated figures are too high, too low, or spot on. 

The likely first impression of readers resulting from Eftimiades’ “declaration of nescience” on the numbers of would be Eftimiades could not have managed to effectively consider the ends, was, and means of Chinese organizations engaged in espionage if an important leg of the three leg “strategy stool”, means, which includes the resources, size and strength of those organizations, was unknown to him. Unaware of that it was harder to see how he could delve into a more elaborate discussion of their operations and tactics. Curiosity over how Eftimiades managed everything would surely compel the many readers to push forward into the text. However, it would very likely be regularly done with some reservation. To the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US, to be both above board and fair, are only proffered in the abstract.   

Readers looking at the matter on their own might wonder what is the average caseload for a Chinese intelligence officer from either the civilian or military service If it is more than one, let one surmise three or four, then one might begin to believe the espionage crisis is much greater in magnitude. One might consider that given likely number of Chinese intelligence officers and operatives in the field, the true number of Chinese personnel involved increases exponentially when the number likely needed to provide logistical support for such a grand number of officers and operatives in the field and their operations which appear to vary in size and scope, are considered. One might not only infer from the number and size of known operations, their intensity and tempo, and apparent effective level of support for each the totality of Chinese intelligence officers and operatives in the field, but a close approximation of their number might be reached by considering just how much has been stolen, usually detected well after the fact. Later, in the “Summary” section, Eftimiades notes that although he may not be certain of the true number of Chinese intelligence officers that are on the ground in the US but himself surmised it must be in the thousands.

There have been claims that the number of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field. The issue of numbers of Chinese spies in the US is not limited to debate within the US Intelligence Community. It has been widely reported by the mainstream newsmedia in the US that China’s intelligence services have established espionage networks throughout the country. Guo Wengui is a billionaire businessman who claimed to have close ties to China’s civilian and military intelligence services and broke with the regime. Guo revealed in his first interview in the US that those espionage networks reportedly include up to 25,000 Chinese intelligence officers and more than 15,000 recruited operatives. Guo explained that he learned about Chinese spy activities from Ma Jian, a former vice minister of the civilian intelligence service and Ji Shengde, a former military intelligence chief. As that figure, 25,000, was put forward nearly 5 years ago, the number of Chinese intelligence officers who have essentially strolled into the US and are now operating clandestinely and successfully on the ground now may be much higher. Surely, there is an officially estimated number of Chinese intelligence officers and operatives in the US Intelligence Community. Whether it will ever be made public remains to be seen, but surely, even without that figure, there is some general acceptance that what is coming toward the US is à la débandade.

People’s Republic of China Minister of State Security, Chen Wenqing (above). Chen studied Law and Political Science at Southwest University in Chongqing, and joined the Ministry of Public Security in 1984, where he worked for a decade. In 1994, Chen was assigned to the Ministry of State Security (MSS), becoming Deputy Director at the Sichuan provincial state security department. In 1998 Chen took over leadership of the State Security Department in Sichuan. He held that position until 2002, when he was appointed Chief Prosecutor at the Sichuan Provincial People’s Procuratorate. In 2006, Chen transferred to Fujian, serving as Deputy Party Secretary and concurrently head of the provincial Commission for Discipline Inspection (CCDI) until 2012. Following the 18th National Congress of the Communist Party China, Chen was brought to Beijing to serve as a Deputy Secretaries of the CCDI. He was appointed Party Secretary of the MSS in October 2016 and Minister in November 2016.

Section 2: “Key Findings”

In the section, “Key Findings”, Eftimiades provides a list of judgments supported by the information and data in his monograph. For readers, especially students, they may provide some guidance on an academic inquiry concerning Chinese intelligence. Right out of the gate, he notes that his “Key Findings” section is the product of his earlier analysis of 595 documented cases of China’s worldwide collection efforts. Thereby, they stand here independent of, but a primary feature of what is discussed in the monograph. In the monograph’s “Preface”, Eftimiades plainly states that “the focus of this work is on [China’s] worldwide human intelligence (HUMINT) operations.” Yet, in his key findings, he seems to indicate that the true focus of the monograph’s discussion, rather than being the aggregate espionage efforts of government organizations and commercial entities, academic institutions, and independent individuals in the US, is Chinese government civilian and military operations. Imaginably for some, Eftimiades may appear to shortshrift readers on any findings developed through the study of the totality of China’s espionage in the US. Perhaps in Eftimiades’ defense, his omission may very well have been more of an issue of editing and oversight.

To the extent that his key findings are limited to government espionage activities, some might readily assert that rather than opening up new territory, his findings were nearly all well-trodden ground. Indeed, at first blush, one might view what Eftimiades presents as his findings as a somewhat prosaic enumeration of highlights from his examination of the 595 cases. However, greatcharlie assures that they are much more as there are some striking elements among them. Eftimiades 10 key findings were a follows: 1) Chinese espionage activity  has greatly expanded in the past 20 years; 2) Chinese entities conducting espionage include government agencies, the People’s Liberation Army, State Owned Enterprises, private companies, individuals, and several universities; 3) Approximately half of China’s worldwide intelligence collection efforts target military and space technologies; 4) Over 90 percent of China’s espionage activities are performed by ethnic Chinese and males perform more than 80 percent of it; 5) The Ministry of State Security, China’s main civilian intelligence service, exploits social media to target foreigners with access to sensitive information. Those recruitment efforts vary in quality considerably; 6) The Ministry of State Security make use of China’s visa and border control system to identify potential recruitment and manage clandestine assets; 7) Ministry of State Security espionage tradecraft has improved over the last four years, due in part to pressure against it from US counterintelligence services; 8) Nearly half of China’s traditional espionage efforts–pursuing political and military secrets–and covert action campaigns are targeted against Taiwan; 9) China’s foreign science and technology collection efforts correlate closely to the priority technologies identified in government strategic planning documents; and, 10) China’s “whole society approach” to espionage has a harmful effect on the US economy, diplomatic influence, and military capabilities. Furthermore, China’s actions threaten European national and economic security through espionage and coercion against government entities and business decision making.

What sparked greatcharlie’s interest considerably was Eftimiades finding concerning non-ethnic-Chinese recruitment, that more ethnic Chinese recruits are used than nonethnic ones by Chinese government organizations and commercial entities engaged in espionage in the US. Multum in parvo. (Much in little. (Small but significant.))

He makes an impressive statement, but regrettably, he does delve deeper into this issue at any point later in the monograph allowing readers to understand how he got there.  His “Analysis of Espionage Tradecraft” section would have been taken to even greater heights. Useful at some point of the monograph’s discussion also would have been some background on the evolution of Chinese intelligence practices to recruit nonethnic Chinese as well as ethnic Chinese as operatives. With regard to greatcharlie’s aforementioned presumption concerning Eftimiades somewhat likely effort to stoke debate on the monograph, perchance once again he is providing more grist for the mill on this score. Perhaps a set plan regarding the monographs page length did not allow him to expound on the matter.

Perhaps it would be enough for some to say in this case that Chinese intelligence services may have recognized they can achieve their respective goals more efficiently and effectively by working mainly with ethnic Chinese recruits. Yet, surely, Chinese espionage in the West has evolved from pursuing ethnic Chinese sources alone. All things considered, such a limited effort by Chinese government organizations and commercial entities would hardly be the case. It stands to reason that the number of nonethnic recruits with which they have been successful is far higher than the few he has enumerated. To an extent, in Eftimiades own examples there is evidence that a number of nonethnic Chinese operatives were targeted and successfully recruited. Chinese intelligence services clearly have the interest and capabilities to bring in such recruits presumably as would Chinese commercial entities engaged in espionage in the US.

As discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” it was once generally understood in the West that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers, businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections, and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use. However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method.

Guo Wengui, aforementioned here as the billionaire businessman who broke with the regime and revealed information from highly placed sources in the Chinese intelligence services that China’s espionage networks reportedly include up to 25,000 officers and 15,000 operatives, also spoke on the matter of non-ethnic-Chinese recruitment. Guo said Ma Jian, who recall was the vice minister for the civilian intelligence service, told him that a major shift by the Chinese was expanding the scope of agent recruitment from Asians to other ethnic groups.

One might argue that if Chinese government organizations and commercial entities engaged in espionage in the US were running only a few nonethnic operatives in the field, an idea Eftimiades’ statistics would apparently support, those few nonethnic operatives were doing a colossal amount of work alone to collect the loads of information from institutions where ethnic Chinese may not necessarily have been well represented or significant at all. In the abstract, and not to cast aspersions on any employees anywhere in which the erstwhile spies worked, but it may have been the case that other nonethnic Chinese employees were involved in espionage in those same institutions who went undetected and whose work was completely unknown to those who were caught.

Imaginably from a counterintelligence standpoint, if Chinese government organizations and commercial entities engaged in espionage in the US were running merely two or a few more nonethnic operatives in the field, trying intercept so few well-concealed individuals from a field of dozens of potential spies would conceivably be rather challenging. Finding them all during the past few years would be nothing less than spectacular accomplishment. C’est chercher une aiguille dans une botte de foin.

Chinese government organizations and commercial entities engaged in espionage in the US go after whomever might be best suited to meet their needs. For the accomplished services in the intelligence industry, espionage is a results focused business, not an ethnocentric one. It was noted earlier that Eftimiades insists that no one really knows how many officers and operatives working for China are on the beat in the US, but later in his “Summary” section suggests that they may very well number in the thousands. Aforementioned, too, were claims that the numbers of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field would be enormous. If those high numbers are accurate, it would likely mean those officers would be going after greater numbers of recruits. Surely, along with increased ethnic Chinese recruiting, nonethnic Chinese recruiting numbers would see far more than a nominal increase as a result.

Incidentally, Eftimiades mention of the balance between ethnic and nonethnic Chinese recruitment by Chinese government organizations and commercial entities engaged in espionage in the US, determined as a product of his analysis of the 595 cases, somewhat flies in the face of what he boldly asserted earlier in the discussion on the general on the unawareness of numbers of officers and operatives working on the ground there for China. As stated earlier, to the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US is in the abstract.   

People’s Republic of China PLA Major General Chen Guangjun (above), Chief of Central Military Commission (CMC) Joint Staff Department Intelligence Bureau. The 54 year-old Chen currently serves as chief of Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau as well as an Assistant to the Chief of the Joint Staff. Chen joined the Rocket Forces of the PLA in 1984. In the mid-2000s, he earned a Ph.D. from Northwestern Polytechnical University. The PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. Chen achieved some notoriety prior to taking over the Joint Staff Department Intelligence Bureau. Through 2007 and 2008, Chen was the focus of several newsmedia reports chronicling his role in improving levels of education in his unit.

Section 3: “Introduction”

Eftimiades begins his Introduction by stating that while espionage is often employed to support foreign policy, a country’s clandestine activities rarely become the subject of foreign policy. However, despite how rare it might be, he says that is the case for the People’s Republic of China with its massive “whole of society” approach to conducting espionage. Eftimiades believes its approach is creating a new paradigm on how intelligence activities are conducted, viewed, and addressed by countries. He notes that a key element in the US-China trade war and downward spiral in relations–a matter the received much attention from the US newsmedia at the time he penned his monograph–is Washington’s demands that Beijing cease stealing US intellectual property and trade secrets. Despite China’s denials, Eftimiades stressed that “hundreds of recently prosecuted espionage cases” prove otherwise. China’s espionage activities are changing the global balance of power, impacting the US and foreign economies, and providing challenges to domestic, national security, and foreign policy formulation.

Not to be an apologist, but rather, to be fair-minded, Eftimiades notes that there are otger governments, companies, and individual entrepreneurs that violate US laws in the drive to possess or sell US technology, government and corporate secrets. He states: “Violating a country’s laws is common practice in the murky world of espionage. According to Eftimiades, almost every time an intelligence service conducts espionage in another country, it violates that country’s laws, and that includes US intelligence operating overseas.” However, he insists that the difference is that the US and other countries engage in espionage to determine and counter hostile or potentially hostile adversaries. The purpose of espionage is not to develop their countries’ own industries or transfer foreign wealth which is a main focus of China’s activities.

There is little doubt that the public affairs departments of nearly every bureaucracy under the State Council, and Propaganda Department and Foreign Affairs section of the Communist Party of China would chomp at the bit to enthusiastically and gloatingly state in response that the US space program was developed through the employment of scientists and engineers from Occupied Germany. The resettlement of the professionals and all of their research and development was facilitated by intelligence elements of the US national security bureaucracies. The Chinese would doubtlessly assert that US activities on that matter essentially established the model for acquiring foreign capabilities through national security bureaucracies to support their technological needs and channel down to large industries mostly related to defense and intelligence to support their advancement. Chinese public affairs spokespersons would surely go on to state, likely with the pretension of lamenting, that as a result of depriving Germany of its own citizens best efforts in aerospace technologies, the country was denied trillions in revenue from potentially providing the world the fruit of their expertise. Indeed, Germany could have become the epicenter of aerospace technology development and research in the world. (Mind readers this is a presumed argument of the Communist Party of China, not at all the position of greatcharlie.) Mayhap, the counterpunch would be that Werner Von Braun and the other German scientists and engineers sought to to the US and if they were left to their devices in Occupied Germany, the Soviet Union would have surely grabbed them up to use for Soviet Premier Joseph Stalin’s sinister purposes. Germany as a whole benefited immensely from postwar reconstruction due to the US Marshall Program. German industries were given an excellent restart as a result of their rebuilding and retooling under that program.

Section 4: “Analytical Methodology”

Eftimiades explains that for purposes of this study, all of the legal definitions of criminal acts in the statutes and administrative regulations found in the export violations–International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), International Emergency Economic Powers Act (IEEPA), as well as covert action, and research violations, are categorized as espionage. Eftimiades again explains that over a period of 10 years, he compiled and analyzed 595 cases of Chinese espionage that have occurred worldwide. He notes that over 450 of those cases occurred after 2000. He states again that through the analysis of these cases, sufficient evidence provided on espionage by the Chinese government, Beijing’s promotion and support of organizations outside of the government responsible for the same, and the information objectives, determines gaps in their knowledge, and operational “tradecraft” techniques of those organizations.

There is perhaps an argument to be made that once Eftimiades decided upon the definition of espionage mentioned in this section, he shaped his discussion of what Chinese non-government entities, institutions, and individuals would be viewed as engaging in espionage. One could hardly find fault with his decision. After all, his choice was not without precedent as certain bureaucracies of the US government involved in the 595 cases he studied made the same decision based on the law. However, from the lens of the accused Chinese non-government entities, institutions, and individuals, it may be the case that they were stealing trade secrets and intellectual property, but they may not have viewed their actions as espionage, rather just theft and just a part of business. One could imagine individuals of elements involved with such thefts saying with acidulous humor that if those, who possess information that they desired to purloin, really wanted to prevent theft, they would do a far better job at securing that information. Those with such larcenous instincts might go on to insist that those possessing the information would need to look deeper within to find the answer as to why they have so often left themselves wide open to theft. This thought, on the perception of thieving Chinese non-government entities, institutions, and individuals on whether their actions are a matter of espionage or “merely” grand larceny, is developed further in this essay in the “Analysis of Espionage Tradecraft” section.

The monograph’s following four sections on Chinese operations and tactics were meat and drink for greatcharlie and will likely be for like-minded souls. They are: Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; and, Section 9: “Analysis of Espionage Tradecraft”. Only three of the four are fully discussed in this review.

Section 6: “PRC Organizations Conducting Espionage”

The espionage effort by Chinese government organizations and commercial entities, as explained by Eftimiades, has features that are entirely its own. From an analysis of his 595 cases, Eftimiades explains espionage activities correlated to their sponsoring organization (the “customer” receiving the information or technology) showed five distinct clusters of organizations engaging in espionage. The governing Communist Party of China uses government, quasi government, academic, and commercial entities as mechanisms to conduct all forms of espionage abroad. Most interesting of these are China’s “non-traditional collectors”, which include State Owned Enterprises, universities, and private companies. He confirms that the employment of such a broad set of entities for intelligence collection evinces China’s “whole of society” approach to espionage. The list of includes: 1) the Ministry of State Security, the Guojia Anquan Bu, China’s preeminent intelligence agency, responsible for overseas espionage and counterintelligence both at home and abroad; 2) the Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau of the People’s Liberation Army (PLA), responsible for collecting and analyzing foreign military intelligence, including technology; 3) State Owned Enterprises (SOE), include the 50,000 aerospace and defense companies, subordinate research institutions, and technology transfer organizations owned by the central government; 4) Private Chinese companies or individuals acting unilaterally for commercial benefit only were engaged in espionage in approximately 22 percent of cases Eftimiades analyzed, and in nearly 30 percent of those cases, there was a clearly identifiable Chinese government, SOE, or university as the ultimate customer for illegal exports or trade secrets; and, 5) Other Chinese government elements that collect intelligence (information) and technology include the PLA Political Department Liaison Office (targeted against Taiwan), the United Front Work Department (UFWD), and many universities under the State Administration for Science, Technology, and Industry for National Defense (SASTIND). 

Most intriguing to greatcharlie was Eftimiades’ discussion of the PLA Political Department Liaison Office, the UFWD, and SASTIND. Beginning in reverse with SASTIND, Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Clearly put by Eftimiades, as the start point of a virtual wheel of information exchange, SASTIND assigns projects to ministries with military production responsibilities. Those ministries pass the work to the research institutes under their auspices. The associated research institutes send their information and technology gaps back to SASTIND. There are two departments within SASTIND,responsible for developing and tasking technologically related intelligence requirements and for collecting intelligence against those requirements.They are the Comprehensive Planning Department and the International Cooperation Department. The Comprehensive Planning Department tasks collection to the MSS and most likely to the PLA Joint Intelligence Bureau. The International Cooperation Department has its own independent collection capability. Members of this department travel with China’s scientists to collect information against specific requirements.

Eftimiades reports that SASTIND also has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. Some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. That list includes: Beijing Institute of Technology; Beijing University of Aeronautics and Astronautics; Beijing Engineering University; Harbin Engineering University; Harbin Institute of Technology; Northwestern Polytechnical Institution [University]; Nanjing University of Aeronautics and Astronautics; and, Nanjing University of Science and Technology. As of the monograph’s writing, over 35 Chinese universities (or professors from those universities) have been identified in US federal court documents as having some role in China’s overseas espionage cases, according to Eftimiades.

Eftimiades explains that the distribution of Chinese espionage cases worldwide illustrates the magnitude of Communist Party of China controlled businesses, research entities and business organizations involved in espionage activities. Providing superb graphs and charts for readers to examine while following along with his discussion, he shows that there is a near equal distribution of espionage activities between the four major organizational clusters (MSS, PLA, SOEs, and Private Companies). Eftimiades explains that the distribution indicates a concerted effort to use all mechanisms of government and the economy to collect foreign information and technology. To date, the Communist Party of China and the Chinese government have not taken steps to impede illegal activities (according to foreign countries laws) of their state corporations, private businesses, universities, and citizens. Eftimiades says China, referring to it once again as a “digital authoritarian state”, is clearly capable of doing so. He suggests that the Communist Party of China sees the appropriation of foreign innovations and technology as part of a policy aimed at developing domestic technology and increasing production.

In addition, his statistical breakdown of the 595 espionage cases illustrates that Chinese private companies have an aggressive posture in conducting espionage, resulting in 136 cases or approximately 23 percent of all activity worldwide. Similarly, SOEs were surreptitiously examining or collecting information or technology in 121 cases or 20 percent of the total. The SOEs are primarily collecting advanced military technology and associated research. Private companies and individuals primarily pursue commercial technologies, intellectual property and military technologies. Espionage activities conducted by the PLA Joint Intelligence Bureau give primacy to defense information, armaments, and military (or dual use) technology. The PLA was involved in 122 instances of espionage or 19 percent of all cases. Eftimiades reports that the MSS was involved in 95 instances of espionage or 16 percent of all cases. Preferred MSS targets included political or defense information, foreign policy, overseas dissidents, military capabilities, too, and foreign intelligence services. The final category of entities conducting espionage on behalf of China were Chinese universities and the UFWD. The universities generally targeted foreign technology to support advanced military weapons systems development and commercial endeavors.

Regarding the PLA Political Department Liaison Office, Eftimiades, in a markedly  unadorned way, explains that it is targeted against Taiwan. However, some confusion may befall those readers who perhaps may think of the Communist Party of China’s International Liaison Department when they come across the title, International Liaison Office. Among the pertinent facts, as part of Xi’s military reforms, in November 2015 the General Political Department of the Central Military Commission was abolished and was replaced with the Political Work Department. In January 2016, the Political Work Department became official. Its primary role as the chief political organ under the Central Military Commission is to integrate the Communist Party of China and its ideology and propaganda into the People’s Liberation Army. In that role, its responsibilities include: preparing political and economic information for the reference of the Political Bureau; conducting ideological and political work on foreign, particularly adversarial armed forces, by promoting China’s policies among their ranks, and disrupting unit cohesion within adversarial forces by withering their morale. It also has the duty to incite descension and rebellions particularly within the Taiwan army and other foreign armed forces. The Political Work Department’s Liaison Department controls a united front organization called the China Association for International Friendly Contact (CAIFC) that is active in overseas intelligence gathering and influence operations. Reportedly, the International Liaison Office has dispatched agents to infiltrate Chinese-funded companies and private institutions in Hong Kong. Their mission is also counter-espionage, monitoring their own agents, and preventing their recruitment of Chinese personnel by foreign intelligence services.

The International (Liaison) Department of the Communist Party of China is a very different organization. It stands as one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three include the UFWD, the Chinese People’s Political Consultative Conference (CPPCC), the Propaganda Department. Founded in 1951, International (Liaison) Department is the party’s diplomatic arm, handling relationships with more than 600 political parties and organizations as well as individual, primarily political, elites. The department previously handled the Communist Party of China’s relationships between fraternal Communist parties and cultivated splinter factions of Moscow-dominated Communist parties after the Sino-Soviet split. The activist bent of the International Department disappeared as the department began re-establishing itself from 1970 to 1971 following the tumultuous early years of the Cultural Revolution. Indeed, in the 1970s, as Anne-Marie Brady explained in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the International Liaison Department’s intelligence efforts often surpassed and even outmatched those of regular Chinese intelligence services. It became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies and guerrilla movements worldwide. Interestingly, the department originated as a UFWD bureau before being carved out into an independent entity.

You Quan (above), head of the Communust Party of China’s United Front Work Department (UFWD). You Quan was appointed United Front Work Department (UFWD) head on November 7, 2017. You directs the UFWD, assisted by seven deputy directors. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance.

Although he mentions the UFWD, Eftimiades does not provide any discussion of the organization. For readers wholly unfamiliar with it, greatcharlie provides some small treatment here. As discussed in the October 19, 2020 greatcharlie post entitled, “The Case of a NYPD Officer Allegedly Engaged in Intelligence Activities for China Spotlights the United Front Work Department”, within China, the UFWD plays a vital policy development and coordination role, especially for ethnic and religious minorities. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. Xi has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. United front work is the central element to understanding what the Communist Party of China is doing and why to shape the world outside of itself. In a June 9, 2020 Australian Strategic Policy Institute report, You Quan, the head of the UFWD, is quoted as saying: “The United Front is a political alliance, and united front work is political work. It must maintain the party’s leadership throughout, having the party’s flag as its flag, the party’s direction as its direction, and the party’s will as its will, uniting and gathering members of each part of the United Front around the party.” People’s Republic of China Chairman Mao Zedong described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a 1950s CIA paper, united front work was referred to as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the Party.

Perhaps from a publisher’s point of view and with some intimation of what would most interest the monograph’s readers in fields of business and finance, Eftimiades thought it most necessary to place emphasis upon the State Administration for Science, Technology, and Industry for National Defense (SASTIND) over all of the other PRC organizations engaged in espionage. The information presented on SASTIND, for instance, is assuredly not part of regular discourse on Chinese espionage. Eftimiades, in a rather sedate tone but still a quite edifying stream of consciousness, lays out what that government organization’s well-controlled work against the US and other highly industrialized countries worldwide and its stealthy and insidious nature.

It should be expected, and may actually be tacitly accepted by some intelligence analysts in the US and in the services of other highly industrialized countries, that among Chinese government organizations and commercial entities on the ground in the US engaged in espionage, there are understood defined areas of responsibility and much as the clear boundaries already set, and well-known, between PLA HUMINT targets and activities and those of its civilian counterpart, MSS, similar arrangements have been made to avoid unwittingly conducting redundant operations, accidental collision of officers and operatives in the field, and potential interservice competition and quarrels in pursuit of available sources for US secrets. A similar delineation between the MSS and Zhōnghuá Rénmín Gònghéguó Gōng’ānbùthe Ministry of Public Security of the People’s Republic of China (MPS), both a law enforcement and an intelligence and counterintelligence service. Harmony among organizations is doubtlessly desired and required in order for them to succeed and to avoid being caught.

Yet, with so many Chinese government organizations and commercial entities on the ground in the US engaged in espionage, theft, overt collection, hiring operatives, surveilling and studying the opposition, as a reality, on more than one instance an effort to collect a particular type of information might lead more than one organization, for example, one governmental and one commercial, to the same target. One might imagine how chaos could reign without some communication. Officers and operators, perhaps not even immediately aware of each others presence, might literally run into each other, occasionally tread on each other’s work, and might even step on each other’s toes now and then creating some disruption. Some general agreement between organizations and entities in the field would need to exist in order to ensure possible fruitful operations would not face “friendly” challenges and obstacles albeit unintentionally, and to ensure they are enabled to adhere to clearly delineated lanes of action for each organization. On the matter of security, one might imagine how much easier it would be to detect and intercept Chinese espionage operators from the different organizations if they all kept showing up at the same institution trying to contact, recruit, smooze, cajole the same people in them, or one institution were simply bombarded by attempts by individuals to inveigle their way into it with a similar focus on its research and development. Obviously Chinese espionage efforts have been far quieter, smoother, and more sophisticated in nature.

Perhaps the best way to what is discussed here is simply to state that there are likely furtive bridges across organizational lines and areas of responsibilities that allow managers on the ground and officers, old hands in the business who have mastered the job, engaged in intricate operations against similar targets to directly communicate, provide assistance, modest resources, and advice all designed to facilitate security and activities and promote success. It would be a form of unofficial, collegial, furtive modus vivendi established with the requirements for operational security firmly in mind and every imaginable precaution taken. In this section, Eftimiades briefly mentions that in at least two cases, there were actually joint MSS and PLA operations in which individuals inside an aerospace company were recruited as operatives to assist in targeting the company for cyber-attacks. The MSS is so segmented with its many state department’s and provincial bureaus, that the most effective aspect of any effort by the two organizations to work jointly must have occurred between managers in the field. Given the success each espionage element, government or otherwise, has found in the US, the Communist Party of China, which would indubitably be aware of such interorganizational contacts, would likely stay mum about it all but monitor it all the same. After all, Communist Party of China intelligence organs operating sub rosa in diplomatic missions and commercial entities or incognito wherever else, would conceivably benefit too from being tied into the clandestine communications among managers in the field imagined here.

Concerning another point that flows from this discussion, rather than lacking actual knowledge or even a good sense of where everyone was relative to each other among Chinese government organizations and commercial entities engaged in espionage in the US and not having an full account of who was on the ground and stand bereft of paths for the most senior network managers of each organization to liaise, potentially in some extraordinary emergency, in the abstract, surely one could conceive that there would be a least some tacit coordination among their senior leaders, perhaps back in China. Such information would at least be in PLA, MSS, and–as often ordinary Chinese citizens will usually be involved–MPS hands. MPS surely has the most complete, up-to-date records–are perhaps often pulled into the mix of overseas espionage activities to some small degree for that reason. That information would also most likely be in the hands of the Communist Party of China via MPS. In addition to performing standard domestic functions as a law enforcement and intelligence and counterintelligence service, MPS is very much tied to the Communist Party of China to the extent that it helps the Party maintain its tight grip on the population.

For the edification of greatcharlie’s readers who may be not so familiar PLA intelligence, as explained in the  January 31, 2021 greatcharlie post entitled Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)”, the PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission. Thereby, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), something similar to the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare are now aggregated into the Strategic Support Force. As with its sister civilian service, the MSS, and intelligence services worldwide, the PLA makes regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. It aggressively uses Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection.

Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Eftimiades reports that SASTIND has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. On that list is Northwestern Polytechnical University of Xian, China, It is ranked number 1 in the discipline Aeronautical and Astronautical Science and Technology, known for producing some of the best brains in China’s defense industry.

Section 7: “Intelligence Collection Objectives”

As promised, greatcharlie has condensed the sections of Eftimiades monograph, providing important details, but it has not revealed everything. Yet, with such a relatively short text, there would naturally arise occasions when little option would appear available than present wholly what is provided in a particularly diminutive section, in order to provide the reader with a full understanding of the author’s thinking. That is the case with the “Intelligence Collection Objectives” section of the monograph. Under what has been whimsically dubbed as “spookspeak” by members of the intelligence industry some time ago, Collection Objectives, also known as Information Objectives or Requirements, identify the specific information or technology that is tasked to intelligence services for collection. Eftimiades stated that requirements can number in the tens-of-thousands, and explains that one can infer from requirements a country’s knowledge and technology gaps for they are a reflection of them. He provides as an example a country that has been continually pursuing information on specific components of turbine engines. The implications and indications for taking that course, says Eftimiades, are that the country most likely lacks the required information or technology on turbine engines for its planned purposes and espionage presents the only immediate way of acquiring it. Non solum eventus hoc docet, iste est magister stultorum, sed etiam ratio. (Not only does the outcome teach (us) this, that is the teacher of fools, but (so) too does reason.)

Regarding China, Eftimiades explains that its strategic collection objectives can be identified through a number of national level strategic planning documents. Listed earlier in the “Key Findings” section in the monograph, they are: Made in China 2025; Space Science and Technology in China; and, A Road Map to 2050, the National Key Technologies R&D Program, and the 13th Five Year Plan. Those national level strategic planning documents can be subdivided into specific technology development programs, are the following: the National Basic Research Program (973 Program); the National High-Tech Research and Development Program (863 Program); the National Key Technologies R&D Program; and, The National S&T Major Projects. Eftimiades offers a subset of those National S&T Major Projects which includes: Advanced Digital Control Machines and Fundamental Manufacturing Equipment; Breeding of New Variety of Transgenic Biology; Core Electronic Devices, High-end General Chips and Fundamental Software; Key New Drug Innovation; Large Scale Development of Oil and Gas Fields and Coal-bed Gas; Megascale Integrated Circuit Manufacturing Technologies; Next Generation of Broad Wireless Mobile Networks; Wastewater Control and  S&T Achievement Industrialization; National New Products Program; and, the National Soft Sciences Research Program. 

Eftimiades says that as one further breaks down the strategic technology objectives, a strong correlation to China’s espionage activity emerges. The Director of National Intelligence report, Foreign Economic Espionage in Cyberspace (2018) identified industries and private technologies that are frequent targets of foreign espionage. Eftimiades’ informs that an even closer correlation between China’s espionage efforts and national requirements can be made when comparing the 595 cases with the 19 key Technologies identified in the Communust Party of China strategic industrial planning documents Made in China 2025. These technology requirements were the primary objectives in the 435 cases. The fact that such a high proportion of espionage activities are correlated in Made in China 2025 Key technology list indicates the Communist Party of China’s role in guiding China’s global espionage effort.

Laying out points on this matter from his case analysis for all readers to understand, avec brio, Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks. Such collection efforts support PLA military aerospace programs and China’s commercial aviation sector. Going further, he states that a review of the 116 cases targeted at aerospace companies identified over 200 specific military and civilian technologies and trade secrets (stolen and attempted stolen). Among the many “Key Technologies” sought, were: Cryogenic pumps for space vehicles, valves, transfer lines, refrigeration equipment, space qualified radiation hardened circuits, components for the storage and use of liquid hydrogen, cryogenic coolers, Ka-band space communications, satellite/missile insulation blankets–germanium coated polyimide film, and multi octave traveling wave tubes used as amplifiers in satellite transponders. Major systems include: the Space Shuttle, Delta IV Rocket, F-15 Fighter, C-17 transport, F-22 Fighter, F-35 Fighter, B-1 Bomber, Ch46/47 Chinook, C-130 training equipment.

China’s Mars rover, the Zhurong (above) rolls off its lander, to begin a mission of seeking out geological discoveries. Was its development the result of espionage? Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks.

Another high priority collection target of Chinese espionage is information technology. Statistically speaking, China’s collection of information technology (113 cases) is second in numbers only to aerospace technology. China has placed strong emphasis on collecting information technology to include semiconductors and manufacturing technology. Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did. The Chinese company Huawei has been under similar export restrictions for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Key information technology related to China’s collection requirements include: microelectronics, microwave integrated circuits, microprocessors, circuit boards, crypto key devices, data and voice transmission systems, semiconductors, and trade secrets such as laser manufacturing techniques. Semiconductor manufacturing is a priority target for Chinese espionage as the US and several other nations still maintain a sizable lead over China in production capabilities. Additional priority targets for collection include biopharma and medical devices, automated machine tools and robotics, energy saving/new energy vehicles, and new materials development. Eftimiades informs that these are often distinct patterns of intelligence activity that correspond to each category of technology. For example, excluding China’s  cyber espionage campaigns, collection on biopharma and medical devices is limited to exploiting research programs (e.g., Thousand Talents Program) or economic espionage using company insiders. The three targets for this category are universities, research institutes, and pharmaceutical companies. Lastly, In the category of energy saving/new energy vehicles, Eftimiades states that most of the collection activity has been economic espionage employing insiders. The two targets for this collection effort have been companies and research laboratories. Eftimiades reveals that the majority of thefts of this technology have occurred through insider threats with cyber espionage as a secondary method.

To be succinct, in many fields, subject areas for analysis, facts are often misused and abused, but on intelligence, it can lead to great failures, and potential national disaster. Facts cannot be nailed down and used to support only what one wishes. To the contrary, facts should take the analysis toward what is authentic. From that judgments and plans must be based. Doing anything otherwise, especially while in pursuit of an opponent, is simply to procrastinate by entertaining oneself with errant deliberations. The opponent, no matter what one might choose to believe, does not procrastinate. As Eftimiades, himself, notes in the “Intelligence Collection Objectives” section of his own text, the Chinese know what they want and go after it at the time, in the way, and with the means they desire. Operatives complete their tasks and off secrets go–and oftentimes actual technologies as well–to China. That is one of the simple and more apparent keys to the opponent’s success.

China has shown little compunction over putting in full view at home, marketing, technologies, and making geopolitical moves that would be suggestive of the fact the information that allowed for those developments and actions was stolen from the US. It is almost as if the Communist Party of China encourages such actions to flaunt their country’s considerable bag of intelligence victories. Of course, government officials in Beijing will normally assert that there have been thefts and declare any evidence presented of such as circumstantial or outright lies.

Given just how much China has poached from the US has been revealed, even paraded in Beijing, one could reasonably conclude–and it is absolutely true–that China has run off with far more than a bale of information and data on classified defense and intelligence related projects, innovative commercial products, trade secrets, intellectual property, and classified foreign and defense policy documents. It is safe to say that an enormous amount is being collected. It might leave some to reasonably accept that a stratospheric level of espionage is being conducted by far greater numbers of intelligence officers and operatives and it has been ongoing.

Eftimiades provides a brilliant account of Chinese intelligence collection requirements. He supports his claims with superb charts. Some are practically signposts pointing to where the adversary is likely to show up next. Some are strong enough to serve as figurative beckoning fingers enticing along with whispered words, “Here they are.”

Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE, now defunct. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did.

Section 8: “Analysis of Espionage Cases”

The dominant activities for China’s overseas espionage are espionage, economic espionage, and export administration regulation (dual use) violations, together comprising 60 percent of all activities. Taken as a whole, statistically speaking, illegal exports (theft of dual use and military technology) make up approximately 47 percent of China’s espionage activities abroad. Eftimiades divides the 595 espionage cases that he analyzed into the following categories: espionage; economic espionage as defined by ITAR, EAR, IEEPA; covert action; and, research violations. China’s illegal export of military and dual use technology, to include IEEPA, EAR, and ITAR violations and other export related violations in the US, comprise 43.7 percent (260) of all cases worldwide. Eftimiades says more than 80 percent of these cases occurred in the US. Reportedly, economic espionage which is mainly conducted by private companies or individuals, account for 25.98 percent (119 total) of cases). The category of “traditional espionage” stands at 22 percent (108 total) of worldwide activities. Eftimiades notes the figure of traditional espionage cases sits at 55 if Taiwan is separated out as a Chinese intelligence target. Of known cases, Taiwan is the single highest priority target for individual espionage.

On a chart provided by Eftimiades, one can observe the distribution of cases to the many venues of Chinese espionage in the US. The distribution pattern reveals concentrations occurring in tech sectors, manufacturing hubs and business centers. In California, “Silicon Valley” is shown to be the number one spot in the US for China’s illegal technology collection efforts. Apparently, more than half of the 140 cases that occurred in California targeted technology firms in that venue. Other cases centered around San Diego and then Los Angeles in the state. Further, collection activity in California was mainly economic espionage (51) cases), EAR violations (30 cases), ITAR violations (25 cases), and IEEPA violations (13 cases). In the economic espionage cases, the predominant form of tradecraft was using insiders (employees) to access restricted technology and trade secrets. Priority collection objectives in California were information technology (46 cases), aerospace and aeronautical equipment (27 cases), and automated machine tools and robotics (20 cases). Nationwide, China’s collection activities cluster around the major educational, research, and manufacturing centers in several states to include Massachusetts, Michigan, New York, Pennsylvania, Florida, New Jersey, and Texas. Victims of China’s espionage efforts in the US include major defense and aerospace companies, pharmaceutical firms, technology research companies, and manufacturers. In cases in Virginia and Florida, Chinese diplomats and citizens were caught trespassing on military facilities to conduct ground photo reconnaissance. Those facilities were associated with US Naval forces and special operations capabilities.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) Eftimiades notes that research universities are clearly primary targets for collection efforts, achieved most often through talent programs such as China’s Thousand Talents Program, Hundreds Talents Program. Eftimiades reports that most estimates suggest there are “at least 200 Chinese talent programs designed to employ academic and professional expertise from the West into serving China’s national development.” He continues further to explain: “This expertise ranges from scientific and engineering fields to business, finance, and social Sciences. These programs are serviced by 600 overseas stations that gather information on foreign scientists and then attempt to recruit them. In numerous cases, professors, graduate students, and PLA researchers have also been arrested for stealing research from overseas universities for use in China.”

Chinese intelligence services apparently studied the situation, and recognized just how open the US was for theft of its secrets in all sectors and then clearly decided to pour through, taking whatever they could. Surely, the Communist Party of China saw no need to halt commercial entities engaged in their own espionage activities, much as Eftimiades remarks earlier in the section entitled “PRC Organizations Conducting Espionage”. It appears they have seen nothing but opportunities to do a lot of open field running for them with little real risk. To date, it appears that they have all found no reason to pare down their operations, and certainly no reason to retreat. From Eftimiades own data, one can infer their espionage activities have steadily increased. Opinionis enim commenta delet dies, naturae judicia confirmat. (For time destroys the fictions of error and opinion, while it confirms the determination of nature and of truth.)

Though Eftimiades explains in his Preface that “cyber espionage is only addressed in select cases which were enabled by humans providing insider access. However, in discussing how exactly the FBI and DHS have thwarted Chinese espionage efforts later in his “Analysis of Cases” section, the discussion meanders into cases in which they discovered sources within China of cyberattacks into sensitive computer files of the US government, defense related businesses, financial institutions, high-tech and medical research facilities, academia, and anywhere else the hackers apparently believed there was a good opportunity to break-in and seize data. While Eftimiades expressed the intent to focus on HUMINT operations and tactics of Chinese government organizations and commercial entities engaged in espionage in the US, it would seem that he had little choice but to present it if he sought to put some positive face on what US counterintelligence services are doing to thwart China’s efforts. It is the brightest rift which can at present be seen in the clouds,

Readers may recall in Act 1, scene 3 of William Shakespeare’s play, The Life and Death of Julius Caesar, Cassius utters these apposite words to his co-conspirator Brutus: “The fault, dear Brutus, is not in our stars / But in ourselves, . . . .” With the intention of being frank, but by no means beastly, greatcharlie proffers that the fault for China’s success may lie with the US counterintelligence services themselves. It may be less a matter of tactics, techniques, procedures and methods, and rather a problem among US counterintelligence service personnel that the Chinese have recognized that they can exploit. As a matter of professional development, some effort might be made to ensure their cognitive abilities regularly honed through weekly, even daily, exercises and tests to strengthen their thinking skills, their prowess at uncovering all relevant facts, even from trifles, and developing solid insights from those facts, and their effective and correct use of a reliable intuition and intimation. Though this is stated in the abstract, one can almost be certain that the Chinese intelligence services to some degree are doing like-minded things to strengthen their intelligence officers competences. It could be something as simple as the private performance of Tai chi chuan or likely Martial Qigong every morning. (imaginably, both techniques would be performed respectively with a dynamic and free-flowing form and stances that would cause any instructor to weep with delight while observing ) Along with exercise, stretching, and breathing, it would allow their intelligence officers to mediate and attain deep focus and a relaxed state. Such activity would be helpful in any struggles with dépaysement.The Chinese intelligence services surely are quite determined to maintain an edge over their adversaries. So far, they have proved themselves to be competent and accomplished services in the field.

The Chinese company Huawei has been placed under similar export restrictions as ZTE had been, for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Section 9: “Analysis of Espionage Tradecraft”

As stated earlier, a condensed review of Section 9 “Analysis of Espionage Tradecraft” is not included here. The section is left to each reader to enjoy at first blush and perceive and decipher all they can from it. Recall that in November 1922, when excavating the tomb of Tutankamen, the English archeologist and Egyptologist, Howard Carter, pierced a hole enabling him to see inside the actual chamber. He was asked by colleagues if he could see anything, and he simply replied: “Yes! Wonderful things!” Readers will say the same when they read this section.

Having stated that, greatcharlie nevertheless includes some commentary on section, compelled by Eftimiades to mention that among those committing acts of espionage for China are commercial entities, SOEs and private companies, academic institutions, and independent individuals, particularly entrepreneurs. Eftimiades explains that SOEs and commercial entities have been determined to engage in espionage in the US and elsewhere outside of China. Having dubbed them as entities engaged in espionage, they are examined as such and ascribe all of the qualities of an intelligence service. Thereby, one would expect to observe certain traits of an intelligence service such as tradecraft to be performed by their representatives while operating in the field. Yet, unless there is some information collected by US Intelligence Community–and that would unbeknownst to greatcharlie–stating those entities as well as individual business engaged in similar acts, view themselves to be intelligence services or espionage organizations, one may not see them regularly act as such.If they display any tactics, techniques, or methods that resemble tradecraft it should be viewed as exceptional and not an expectation. Imaginably, they, themselves, might be quite surprised anyone might refer to them as espionage organizations. They simply may view themselves as a “collective” Chinese citizens working in the US availing their home companies and country of technologies, hardware, documents or whatever else they might grab from US institutions that may employ them as the opportunities present themselves. To that extent, they may really be nothing more than somewhat organized rings of thieves, nothing more. As for these individuals showing such willingness to respond to the requests and demands of the Chinese intelligence services or other State Council bureaucracies as SASTIND, too much might be made of the fact that they are obedient to the commands and demands of their authoritarian and very often punitive, government. After all, in addition to their own lives, everything that they hold dear, their families, are in the hands and under the awful power of an authoritarian–some might say totalitarian–Communist government in Beijing.

Of course, one must be open-minded. Thus, the door should not be shut completely on the possibility of some deliberate design in the practices of such commercial entities and individuals with regard to their espionage. Note that overall, their practices are not chaotic or haphazard, but rather they are grounded and for the most part accomplished. Aliquis latet error. (Some trickery lies hidden.)

In the abstract, one could imagine their movements and interactions of individuals operating for commercial entities may be intentionally stochastic. Indeed, if the activity is genuine espionage and not simply criminal behavior what greatcharlie supposes should really draw the attention of US counterintelligence is not as much whether it meets a certain expected standard of tactics, techniques, procedures and methods. What should draw that attention is the appearance of control, orchestration, and forceful activity, and that something intense is happening. Something is intended and is being achieved. The fact that there is a professional side to all of that activity must also be considered. The focus, greatcharlie humbly suggests, perhaps should be placed first on the purposefulness of the activities displayed by Chinese commercial entities and individual businesspeople, not its randomness. 

Acting as described, they allow themselves some degree of security without the need to set up resources, set up sites, train in tactics, techniques, procedures and methods to communicate and pass information physically. Keeping their movements randomly determined might leave their efforts open to analysis statistically. One could discern some random probability distribution or pattern. However, it might still be impossible for those movements and interactions to be predicted in a useful way. One might imagine that to rise to a certain level in their companies or institutions, the individuals involved are well-educated or clever enough to consciously plan their activities in a seemingly random way. Surely, anyone in a commercial entity or institution selected for such work will be tested and screened before being sent off. In some welcome back, job well-done session or maybe a torturous debriefing, the employees surely inform their manager what practices worked well in the field and which at the time were determined to be too risky.

What would seem as important, or perhaps even more vital for Chinese commercial entities, would be properly casting each “espionage operative” or “thief.” The absolute right man or woman must be assigned for the right job. Surely, human resources would bring in and spotlight the right people and managers would make selections for such work and overseas deployment. One would hardly find such individuals to be hot-blooded, and wreckless, incompetent in any fashion. They would exude equanimity, sangfroid, graciousness, and professionalism. They apparently work with a mindset that nothing is unattainable. Loosely, one might posit, taking such an attitude and approach to their efforts, might be said to be at the foundation of any “ostensible tradecraft.” Everything they do, choices they make, flows from that line of thinking.

Looking at Eftimiades discussion a tad more it would seem that he gives Chinese commercial entities and individuals engaged in espionage too much and too little credit at the same time. He perhaps gives them too much credit by identifying them as intelligence gathering organizations and thereby assessing their use of tradecraft. He gives them too little credit in that if he believes his presumption as to their status as spies and their “spy-like practices,” correct, then he dismisses the possibility that their actions are disguised, deliberately performed in a way distant from tradecraft as a technique. If their intention was to cause confusion among possible observers by taking that tack, Eftimiades’ expression of some puzzlement over the absence of traditional tradecraft in their practices serves as evidence that to a degree they may have succeeded in that. At the same time, certainly nothing they might do, would be intended to stand out, such as, perhaps in extreme, appearing gargoyle or something of the type, and drawing attention daily.

Some foundational information and thought on Chinese espionage activities in the US has to be established if study and understanding on the subject is to be advanced. The establishment of such a baseline of information, however, should not result conversely in some uncompromising stance toward it. New facts must be collected and an openness must exist to consider alternative analyses of those facts, which may lead to new possibilities and potential successes against such activities. There are likely many unexplored possibilities that perhaps should be considered about all matters concerning the subject. From what has been publicly reported, often in the US national security bureaucracies, perspectives on adversaries have reportedly become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, perhaps most akin to an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with regard to Chinese foreign intelligence activity in the US.

It seems high time that US counterintelligence services ceased looking at Chinese intelligence operations and tactics with a focus on their deficiencies and flaws in practice. Equally or even more important is to consider precisely what they are doing right in order to be successful. A starting point would be an assessment of how Chinese intelligence services and all the other government organizations and commercial entities engaged in espionage in the US view US counterintelligence services and how they are responding to US defenses set up against them. It would seem from Eftimiades text that a burgeoning notion in defense of the current situation in which China is achieving a degree of success is that their numbers in the US are so high that it would naturally be difficult to struggle with them head-to-head. Hopefully, this is not the case. To be frank, the ability of Chinese intelligence services to position so many of their personnel in the US is just a symptom of the conundrum of not being able to stem their activities. Focusing upon that will not yield a cure. There are surely considerable deficiencies and flaws in the way in which US counterintelligence operates that have given Chinese government organizations and commercial entities the confidence to act without much fear. Res ipsa locquitor. (The thing speaks for itself.)

Of the seven universities that have been dubbed the Seven Sons of National Defense, some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. On that list is the Nanjing University Aeronautics and Astronautics (above). Nanjing is also known for providing the MSS with recruits for its corps of intelligence officers.

Section 11: “Summary”

Since what is found in Eftimiades “Summary” section is drawn from his discussion of his analysis of the 595 espionage cases since 2000, it would stand to reason they would serve well as a figurative subset of eight ample bullet points for his “Key Findings” which themselves extracted directly from the facts of those many cases. Of that seeming “subset of findings” in Eftimiades “Summary” section, the “top 5” selected by greatcharlie are the following.

First, Eftimiades explains that the US Intelligence Community is not well-organized to protect the secrets of US industries. It is far better at protecting its own secrets. He says the same holds true for most other technologically advanced [highly industrialized] countries. A problem he points to, calling it obvious, is that commercial industry and scientific research programs, the primary targets for Chinese intelligence collection, are the most vulnerable.

Second, as aforementioned in the discussion of the monograph’s Preface, Eftimiades says the DHS and the FBI are leading the effort in the US “to combat China’s massive intelligence collection campaign.” He again states that both organizations “have done excellent work in reducing Beijing’s relentless efforts,” noting the FBI has made advances since 2018 to assist US industry and academia, and DHS is also working aggressively to curtail illegal exports of advanced technology and those who steal scientific research. However, he declares “there is still much more to be done.” He explains that the work of other government agencies as well as a bipartisan effort in Congress will also be necessary to ensure national and economic security.

Third, Eftimiades proffers that success in thwarting China’s aggressive collection efforts will ultimately rest upon three factors: 1) the ability of US law enforcement and intelligence apparatus to shift organizational culture and support private industry and academia; 2) developing a strategic campaign in the US integrating all the elements of the government and its allies; and, 3) having Congress pass laws to raise the costs of economic espionage to the Communist Party of China. Chinese companies and individuals via visa restrictions, sanctions, investment restrictions, and otherwise. 

Fourth, Eftimiades explains, as he has surely illustrated throughout his monograph by reporting his case analysis, yet does not declare in any vehement way, that China’s “whole of society” approach to espionage has been quite successful thus far in defeating government and private industry organizations. He focuses more on what has been positive about US counterintelligence efforts,

Fifth, Eftimiades reveals that efforts by some countries within the EU, India, and Japan to restrain China’s intelligence activities have been comparatively less apparent in public sources. Although espionage arrests in India, Germany, France, Belgium, and Poland have been low in number, he sees such developments as an indication that those countries now seek to more vigorously counter China’s collection efforts. In addition, Eftimiades asserts that “China’s public image is suffering worldwide as the French and German governments have made statements on China’s aggressive espionage on social media, human rights issues, COVID-19 response, and Beijing’s threats over trade.”

In determining the percentage of Chinese espionage efforts thwarted, it must again be noted that the percentage would need to be calculated based on the entirety of the Chinese espionage effort. If one accepts Eftimiades does not know that number, and there is no reason not to do so, knowing the percentage of thwarted espionage efforts seems impossible and his claim is only a presumption or at best the result of “secret knowledge.”

When writing about the success of the FBI and DHS in thwarting espionage efforts of Chinese government organizations and commercial entities, there was less of an appearance by Eftimiades of reporting facts, and a more apparent effort by him to convince readers on a position tenuously supported in the text that he wants them to accept. To that extent, he actually presents more than anything else, as there is no supportable alternative story to present given the realities of the situation, is a well-supported outline of concerted, energetic, and endless activity to steal US secrets by China.

It would seem that the nature of the situation has already been firmed in the minds of the public based on reports in the newsmedia. It is unlikely that readers of his monograph would be inclined to Eftimiades perspective, despite his remarkable background. It is unlikely that anyone in the US counterintelligence services, particularly among senior executives and managers, is on Cloud 9 over results versus Chinese government organizations and commercial entities engaged in espionage in the US. Somewhere deep inside, some may feel a bit stuck and stagnating, clutching at straws, and listening to the wind, but conceal such concerns from their colleagues. One might imagine their feelings: “Je suis las de toujours faire la même chose.” That would be a multifaceted problem for US counterintelligence services in itself. Perchance in trumpeting FBI and DHS success was an effort to boost morale or at least comfort those from each service who may have had their fill of Chinese success in their country. Eftimiades may have viewed optimism as the best and most available elixir for defeatism, and employed it liberally. Perhaps this line of thinking that drove Eftimiades, who leaves no doubt that he is unwavering in his support and confidence of the FBI and DHS, consciously drifts a tad away from his encomium of their respective work against Chinese espionage moves in the US. As also mentioned in the discussion of the monograph’s Preface, in the “Summary” section, Eftimiades does say “there is still much more to be done.”

Noticeably, in the “Summary” section, as noted in the discussion of the Preface, Eftimiades also relents so to speak from his “declaration of nescience” to say there are very likely thousands of Chinese espionage operators in the US. However, although there is clear evidence that their purpose is to steal US secrets and technologies, one might consider in the abstract whether there may be other interests of the utmost importance to the Chinese intelligence services that require such a labor-intensive effort. That should beat the brain. Going back to the suggested figure of 25,000 intelligence officers, professionals, albeit discrepantly trained and experienced, on the ground–a force one and half times the current size of a US Army armored division, it may be worth considering whether they may be engaged in a bold, cunning reconnaissance and surveillance mission of far greater conception than ever seen in the past or might normally be imagined in the present. Itt might be a mission that could not be performed in any other way than with a large force of professional intelligence officers. To be direct, yet admittedly still a bit Delphic, there must be a clear reason why officers of Chinese Intelligence services operating in the US, in particular, are so successful at not being wherever, whenever US counterintelligence services are looking for them. 

There is a thin line that separates reality from illusion. It must be kept firmly in mind that if one denies or unconsciously suppresses reality, what is left is only an illusion, false reality. Once one begins planning and operating within that, all is lost. If that is or ever would be the case concerning the Chinese conundrum, the situation will become far worse than ever imagined. Further, the more one deals in truths and reality, the more one develops reliable intuition and intimations. The more one entertains fallacies and what is artificial, the farther one moves away from having any real intuition or developing any intimations at all. These skills in the end will prove to be absolutely imperative if endsieg, a final victory against all of the odds stacked against them, is to be achieved by US counterintelligence services in their struggle against Chinese espionage efforts. As the celebrated Spanish novelist, translator, and columnist, Javier Marías remarked during an interview for the Winter 2006 issue of the Paris Review: “One must have courage to see what one does see and not to deny it for convenience.”

Regarding China’s concern about having the image of being a country of thieves and copycats, stealing the best ideas of other countries to support and propel its conspicuous advancements in nearly all sectors, the Communist Party of China absolutely has an interest in global public opinion of China and perceptions of its actions on the world stage. Still, it is unlikely that the Communist Party of China has too much concern about that in that vein. One must remember, the Party insists that at the foundation of all advancements of the Western industrial powers are the years those countries overwhelmed peoples who were defenseless and through a colonial system violently oppressed them and allowed business enterprises of their respective countries to exploit the conquered peoples’ lands for raw materials and mineral wealth for centuries. They will use the experience of China to support that argument. Within their own countries, the Party says down-trodden workers were essentially enslaved by the same business enterprises now called multinational corporations. (Note that greatcharlie asserts in the abstract that this is the Communist Party of China’s perspective; it is by no means greatcharlie’s perspective.)

Still, more salient based on the Party’s mindset would be the overall judgment of the world on the robust energy China displays as it pushes onward and upward into the future and, albeit mistakenly believing, eventually reaching the position at the top as the world’s dominant power. From that perspective, the Communist Party of China would see their country as having a very positive, lasting impact on global perceptions of it everyday. To that extent, the Party leaders and propagandists likely weigh that global perception on “energy” and Western measures of global public opinion ratings, particularly if those ratings are based on reactions to independent events and not the bigger picture. While one might agree that there are some universal truths about our world, still not everyone thinks the same on all issues. China’s view of its future is quite at variance with that held by most in the US best familiar with the issues involved. Fere libenter homines id quod volunt credunt. (In most cases men willingly believe what they wish.)

There will naturally be more that US counterintelligence services would want from the US Congress to appropriate for them in order to pursue adversarial countries’ intelligence services operating without pause, on the ground, in the US. However, the matter must be examined from the lens of Congressional leadership. From their view, US counterintelligence services  presently possess considerable resources to pursue Chinese intelligence officers and operatives. There are no indications Chinese espionage networks are being regularly taken down. Harsh critics and skeptical observers might begin to believe that, unbeknownst to the public, US counterintelligence services are actually being restrained from doing their utmost to defeat opponents here in the US. However, there would hardly be any logic to that. Surely, US counterintelligence services are not flâneurs, in the field simply playing chase games. Even the slightest act in that direction would betray the trust and reliance the US public has in their fidelity and  their belief that they are protecting the country’s sovereignty, its property, its interests and especially its people. As expressed in the February 26, 2021 greatcharlie post entitled “Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts”, by 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. Sardonically, from a paranormal perspective, one might suggest that although Chinese intelligence officers may be operating in the same spaces in which US counterintelligence services are looking hard, they do so in some other plane existence, undetectable by mortal eye. Sous une surface calme tout se passe.

There has been more than enough talk about how bad the problem with China is. C’est la Bérézina. As it has been discussed so often that, in a way, such talk haa become by the by to some degree for the US public. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and destroy all of its networks. As greatcharlie has mentioned in proceeding posts on the Chinese espionage crisis, It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Eftimiades clearly understands that much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. Fundamental changes may be needed in efforts to halt Chinese espionage operations. There is the possibility that certain apparent aspects of Chinese intelligence operations are not being focused on sufficiently or appropriately. Making the right improvements requires being persistent in one’s search for answers. To continue the pursuit successfully will require a certain boldness in thinking. Although he literally lost his head by guillotine two years later, George Jacques Danton, the 18th century French revolutionary leader, addressed the Legislative Committee of General Defence, September 2, 1792 with words concerning the situation in France which are apposite for counterintelligence organizations dedication protecting their countries against any harm by Chinese intelligence services: “De l’audace, et encore de l’audace, et toujours de l’audace, et la France est sauvee.” (Boldness, more boldness, and always boldness, and France is saved.)

What Eftimiades presents on Chinese espionage operations and tactics represents a stage of those activities existent at the time he wrote the monograph. However, Chinese intelligence operations and tactics appear to be constantly and rapidly evolving, becoming something more effective, more efficient everyday. As their capabilities improve, the possibilities for action also increase. It is difficult to accept but very likely a reality that success has given Chinese intelligence services so far good reason to approach the future with confidence. To that extent, the worst may be yet to come. However, on the other side of the coin, while it may seem counterintuitive to some ears, the success of Chinese government organizations and commercial entities engaged in espionage in the US should not frustrate US counterintelligence officers. Rather, it should embolden officers of US counterintelligence services to struggle even harder to succeed. Hope must still exist in the situation for that. Surely, establishing a pattern of success would go a much longer way in building self-confidence among officers in US counterintelligence services struggling on their own home ground with the Chinese.

What one finds in Chinese Espionage Operations and Tactics is of considerable quality. The book remains a steady flow of information, data, and expressions that well-demonstrates the author’s command of the subject matter, from beginning to end. Without pretension, greatcharlie states that what is presented here represents less than twenty percent of the insights birthed in greatcharlie by Eftimiades monograph. Readers should imagine what insights might be brewed up from within themselves after they have had a chance to read through it. 

It is assured that after the first reading Chinese Espionage Operations and Tactics, one would most likely go back to the book and engage in that stimulating process again and again. The monograph will very likely be regularly consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. Surely, the monograph would be quite useful to an Intelligence Studies instructor who, as a primary part of an assignment, might decide to have students read the monograph, observe the manner in which Eftimiades report is formatted, how information is presented in its sections, and develop insights from its discussion.

Perhaps it is eedless to say at this point, but it is nonetheless stated with absolute conviction and true relish, greatcharlie unequivocally recommends Eftimiades Chinese Espionage Operations and Tactics to its readers.

By Mark Edmond Clark

Commentary: Will the Real Dong Jingwei Please Stand Up?: Comparing Features of Popular Images of China’s MSS Vice Minister

People’s Republic of China Vice Minister for counterintelligence of the Ministry of State Security Dong Jingwei (far right), and People Republic of China Minister of Public Security Zhao Kezhi (center), were among five Chinese officials attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. On June 23, 2021, officials of the People’s Republic of China Embassy in Washington presented this photograph of Dong’s very public appearance at the Shanghai meeting as proof that he is in China despite rumors that he had defected to the US four months before. The point at issue is whether the photograph presents the real Dong.

In June 2021, rumors had taken flight concerning the alleged defection of Dong Jingwei, the People’s Republic of China Vice Minister for counterintelligence of Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS–China’s relative equivalent to the Central Intelligence Agency (CIA). Dong was alleged to have defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. After arriving safely into US hands, Dong allegedly provided government officials with information about the Wuhan Institute of Virology that purportedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. However, by late June 2021, US officials began reaching out to the news anonymously to say reports of Dong’s defection were not true. and hinting that he remained in China. The mainstream news magazine Newsweek reported on June 22, 2021 that it was informed by a US government official that reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Although reticent about the rumors for the longest time, on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite claims that he had defected to the US four months before. Curiously, the photograph has not been widely accepted as incontrovertible proof of Dong’s identity, that he still resides in China, or that he did not defect among many independent China-watchers.

Before the controversy of the rumored defection, one would have had great difficulty finding Dong Jingwei’s name anywhere it might even be expected. Two resources for such information that greatcharlie’s will reach for first are: Peter Mattis and Matthew Brazil, Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), and I. C. Smith and Nigel West, Historical Dictionary of Chinese Intelligence (Historical Dictionaries of Intelligence and Counterintelligence) (Scarecrow, 2012). Following the blow-up of the defection story, numerous articles online have appeared and online encyclopedias such as Wikipedia and Britannica, have developed enough information to provide decent–though some were not so verifiable–biographies of him. As was noted in greatcharlie’s June 30, 2021 post entitled The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax,” never before has Dong’s name, or any other senior MSS counterintelligence official’s name, been bandied about in the US or global newsmedia in the manner it has been lately.

What would imaginably now be a greater issue for inquiring minds than Dong’s biography, is the matter of his actual image, how he actually looks. A number of photographs of him have cropped up along with the many new articles, but two particular images of Dong have been very popular. As the two images have far more similar features than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. If they are photographs of two different men, one may actually be Dong. Here, greatcharlie gives making comparisons between the two images of Dong the old college try.

The June 16, 2021 tweet from the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong Jingwei had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia. Along with Han’s commentary was the popularized photograph allegedly of Dong Jingwei.

The first image mentioned above was made available widely via Twitter on June 16, 2021 as a result of being in a photograph attached to a tweet by the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia.

The second fairly popular image is included with his biography in Wikipedia. The individual in the Wikipedia photograph appears to be the same individual in the photograph that the Chinese government released of Dong attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. He is the same individual in a photograph taken when Dong was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. In the photograph, Dong is first from the left. It is alleged to be the earliest publicly available photograph of Dong after he began serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in April 2018. 

A photograph taken when Dong Jingwei (far left) was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. It is alleged to be the earliest publicly available photograph of Dong serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in the MSS in April 2018.

Si parva licet componere magnis. (If we may compare small things with great.) By placing the photograph of Dong from greatcharlie’s June 30th post beside the photograph from his biography in Wikipedia, using only the naked eye, one can find clear distinctions in at least seven areas of their respective faces. To allow readers to follow along with comparisons of facial features, the June 30, 2021 greatcharlie post photograph is included here as Figure 1. The Wikipedia photograph is included here as Figure 2. A chart that identifies parts of the human face is included here as Figure 3. Readers should refer to that chart to locate points of the face mentioned in Figures 1 and 2. The seven specific points on the face address include: philtrum; philtral columns; philtral dimple; nasolabial grooves; nasal septum; mentolabial sulcus; and, facial marks.

Figure 1 

Dong Jingwei June 16, 2021 Twitter Photograph

Figure 2 

Dong Jingwei Wikipedia Biography Photograph

Figure 3 

Face Chart

Philtrum

The philtrum on the individual in Figure 1 forms a visually straight canal with the philtral columns formed in straight lines from the nasal septum to the top of the lip. They are somewhat thick on both left and right. The canal of the philtrum appears relatively symmetric in its depth and width to the corresponding height and width of each philtral column. On the individual in Figure 2, the philtral columns appear shorter than those of the individual in Figure 1. They are separated enough to form the philtrum into a wider and somewhat deeper canal than that of the individual in Figure 1. 

Philtral columns

Although they are not marked on the chart in Figure 3–greatcharlie apologizes for that omission, the two columns of the philtrum running from the septum of the nose to the top of the upper lip are called the philtral columns. At the point the philtral columns touch the top of the upper lip–known more precisely as the vermilion border–in Figure 1, two delta shaped points form. Those delta shaped points are not present on the upper lip of the individual in Figure 2. On the individual in Figure 2, the philtral columns contact the upper lip in a way to form a horseshoe or “U” shape. The upper lip, itself–as aforementioned, called the vermillion–forms only moderate curves at the points on which the philtral columns contact it.

Philtral dimple

The philtral dimple, not marked in the chart in Figure 3–again, our apologies–is the gap between the two philtral columns where they contact the upper lip. On the individual in Figure 1, the philtral dimple is pronounced between what are visually two triangle shaped points, both left and right at the base of the philtral columns. On the individual in Figure 2, the philtral dimple is a far less pronounced facial feature.

Nasolabial grooves

The nasolabial grooves on the individual in Figure 1 are very pronounced both right and left. They begin at a point above the wings of the nose appearing to make contact with the dorsum of the nose. The nasolabial grooves on the individual do not contact the wings of the nose. They stretch in near straight lines down and to the left and down and to the right, reaching just outside the edge of the angles of the mouth. The nasolabial grooves on the individual in Figure 2 are not as long as that of the individual in Figure 1. They curve inward and contact the top of the wings of the nose of the individual. Although the nasolabial grooves are not as pronounced on the individual in Figure 2 as those of the individual in Figure 1, where they become more apparent is closer to the wings of the nose. They are somewhat deeper and the skin around them appears thicker than that for Figure 1.

Nasal septum

The nasal septum at the point where it contacts the philtrum on the individual in Figure 1 is thin. The point at which the nasal septum contacts the philtrum On the individual in Figure 2 is somewhat thick. The nasal septum also appears shorter to some degree. The individual in Figure 1 appears clean shaven beneath the nasal septum and over the philtrum to the upper lip. The individual in Figure 2, in all photos available publicly, maintains very slight hair growth, perhaps a deliberate, modest “designer stubble,” beneath the nasal septum, covering the philtrum down to the top of the upper lip and across to the angles of the mouth.

Mentolabial sulcus

On the individual in Figure 1, the mentolabial sulcus, the line or furrow formed between the base of the lower lip and the base of the chin, is prominent. There is an apparent blemish–mole, birthmark, scratch, bruise–beneath the mentolabial sulcus along its right edge, at a point just inside “the line.” The mentolabial sulcus on the individual in Figure 2 is barely perceptible. It has a somewhat curved shape. The chin on the individual in Figure 1 appears somewhat “U” shaped. The chin on the individual in Figure 2 appears more “bow” shaped. The length between the base of the lower lip and the base of the chin is shorter on the individual in Figure 2 than on the individual in Figure 1.

Facial marks

On the individual in Figure 1, there is a mole, birthmark, slight injury (scratch or bruise), beneath the mentolabial sulcus, beneath and just inside the right edge of it, not making contact with the line itself. On the individual in Figure 2, there are no similar marks on the face.

Finally, the most obvious difference between the two men is that one in Figure 1 wears eyeglasses. The individual in Figure 2 does not wear eyeglasses. It is possible, however, that the individual in Figure 2 does wear eyeglasses, but simply removes them when taking photographs.

Additional Observations Concerning Photographs

Signs of Aging

Eheu fugaces labuntur anni. (Alas, the fleeting years slip by.) What might be perceived beyond the physical about how two individuals in the photographs projected themselves at the moment their pictures were taken is that they are respectively professional, intelligent, well-minded, well-dressed, well-groomed, Chinese officials. However, from what information is publicly known, and what one may accept as true about Dong is that he is currently 57 years old, reportedly being born on November 18, 1963, one can attempt to correctly perceive aspects of his physical condition, too! To that extent, one might consider how age might impact the appearance of the real Dong.

There are many who really do not begin showing signs of aging until a bit later than 57. (By no means does one become “past one’s prime” or “over the hill” after reaching age 57!) Yet, there are some fairly common, and commonly understood, changes in appearance that normally occur. As one ages, the appearance of the face and neck typically changes. Loss of muscle tone and thinning skin can often give the face a flabby or drooping appearance. The skin also tends to dry out and the underlying layer of fat shrinks so that your face no longer has a plump, smooth surface. To some extent, wrinkles cannot be avoided. If readers would look back at the two photographs of individuals both identified as Dong in Figures 1 and 2, they will notice that the individual in Figure 2 has a rather plump, smooth surface. There are no wrinkles or furrows visible on the face. There is considerable muscle tone in the face in all three photos of him presented here, most prominently along the jaw. The individual in Figure 1, exhibits the more dried skin that comes with age. The visage of the individual is strong but there is no pronounced muscle tone. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, slight furrows can be discerned on his forehead.)

Sun exposure and cigarette smoking are likely to make them develop more quickly. However, there is no way for greatcharlie to determine whether the individual in the photograph is a heavy smoker or is regularly exposed to the sun. There is no way available for greatcharlie to determine whether these factors relate to the individual in Figure 1 either.

In another sign of aging, the number and size of dark spots on the face increase as well. It was noted earlier that there is a blemish on the right side of the face of the individual in Figure 1. However, there is no available way for greatcharlie to determine when that individual acquired the blemish. There are no discernible spots on the face of the individual in Figure 2.

With aging, the loss of bone mass in the jaw reduces the size of the lower face and makes your forehead, nose, and mouth more pronounced. The nose may lengthen slightly. In both Figures 1 and 2, there is no indication of the loss of bone mass in the jaw. The noses of the individuals in Figures 1 and 2 do not appear to have suffered ill-effects of age such lengthening. In fact, the skin on both noses appears rather smooth and plump.

A common transformation due to aging is for the fat from the eyelids to settle into the eye sockets. This can create the appearance of sunken eyes. make. The lower eyelids can slacken and bags can develop under your eyes. The weakening of the muscle that supports the upper eyelid can make the eyelids droop. This may limit vision. There is nothing to indicate any of these aspects have impacted the appearance of either individual in Figure 1 or 2. As the individual in Figure 1 wears eyeglasses, any effects on his eyes may have been influenced by them. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, it appears that there is a hint of bags under the eyes detectable through his eyeglass lenses.)

A most apparent sign of aging is gray hair on the scalp, and gray hair on the scalp, and on the eyebrows and eyelashes as well. One the individual in Figure A, there is no ability to determine whether he has gray hair in his eyebrows or eyelashes. Except for the hair above his forehead, one cannot see the hair on his scalp to determine if there is gray hair. (It must be noted that in a photograph included here below in which the same individual identified as Dong in Figure 1 is seen, his hair parted on the left side of scalp, revealing what appears to be gray hair.) The individual in Figure 2, on the other hand, clearly has no gray hair in his scalp, eyelashes, or eyebrows. In fact, as aforementioned, there is slight hair growth on his upper lip. It is decidedly black giving him a very youthful appearance. To that extent, the individual in Figure 2 appears to be younger than the individual in Figure 1, and perhaps younger than 57-years-old.

Countenance of the Face

Duriora genti corpora, stricti artus, minax vultus et major animi vigor. (Hardy frames, close-knit limbs, fierce countenances, and a peculiarly vigorous courage, mark the tribe.) In addition the changes in the face that come with aging, one’s work can be manifested in the countenance, too! As explained in greatcharlie’s June 30, 2021 post, the primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide to protect China’s citizens, secrets and technology from foreign spies. Counterintelligence may very well be the greatest manifestation of the paranoia business, but it, as all other elements of the intelligence industry, requires wisdom, reason, and logic to be performed well. If progress through interviews or interrogations of the subject of an investigation indicates that an investigator is on the right track, there will be an attempt to find another door inside to open and pass through in order to get deeper on matters. Such technique is honed and polished over the years. 

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, speaks to this point in The Secret Pilgrim (Alfred L. Knopf, 1990) when his main character, George Smiley a senior and well experienced intelligence officer for The Circus–MI6 in nearly every respect, tells a group of probationary intelligence officers in the fictional foreign IntellIgence training school in Sarratt that he was the one who debriefed his arch rival from Moscow Center, the headquarters of foreign intelligence service of the Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB.  He was known only by the name, Karla, and was captured in Delhi after escaping the US. Explaining to the trainees in general about the nature of interrogations, Smiley says at times they are “communions between damaged souls.” However, when MSS managers have determined the situation demands rough treatment, imaginably compelled by some exigent circumstance, and when the decision will align with the thinking and plans of the Communist Party of China leadership, surely coercive measures will be employed to include forms of torture. That work surely takes its toll, often manifesting its pull on the countenance of those who have engaged in it. The aphorism is quite appropriate here: “L’habit ne fait pas le moine.” Still, perception might lead the reasonable to choose the individual in the photograph of Figure 1 to someone more apparently carrying such a burden based on appearance, and perhaps a bit of intuition. Ut imago est animi voltus sic indices oculi. (The face is a picture of the mind as the eyes are its interpreter.)

An image of Dong Jingwei matching that from the June 16, 2021 Twitter photograph (above). If these popular photographs of Dong in Figures 1 and 2 presented here are actually of two different men so be it. This practice may turn out to be of greater use by China’s intelligence services than anyone outside of the country might have imagined. However, there remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case then in the possible effort to conceal his identity, Dong has done the thing completely.

Concealing an Intelligence Chief’s Identity: Not an Uncommon Practice

The idea of a director, senior executive, or key operations manager of an intelligence service taking steps to conceal his or her identity would not be unique in the annals of secret intelligence. Turning to a handful of examples, in greatcharlie’s November 13, 2019 post entitled, “Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997),” it was explained that Markus Wolf, chief of the foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA of the erstwhile Deutsch Demokratische Republik (German Democratic Republic) or GDR, lived a life in relative obscurity, brilliantly concealing his presence and the footprint of his organization as both operated against the West. His memoir’s title, Man without a Face, was a direct reference to the fact that at one point, Western intelligence services only had a blurred photograph of Wolf while he attended the Nuremberg Trials from which elements within the CIA managed to identify him in 1959. Unable to collect an up-to-date photograph from which to identify Wolf afterward, for a long-time he was referred to among Western intelligence services as the “man without a face.” As the story goes, only after a GDR defector, Werner Stiller, identified Wolf in a photograph in 1979 for the counterintelligence element of West Germany’s Bundesamt für Verfassungsschutz (Office for the Protection of the Constitution) or BfV did that change. The photograph of Wolf was captured by Säpo, Sweden’s National Security Service, during a visit he made with his wife to Stockholm in 1978.

At the time Stephen Dorril wrote his authoritative book, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000), Richard Dearlove, then head of the United Kingdom’s Secret Intelligence Service–colloquially known as M16–was virtually unknown. A contemporary photograph was not published in the newsmedia. According to a BBC report, when Stella Rimington in 1992 was named the first female chief of the United Kingdom’s Security Service–known colloquially as MI5–her neighbors finally discovered what she did. Even her children learned of true occupation for the first time. No official photographs accompanied her name at that time. However, later, official photos of her were provided after photographers managed to take what was described as “a very blurry picture of her out shopping.”

Sidelights

If these popular photographs allegedly of Dong in Figures 1 and 2 here are actually of two different men so be it. It may turn out that using decoys may be a practice in greater use by China’s intelligence services than anyone outside of the country might have imagined. Perchance as a result of the Dong defection matter, it has been brought to light to the world all at once. The sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. 

There remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case, then in the possible effort to conceal his identity, Dong has done the thing completely. The two photographs focused upon here will continue to be published perhaps until another plausible image, or perchance another two or more, of Dong surface at some time and via some source of Beijing’s choosing.

A quote from Arthur Conan Doyle cited in greatcharlie’s June 30th post on Dong’s rumored defection might be worth repeating here. In “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in Doyle’s The Adventures of Sherlock Holmes published in the Strand Magazine (1891), his main character, Holmes, states: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

The Way Forward

Omne ignotum pro magnifico. (Everything unknown seems magnificent.) Without pretension, greatcharlie states that it does not have any information that would allow it to judge which photograph holds Dong’s true image. As promised, greatcharlie has only sought to parse out a few possibilities here. What is presented are simply perceptions based on observations made of less than a handful of photographs. Certainly in China, there are more than a few people in the MSS, MPS, the State Council, and the Communist Party of China who know exactly what Dong looks like and which of the two photographs, if either, depicts him. It may very well be that the causality for the use of mixed images of Dong is based on an effort to increase security. However, just as greatcharlie, a nonpracticioner, “amateur sleuthhound”–as one reader sardonically  referred to the editor–has examined two reported images of Dong in photographs, Expert, professional analysts in US and other allied intelligence services have doubtlessly examined all of the photographs out there that purportedly include Dong using AI and other advanced technologies, and have reached to their own conclusions. Thus, despite any possible efforts to conceal Dong’s identity, they likely have a fair idea of how Dong looks, too!

As greatcharlie has noted in previous posts, in our ordered universe, it is expected that everything will follow its design. Order in the human mind is established by patterns that one can decipher. With the smattering of facts, evidence, and insights available, one can still postulate, and see if a theory formulated on what the whole Dong episode was all about can be confirmed by facts through investigation. It may not always be a tidy process. Wary of the moves Chinese intelligence can make, some might contend the matter of the varied images of Dong may actually be part of some recherché plan to create greater mystery around his identity. Imaginably, it would be viewed as a subplot hanging from a greater MSS disinformation plot to foster a bizarre defection rumor. On the other hand, some might go as far as to assert a more fanciful theory such as the leadership of MSS, in an effort to impress Communist Party of China leaders ahead of, and during, the Centennial of the Communist Party of China the decided to provide a modest demonstration of the organization’s capabilities. Thus,, MSS may have decided to have a little fun with US counterintelligence services by “just messing with them” as the saying goes, making certain that Party’s leaders were in on the joke. The whole matter has certainly had quite a meretricious effect worldwide. Of course, such a move would hardly be a schema, and perhaps the last thing one should expect from MSS. Still, though it may be improbable, it is all the same conceivable. One can be assured that similar overimaginative assessments, judgments concerning the Dong defection episode will continue to be made and published primarily online. Their creation will be driven by the fact that for inquiring minds, the curious, the enthusiasts demand more answers on the matter. In Areopagitica (1644), the great 17th century English poet and intellectual, John Milton, explains: “Where there is much desire to learn, there of necessity will be much arguing, much writing, for opinion in good men is but knowledge in the making.”

The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax

People’s Republic of China Vice Minister of State Security Dong Jingwei (above). Beginning in February 2021, Dong became the subject of a rumor alleging that he, along with his daughter, defected to the US. The possible implications of his supposed defection were staggering. It was eventually revealed and proved that the rumor was pure fiction.  Never before has Dong’s name, or any other Chinese counterintelligence official’s name, been bandied about in the US newsmedia or worldwide in the manner it has been lately. An attempt is made by greatcharlie to some degree how this all came about and what was the purpose of it all.

Rumors of the alleged defection of Dong Jingwei, a vice minister of the People’s Republic of China Ministry of State Security–China’s relative equivalent to the Central Intelligence Agency, were the subject of intense discussion in the US newsmedia and social media particularly in June 2021. Allegedly, Dong fled China in February 2021 and handed himself over to US intelligence officials. Dong would have been one of the highest-ranking officers from China’s Intelligence Community, and the Chinese government in general ever to defect to the US. Yet, alas, the rumored defection never occurred.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, is now highly selective, positively picky, about those who serve in national security positions in his government. Considering what would be the most likely nature of the man or woman who would be able to serve as his Vice Minister at MSS for counterintelligence, it is hard to form a mental picture of where the rumor that Dong had defected to the US with his daughter, or who, or better, what organization, may have actually given it wings. It is harder to understand how those who ignited the rumor of Dong’s defection intended to benefit from its formulation and promotion. It is hardest to envision who among those with any knowledge of the Chinese government and the national security apparatus would believe, would ever consider defecting to the US no matter what the circumstances may be within the Communist Party of China or in his personal life. One could imagine Dong would be a deadender, sticking with the Party and his country until the rattle. There is always the possibility–though there are absolutely zero newsmedia reports anywhere that suggested some proceeding mental health episode had befallen him–that Dong may have been overwhelmed by some cacoethes. Barring that, there was no earthly reason to believe that he would defect, and to the US nonetheless. The puzzle now having been “resolved”–the whole truth is out there somewhere, greatcharlie gives a go at parsing out some of these issues hoping it does not come off as l’esprit de l’escalier. In that process, greatcharlie, albeit, steps out on shaky ground to present some unsolicited–and hopefully not unwanted–suggestions on how similar false reports in the future might be given appropriate consideration. Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.)

Some might conclude after noting the topic of this post that this is one more by greatcharlie on Chinese espionage in the US. Some, perhaps duly, might also grumble to the effect: “Now greatcharlie is all China, all the time!” While greatcharlie approaches the defection that did not happen out of academic interest, this examination, much as those of proceeding posts, is part of an ongoing effort by greatcharlie to give consideration of what it could offer to contribute to development more effective approaches to such hostile intelligence collection efforts against the US. Indeed, with the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. Readers will likely discern facts are interpreted from that perspective. However, no information is skewed or bent with preconceived ideas or bias.

Who Is Dong Jingwei?

Dong was born on November 18, 1963. At the time of this writing, he is presently 57 years old. In China it would be of some significance to note that he is of Han nationality. As for his studies, he has earned a master of science degree. The only publicly reported member of Dong’s family is his daughter, Yang–also known as Dong HuaHua on social media, who as part of the defection hoax was said to have allegedly fled China with him. She is the ex-wife of Alibaba executive Jiang Fan, who now heads the company’s powerful e-commerce platforms, Tmall and Taobao. 

Dong is a member of the Communist Party of China. Highlights of his career include service as the Secretary of the Party Committee and Director of the State Security Department of Hebei Province from 2006 to 2017. He served as Director of the Pokitical Department of the Ministry of State Security from 2017 to 2018. He eventually became a Member of the Party Committee and Vice Minister of the Ministry of State Security and the Chief of MSS Counterintelligence. It was noted in the July 24, 2015 edition of Intelligence Online that Dong’s heading of the State Security Department in Guo’anbu in the Hebei Province was significant for him as that province has reportedly produced many of Xi’s “securocrats.” Loyalty to superiors, reliability, and regional background apparently put him in good standing with senior party officials under Xi. By 2015, Dong reportedly became part of the “Xi Jinping Clique”, one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles and accolades provided to Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS, where Dong is vice minister, is an intelligence service responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems mainly from providing consumers in Beijing to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, and ministers and senior executives of appropriate ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions.

As noted in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” the primary targets of the MSS hands down are its chief competitor, the US, the Russian Federation, Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes. In the countries of Eastern Europe, China has achieved some prominence in their space. China must equally measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. Taiwan, which Beijing declares is part of China, is a special case and a very important MSS target. The second rung of competitors would include India, Pakistan, Nepal, and Mongolia. India has doubtlessly garnered a bit more attention from MSS due to its ongoing border struggle with China. MSS has stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

In defining counterintelligence, James Olson, the former chief of Counterintelligence for the Central Intelligence Agency and author of To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), which greatcharlie reviewed for its January 2021 post, states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” The primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide. MSS shares the counterintelligence role with Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS. MPS is an intelligence service under the State Council in charge of the country’s internal and political security and domestic intelligence.

The achievements of MSS in the US have certainly been no mean feat, and should not be underestimated. As discussed in the February 26, 2021 greatcharlie post entitled,”Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts,” the tide of essentially unchallenged Chinese espionage has lapped up so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among possible dissenters, an interest, not solely due to exigency, will grow on the idea. Chinese intelligence services have hampered the work of US businesses, research and development firms, high-tech firms, academia, and the federal government itself. They have created spy networks within institutions critical to US economic security and defense. They have attempted to inconvenience the US in its efforts to improve bilateral and multilateral relations in under-developed, less industrialized countries and even long time friends of the in certain regions, and multilateral institutions that the US actually had a hand in creating. One might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them.

Dong (above)  once headed the State Security Department in Hebei, a province which has reportedly produced many of Xi’s securocrats.” Loyalty to superiors, age and regional background apparently won him favor with senior party officials under Xi. He then became part of the “Xi Jinping Clique,” one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles held by Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. It stands to reason that in order to be a successful vice minister for MSS counterintelligence. Dong must be a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

In attempting to ascribe certain traits to Dong given his role at MSS, those considered by greatcharlie may appear to be mere abstractions. However, the few traits listed here along with a reliable intuition and challenging experiences within his own intelligence organization may very well have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions within adversarial intelligence services. These same traits perhaps have also assisted Dong in successfully navigating the top rung of China’s national security apparatus and to perform well at the side of leaders of the Communist Party of China.

One might first postulate that Dong possesses the traits of clarity, purpose, and focus. Surely, Dong puts his intentions forward for the best outcome possible. Clarity would allow Dong to concentrate with intention on what is ahead, on what needs to be done. One might expect that Dong believes by now that serving in MSS, performing executive duties for counterintelligence is his purpose. To that extent, purpose was likely revealed to Dong when he discovered the ability to use intuition to understand what may not be clear to others. He would be able to focus on what truly matters, and understand what needs to be avoided, such as anything that might frustrate, seriously inconvenience, hamper, or inevitably destroy his organization’s efforts

Dong is an intelligence officer and political leader of great energy, enthusiasm, and creativity. That energy is transmitted through the MSS. In the US, it would be transmitted not only to officers in the field but to errant citizens and Chinese émigrés recruited to serve the purposes of the intelligence service. He would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. He would be able to find unlocked potential in situations and determine ways to uncover what may be hidden away

What Was Reported on Dong’s Alleged Defection

Relate retero. (I tell what I have been told.) Some simple falsehoods went some way to explain and support what was from the outset a questionable story. From what can be gathered about the episode, stories about Dong’s alleged defection initially emanated from conservative websites in the US. Newsweek points decidedly to a June 4, 2021 report from the conservative political commentary website, RedState, as a source of the rumor. Discussion within conservative circles reportedly became even more intense as days passed. There was considerable discourse on Dong’s defection found in Chinese-language, anti-Communist newsmedia outlets in the US and on Twitter.

Among those who reported on the defection, there was general acceptance of the sequence of events. The defection scheme as laid out was indeed mad-capped. Dong allegedly defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. Dong supposedly provided the US government with information about the Wuhan Institute of Virology that allegedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. According to Han Lianchao, a former People’s Republic of China Ministry of Foreign Affairs official who defected in the wake of the Tiananmen Square massacre, Dong’s defection was raised by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi at the US-China Summit in Anchorage, Alaska in March 2021. On June 16, 2021, Han, citing an anonymous source, alleged that in Anchorage, Yang and Wang demanded that the US return Dong to China, but US Secretary of State Anthony Blinken refused. Subsequent reports, coupled with analyses by China specialists continued as Dong’s precise whereabouts remained unknown. Speculation had even reached Chinese social media threads after Dong had not been seen or photographed for several weeks.

While preparing a story on the alleged defection, SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations, had sought comment from the State Department last week, however, it did not respond. In the first public clarification put out by the US government on the affair, a US official, speaking anonymously, “reached out” to say reports of Dong’s defection were not true. With regard to Dong’s whereabouts, he stated “We can’t confirm or deny where he is exactly,” but hinted he remained in China. The official refused to go any further. When SpyTalk asked why the Biden-Harris administration sought to knock down rumors of such a high level defection, an ultra-sensitive issue, the official reportedly stated, “that’s more of a policy question”and referred SpyTalk to the White House. Reportedly, the National Security Council did not respond to SpyTalk’s request for comment.

Notably, Newsweek reported on June 22, 2021 it was informed by a US government official that the reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Yet, such reporting still did not cause those insisting on the defection to retreat back, away from the issue. It is always a capital mistake to reach conclusions before having all of the facts on a point at issue.

The Chinese government, itself, delayed publicly addressing the stories about his alleged defection. Then on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite rumors that he had defected to the US four months ago. According to minutes released by the Communist Party’s Central Political and Legal Affairs Commission, Dong was among five Chinese officials who attended the 16th meeting of the Security Council Secretaries of the Shanghai Cooperation Organization (SCO) Member States on June 23, 2021 Reports of the meeting were also shared on Weibo, China’s largest social media service.

Sources of the Hoax: Views on That in the Newsmedia

The Daily Beast quoted Robert Manning, a former top Asia specialist in both Republican and and Democratic administrations for more than 30 years as saying the decision of the Biden-Harris administration’s willingness to address such a normally highly secretive issue was “to excise an unnecessary additional irritant in the still downward-spiraling bilateral relationship” between the US and China. The Daily Beast also reported another possible motive was to beat back a Republican campaign to deflect blame for the COVID-19 pandemic in the US from the erstwhile administration of US President Donald Trump to China’s Wuhan Virology Lab and, by extension, Anthony Fauci, director of the National Institute of Allergy and Infectious Diseases, who has been critical of the former president’s response to the disease. In the same vein that the motivation may be domestic politics, the Daily Beast reported that a leading China watcher suggested the objective was to head off Republican accusations that the Biden-Harris administration was “hiding a defector who has info on the lab leak or [other] embarrassing stuff.” Essentially amplifying what was aforementioned here, the Daily Beast explained reports of Dong’s defection originated in conservative circles here and abroad that have been critical of the scientific consensus that the COVID-19 pandemic was transmitted from animals in Wuhan’s “wet market.”

On June 4, former Fox News reporter Adam Housley tweeted that “US intelligence has a Chinese defector with Wuhan info. and China is trying to produce variants that suggest it came from bats to cover up that coronavirus originally came from a lab.” Housley’s report was referenced by RedState, which alleged that “a person believed to be among the highest-ranking defectors ever to the United States from the People’s Republic of China has been working with the Defense Intelligence Agency (DIA) for months.” Citing anonymous sources “inside the intelligence community,” The Daily Beast further reported that Red State cautiously claimed “the defector has direct knowledge of special weapons programs in China, including bioweapons programs,” and that the alleged information had created “a sudden crisis of confidence in Dr. Anthony Fauci.”

In a June 24, 2021 Washington Times story, it was suggested by a former National Security Agency counterspy that the defection rumors were “part of a Chinese disinformation effort to distract attention from growing international concern over reports the coronavirus pandemic may have originated in a Wuhan laboratory.” If that intriguing possibility is true, it would seem that the other shoe dropped when Dong was seen at a meeting with the head of MPS later in the month. It might be said the some in the US newsmedia are so expectant and desirous of good news for the US on the Chinese espionage front, that some outlets were even ready to jump at a contrived one. he US Intelligence Community did not flinch in response to the defection reports at any point until,  as aforementioned, one US official spoke “just looking to correct the record.” 

Other Suggestions

One can only imagine–if he was actually unaware that the fiction of his defection, would be laid on so thick in the newsmedia worldwide–what Dong’s immediate reaction was when he received news that he was the subject of a farce that put his loyalty and honor in question. Dong was imaginably a little put out. It may have also caused him some embarrassment, some loss of honor. While the truth of Dong’s loyalty to the Communist Party of China and his country would eventually be made very clear, he would surely recognize that once his name was associated with he would indubitably feel was a damnable rumor, that taint would still stick, even if only to some small degree, long afterward. 

 Perchance that the defection rumor was contrived by MSS, then it would be accepted honorably as an unavoidable sacrifice he had to make with the aim of protecting China. Perhaps some monitoring should be done to see if somewhere along the line in the near future, there is some sudden mention of Dong awarded some high honor for his “service” from the Communist Party of China. Perhaps he would receive the award from Xi, himself. That may very well signal, and could help support the idea, that the defection story was indeed part of some nefarious MSS scheme.

Quis custodiet ipsos custodes. (Who watches the watchmen.) Dong has unlikely gotten lost in any hurt. Yet, one might speculate that perhaps somewhere, someone believes Dong pretends to have an inner strength, nerve, that he actually lacks. Though the true source remains publicly unknown, so far to greatcharlie’s knowledge, no one has been denounced at least publicly in China for having responsibility for igniting the rumor against Dong. One could hypothesize that if the source of the rumor was actually in China, it may have been the case that Dong recognized attempting to establish blame among any rivals for the episode would only be corrosive, and trying to reconcile with some sense his own guilt for leaving himself open to the of such a rumor would be self-defeating. In such a hypothetical case, an expression of such acrimony within days of the celebrations of the Centennial of the Communist Party of China taking place in Beijing on July 1, 2021, would unlikely be of any benefit to Dong politically, professionally, or personally. To that extent, in the eyes of Communist Party of China leaders, he likely would do himself much honor by deciding to hold his tongue at this time, if he even needed or desired to speak out at all.

Arthur Conan Doyle in “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in The Adventures of Sherlock Holmes published in the Strand Magazine (1891) had his main character, the damnably good detective Holmes, state the following which is apposite here: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

Xi Jinping’s Counterintelligence Concerns

Xi has placed considerable focus on police, judges, prosecutors, public security, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. Xi has ordered China’s security forces to be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. In his address at the ceremony, Xi lauded the major contributions made by the Chinese police to safeguarding national security, social stability and people’s interests, He called them a mighty force that can be fully trusted by the Party and the people, and spoke highly of the major contributions made by the Chinese security forces to safeguarding national security, social stability and people’s interests. Xi also called upon the security forces to uphold the Party’s absolute leadership.

People’s Republic of China President Xi Jinping (above) has placed considerable focus on police, judges, prosecutors, public security, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. Xi has ordered China’s security forces to be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. Clearly, Dong has been mindful of Xi’s concept and intent and obedient to the new counter-espionage regulation that came into effect in April 2021.

Would Beijing Call It a US Counterintelligence Plot?

As discussed already here by greatcharlie and in previous posts, little progress has been made in halting it or even making a discernible dent in Chinese intelligence operations. Many minds in the US national security bureaucracies are certainly working fiercely on this matter of utmost importance, but it seems too few facts have been collected for them to run on to break new ground or produce anything worthwhile. Trails of espionage may lead to the MSS and PLA, directly in many instances, but those who commit the devilry of spying on Beijing’s behalf, in the US and from China, are seldom caught. With estimates as high as 25,000 Chinese intelligence officers, operatives, and informants on the loose in the US, it is difficult even the most partisan US observers such as greatcharlie to deny China has secured a massive advantage for itself. Publicly, there appears to be not much of anything comparable achieved to knock back Chinese espionage.

Dong’s team and counterintelligence executives and managers of the other Chinese intelligence services surely study the tactics, techniques, procedures, and methods of US foreign intelligence and counterintelligence services. They would seek to better understand and prepare for expectant future attempts to covertly insinuate operatives into the Chinese foreign and national security apparatus, including particularly both the clandestine posts and covert networks of civilian and military Chinese intelligence services and Communist Party of China organs operating overseas.

Dong and his counterintelligence managers at MSS doubtlessly understand the situation the US Intelligence Community has faced, scoring few victories and suffering many defeats in the intelligence struggle with China, and they very likely recognize that US foreign intelligence and services are anxious to turn the situation around and get some things going. They have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. 

To that extent, one might imagine it could plausibly be claimed within MSS headquarters that whole episode was a US counterintelligence artifice, designed to twinkle out Chinese intelligence service officers and operatives based on the their reactions by some the following: movements–attempt to leave US; communications–sending communiques by codes and encryption to provincial departments and municipal bureaus to confirm rumors and see instructions on next actions; contacts–reaching out to network managers in distress or panic; and, email, text, call, and meet other intelligence officers to parse out situation as reported. Alternatively, also with a counterintelligence purpose, the US could be said to have attempted to smoke out prospective defectors among those officers and operatives, attempting to convince them that some “tower moment” for Chinese intelligence service operations in US had occurred and the moment had arrived to choose to remain part of Communist Chinese system or seek refuge in the US. 

Dong and his manager further parsing out the matter might have speculated that beginning in February 2021, he may have been out of pocket for an extended period or on medical leave for some illness. Such speculation could go further to suggest the US Intelligence Community became aware of the situation, which would have been a chilling prospect in itself for MSS counterintelligence, and sought to capitalize on it 

What might cause Dong and his managers some discomfort even though the whole defection story was revealed as a hoax, and if it was the actual source of the hoax, is that for a while at least there appeared to be good news about success against China. Even if proven false, it would be good to have such positive news reach the ears of the US public, and Beijing would not want that. Further, even though the truth is out, the belief may exist among many in the US public that the “super secret” US Intelligence Community may have truly scored the specified success, and now, for reasons unknown, want to conceal it. Among conspiracy theorists in the US, the imagination may have also been given fuel to run wild and the whole matter of the defection will linger for a while. Chinese intelligence services would likely hope that some sense of discouragement might reach into the psyche of the US public over how Chinese espionage in their country appears unstoppable, even though it may be an issue somewhat outside of the average citizen’s day-to-day concerns.

As for the Communist Party of China, propaganda elements might eventually seek to use the whole circumstance to an advantage against the US. The goal would be to embarrass the US by making it appear as if the US Intelligence Community conjured up a story of defection because that has had no real successes at all against China. What would then perhaps be called “the big US lie” or something to that effect would doubtlessly be denigrated by Beijing through declaring it as being too contrived, unsubtle, poorly executed, and further evidence of how little the US Intelligence Community knows about the Chinese intelligence services. Then again, there may just be silence from Beijing.

A Novel MSS Counterintelligence Tactic to Smoke Out “Disloyalty in the Ranks?”

It would appear Dong may have actually been expecting to face something out of the ordinary from US and other foreign counterintelligence services much as discussed here, and it factored into MSS calculations on operations against the US. According to a story in the June 18, 2021 edition of the South China Morning Post, a report on a seminar on a counter-espionage regulation that came into effect in April 2021 was posted on Changanjian, the social media account operated by China’s top law enforcement agency, the Central Political and Legal Affairs Commission of the Communist Party of China. At the seminar, Dong urged the country’s intelligence officers to step up their efforts to hunt down foreign agents and insiders who collude with “anti-China” forces. A read-out from the seminar quoted Dong as explaining: “The promulgation of such regulations provides us, the principal agents responsible for counter-espionage work, with the legal means to prevent, stop and combat criminal activities that would jeopardize our national security.” Dong went on to state: “This will reinforce our responsibility in counter-espionage work, and enable us to do a better job in organising and mobilising all social forces in waging ‘people’s warfare’ against espionage activities.”

In addition to Dong’s expressions on catching foreign spies, the actual report as posted stated that the intelligence officers must also go after “insiders” and “people who bankroll their activities behind the scene.” On that point, the report additionally noted: “At present, infiltration and spying activities by foreign intelligence agencies and hostile forces have increased significantly.” It went on to say, “In particular, there are individuals who have willingly become ‘insiders’ colluding with foreign intelligence agencies and hostile forces and engaging in anti-China activities.” The South China Morning Post story lastly noted the insistence in the report that “All state security agencies must stand firm … deepen and carry out our various counter-espionage work to safeguard our national security.”

Given what was stated by Dong at the June 18th seminar on the counter-espionage regulation that came into effect in April and the report on the event, it may be grotesquely improbable, yet all the same conceivable, that the defection hoax was actually an MSS loyalty test on a grand scale to as was suggested, to step up their efforts to hunt down foreign agents and insiders who collude with “anti-China” forces.

Attempting to look at thinking in MSS from the outside, trying to put moments and trifles from recent events in order and give them a deeper meaning, greatcharlie hypothesizes that Dong and his counterintelligence managers at MSS could not be certain of how the US Intelligence Community, and other foreign intelligence services for that matter, might apply pressure to its officers and operatives. For them, that is always the pinch. To do something more than just study the matter, they may have created a scenario that would likely shock MSS personnel in the field: the defection of the MSS Vice Minister, for counterintelligence nonetheless. That might explain why Dong’s good name was thrown into the mix of something so repugnant. Dong and his managers could test what may have been a working theory on the likely causality of some occurrence, in this case it would have been collusion with anti-China forces, and see if it could be confirmed by facts through investigation. Indeed, Dong and his managers would have wanted to see for themselves how officers and operatives in the field would respond to a very deceptive approach that perchance in their minds could have plausibly been attempted by US counterintelligence.

Many of the MSS foreign intelligence networks and operations in the US, and elsewhere overseas, are run by MSS Provincial departments and municipal bureaus. It would most likely be the case that foreign intelligence and counterintelligence managers of those departments and bureaus would have understood that there would be no reason to leave their locations or try to leave the US in the case of such a defection. It would stand to reason that their identities as spies would likely remain unknown for the time being and everything would be handled by Beijing to prevent their capture and keep them safe. That would likely be instilled in training and before deployments. Expectedly, as a result of training, loyalty and dedication, equanimity and sangfroid would be displayed by officers and operatives. However, through experience one might postulate Dong could have felt that there are patterns one can discern that establish order in the human mind. An unexpected blow to the MSS leadership as a defection of its chief of counterintelligence, which they depended upon for their very lives, might surprisingly elicit inordinate behavior among trained officers and operatives.

Dong might have conceptualized further that if one of his officers or operatives had even considered going over “to the other side” or perhaps might have already been in “friendly contact” with so-called “anti-China” force, the former might fear of being uncovered by an alleged defecting chief of MSS counterintelligence might impel them to act, the latter might want to use the situation to capitalize on the connection already made and go to the other side. (After reading what is presented here, perhaps some may accuse greatcharlie of having too much imagination, others may say, too little.)

A Thought about Future Defections by Foreign Intelligence to the US

As expressed in previous posts by greatcharlie, how the US handles every defection will surely shape decisions by officials to defect in the future.What US counterintelligence services do with defector would certainly have value for MSS to the extent that it could be used to discourage, plant in minds of officers and operatives that turning to the US would not be a wise choice. What prospective defectors might gather from the whole Dong business is that his or her defection could easily become a very public matter, very quickly in the US and eventually worldwide. It could be imagined by them that facts concerning who or what, when, where, how, and why would somehow be leaked to the news media. Rather than a serious concern, their defection might be presented and looked upon at least among some in the US as a banal amusement. Bookmakers in Las Vegas may very well have been taking bets on the outcome of it all: “Did he or did he not defect?, and “Will he stay in the US or be returned to China for one of our spies?” Regardless of the rank or position a prospective defector might be, he or she would hardly get the impression that the way Dong’s name was tossed about was nothing to signify, but rather unseemly. They would perhaps recognize that they would have little cause to expect any better treatment for themselves. None of this should be looked upon as exaggeration or fanciful if the Dong episode might be considered at all instructive. Using the backdrop of this episode as a gauge, one can only imagine what would go through the mind of an intelligence officer of adversarial country, wanting to defect when thinking about the treatment and well-being of his or her family members and himself or herself, how seriously their situation would be taken by the US, and what would be their final disposition. That may not portend well for the US Intelligence Community or prospective defectors. Hopefully, that will not be the case.

The Way Forward

Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.) Despite pronouncements of Communist precepts that are designed to allow the society to evolve socially, economically, and politically, declarations to maintain an orderly society though a system of justice demanding obedience and assurances from the Communist Party of China on the smooth running of the state and conduct of government affairs aimed at supporting a high quality of life for the people, visible and publicly released reports of scientific achievements in the medical field to high-tech, greater endeavor in the vast ocean and into space, and the notices of accomplishments externally on foreign affairs and guaranteed that the country cannot be threatened, bullied, or taken advantage of ever again, China is nonetheless a nontransparent society. What one knows about China is what Beijing says is true. Independent observations that defy its realities are anathema in Beijing, and can be responded to harshly. There is plenty of secrecy. The frugal release of information on the Wuhan virus is the latest best example of that. Beijing, without fail, will double down further in secrecy when it comes to national security. Yet, to discerning eyes, what the world observes China doing also speaks volumes about what is highly likely being decided behind the scene. That was especially true in this case when ostensibly a man viewed widely in the Communist Party of China as one of the country’s most loyal and dedicated servants, was accused of what could be called the unthinkable. 

While Dong’s name has never been bandied about in the US newsmedia or worldwide in any way close to the manner it has been in just days before thus writing. For those somewhat familiar with such matters, greatcharlie’s editor, himself, being simply an enthusiast and nonpracticioner, well-separate from the intelligence world, the notion that that he of all people in Chinese intelligence would defect would be a bombshell neatly as big if Alexander Bortnikov of the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB, was said to have defected instead. That is simply unimaginable. 

Revenons à nos moutons. The hope of US counterintelligence should be “simply” to come into positive contact with an officer, operative, or informant with an albeit some leaning toward an idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. 

Given the peculiarities of the world of intelligence, this analysis should not be considered too extravagant. The desire of greatcharlie is that nothing in this post would be deemed too fanciful by readers and a bit of their curiosity on the topic at hand would be satisfied. Admittedly, it would be doubly satisfying to know what is presented here might  resonate with a few in US counterintelligence services grappling with the Chinese espionage conundrum. However, if greatcharlie has not achieved the latter, the 18th century French Enlightenment writer, historian, and philosopher, François-Marie Arouet, known by his nom de plume Voltaire, sums up its sentiment in Poème sur la Loi naturelle (1756), Quatrième partie: Je n’en dirai pas plus sur ces points délicats. / Le ciel ne m’a point fait pour régir les États, / Pour conseiller les rois, pour enseigner les sages.” (I will not say more on these delicate points./ heaven made me not to govern states, / To counsel kings, to teach wise men. Spero melior. (I hope for better things.)

Book Review: Bill Gertz, Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (Encounter Books, 2019)

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping in People’s Liberation Army uniform (above). Successive US administrations, both Democrat and Republican, stuck to a belief that by maintaining good relations with China and conducting trade and other business with it, the Communist regime in Beijing would eventually evolve into a free market, democratic system. However, it is clear now that China has reverted to its Maoist Communist roots. Instead of becoming more moderate and more democratic, China has become a more repressive dictatorship domestically. Internationally, instead of becoming more integrated, China has emerged as a dangerous threat to peace and security as it seeks to become the world’s dominant power. How this all came about and what the US can expect from all of this is elaborated upon in Deceiving the Sky: Inside China’s Drive for Global Supremacy.

In Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (Encounter Books, 2019), Bill Gertz, the author, directs a flood light on China’s practices that are designed to undermine the US economy, weaken and ultimately defeat the US military, and diminish the global influence of the US. An emphasis of Gertz’s discussion is how US leaders have repeatedly failed to understand the preparations in which Beijing is engaged to ready China for a confrontation with the US in the near future. Gertz also asserts the US leaders have also habitually failed to take appropriate steps to deter and act appropriately in response to Beijing’s threatening moves. An example of how destructive and impactful such delinquencies have been is the US response following Beijing’s use of the People’s Liberation Army (PLA) to crush the democratic aspirations of thousands of Chinese in Tiananmen Square in June 1989. China was sanctioned. However, Gertz says that far more consideration should have been given to how China would and actually did react to sanctions. Gertz says what China actually did was launch an unbridled campaign over the next three decades to steal and otherwise acquire some of the most valuable technology from the US. The theft has been staggering, estimated to be as much as $600 billion annually in stolen technology and intellectual property. However, in successive US administrations, both Democrat and Republican, there was a wilful blindness toward what was occurring. They stuck to a belief that by maintaining good relations with China and conducting trade and other business with it, the Communist regime in Beijing would eventually evolve into a free market, democratic system. 

Gertz says the outcome of this decades long policy failure by the US has been the emergence of an expansionist, hard line Communist regime headed by a supreme leader, who took power in 2012, with unchecked powers matched only by Mao: People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping. Gertz asserts that Xi has ruled with an iron fist. China has reverted to its Maoist Communist roots. Instead of becoming more moderate and more democratic, China has become a more repressive dictatorship domestically. Fundamental freedoms rights and prosperity for the Chinese people have essentially been eliminated.Internationally, instead of becoming more integrated, China has emerged as an ever more dangerous threat to peace in security as it seeks to become the world’s dominant power. Communist ideology is the centerpiece for that Chinese drive for dominance. How this all came about and what the US can expect from it all is elaborated upon in Deceiving the Sky: Inside China’s Drive for Global Supremacy.

The attention of greatcharlie was drawn to Deceiving the Sky at first upon recognizing the title’s reference to “The Thirty-Six Chinese Strategies.” The Thirty-Six Chinese Strategies or Stratagems are a collection of tactics that can be applied to very different situations. The strategies are derived from military tactics applied during the Warring States Period (403-221 B.C.) or during the Three Kingdom Period (220-265 B.C.). Comparisons are naturally made to other Chinese military texts such as Sun Zu’s Art of War focus on military organization, leadership, and battlefield tactics, the Thirty-Six Strategies, is a unique collection of ancient Chinese proverbs, more apt for the fields of politics, diplomacy, and espionage. The origins of this book are unknown. No author or compiler has ever been mentioned, and no date as to when it may have been written has been ascertained. Deceiving the Sky is the first stratagem of the thirty-six.

Gertz explains in the text that the title Deceiving the Sky comes from an ancient Chinese strategy used by generals to win battles called deceive the Sky to cross the ocean. As the story goes, an Emperor was hesitant to launch a military campaign against neighboring Koguryo, now Korea. In reaction, one of his generals convinced the Emperor to go to dinner at the home of a wealthy peasant. As the Emperor entered the house for a meal, the residence moved. The emperor had been tricked onto a boat ended for battle across the sea. Rather than disembark, he ordered the military campaign to advance, and the battle was won. What is derived from this story is that a leader’s determination to win a war should be so unrelenting that even an Emperor, viewed in Chinese culture as the son of heaven or the Sky, can be deceived. Translated into military precepts, deceiving the sky suggests that a commander: 1) Openly act as if intending to do one thing then do something else; 2) Create false alarms until the opponent no longer takes notice of alarms; 3) Lull the opponent into a sense of false security by appearing innocuous. Then when the opponent ignores you, one can attack at will; and, 4) One can also do the reverse, acting mysteriously and pretending to know things onees do not. Try different things and watch the opponent’s responses. The opponent will react most strongly to that which creates most concern. (See Stefan Verstappen, The Thirty-Six Strategies of Ancient China (China Books and Periodicals, 1999))

As Gertz discusses how China has acted against the US in recent decades, no doubt is left about how pertinent this ancient yet timeless stratagem is to its approach. According to Gertz, the strategy well-reflects the Marxist maxim that the ends justify the means. Beijing practices strategic deception known in the ancient formula as using false objectives to facilitate true objectives. It is another way of describing the Communist strategy of using all means warfare against the US which is the sole obstacle to China crossing the ocean and achieving the rightful place as the most powerful state in the world. Nemo repeite fuit turpissimus. (No suddenly becomes bad.)

So impressed was greatcharlie with Deceiving the Sky, it has sought to allow its readers to gleen enough about the book in a review that they would choose to well-thumb its pages themselves. What greatcharlie can state in all conscience that if one really does not have much time to dig deep into the crisis of Chinese actions and intentions, Gertz’s breakdown of the whole matter is about as accurate and concise a report on the matter as one is going to get. What is most impressive to greatcharlie about the book is the manner in which it stimulates thought on the grave issues concerning China. As greatcharlie has stated in previous reviews, books that can stir a fire inside the reader, and a passion for a subject, are the most memorable and most enjoyable to sit with. The role of reviewer, an unsolicited intermediary between a book’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a book then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil on a manuscript. It is greatcharlie’s preference to provide reviews of books that readers of blog can enjoy and from which they may edify themselves. Never is harm intended.

Gertz is an award-winning national security journalist and author of eight books, four of which were national bestsellers. He is currently national security correspondent for The Washington Times. On China, he is accepted in both journalistic and foreign and national security policy circles as being an authority. Even more, he is something of a treasury of knowledge on its pursuits versus the US. Confidential sources for years within the US national security bureaucracies have shared what they have reasoned was permissible with Gertz that clarified much about personalities, events, and situations concerning China with all possible precautions concerning national security firmly in mind. Gertz’s considerable standing among federal employees in rather sensitive positions is a reality that the most senior executives in the US government have recognized and have begrudgingly accepted. Gertz has been a guest lecturer at the FBI National Academy in Quantico, Virginia; the Central Intelligence Agency; the National Defense University at Fort McNair, and, the Brookings Institution.

The Author

Gertz is an award-winning national security journalist and author of eight books, four of which were national bestsellers. He is currently national security correspondent for The Washington Times. As a journalist, he recognizes his responsibility to speak truth to power. On the issue of China, he is accepted in both journalistic and foreign and national security policy circles as being an authority. Even more, he is something of a treasury of knowledge on its pursuits versus the US. 

Confidential sources for years within the US national security bureaucracies have shared what they have reasoned was permissible with Gertz that clarified much about personalities, events, and situations concerning China with all possible precautions concerning national security firmly in mind. Gertz’s considerable standing among federal employees in rather sensitive positions is a reality that the most senior executives in the US government have recognized and have begrudgingly accepted. In his biography posted by the Harry Walker Agency, a speaker’s bureau, it is noted that former Central Intelligence Agency (CIA) Director R. James Woolsey stated: “When I was DCI [Director of Central Intelligence] Bill used to drive me crazy because I couldn’t figure out where the leaks were coming from. Now that I’ve been outside for two years, I read him religiously to find out what’s going on.” During the 1990s, Secretary of Energy Bill Richardson told the author: “We talk about your stories at Cabinet meetings.” Defense Secretary William S. Cohen once remarked to China’s military intelligence chief that Bill “has access to more intelligence information than anyone I know.” Former Defense Secretary Donald H. Rumsfeld once told him: “You are drilling holes in the Pentagon and sucking out information.”

Gertz has also been a guest lecturer at the FBI National Academy, the CIA, the National Defense University at Fort McNair, the Brookings Institution, and Hillsdale College. He has participated in the National Security Studies Program at the Johns Hopkins University School of Advanced International Studies and the Syracuse University Maxwell School of Citizenship and Public Affairs.

In Deceiving the Sky, Gertz has provided a most discouraging account of how the US has fared in a “struggle” to claim the perch of the dominant power in the world which China has promoted. At the same time, he answers in an admirable way the questions that US policy makers and decision-makers should be asking. To that extent, he has supplied the US foreign and national security policy bureaucracies with their deficiencies. An earlier work by Gertz, The China Threat: How the People’s Republic Targets America (Regnery, 2000), was prescient in assessing Communist China’s goals and intentions. Deceiving the Sky includes new details of the danger and proves his warning was correct. Gertz warns that if nothing significant and lasting is done, it will only get worse.

Gertz digs into the dark roots of Beijing’s plans. Readers will find that the information Gertz provides will prove to ring true on every issue. He demonstrates that there are clearly greater issues hanging from any issue with China than usually appear at first glance. Surely, presenting a full excavation of China’s actions and intentions was unlikely desired or practical given the larger audience Gertz sought to reach. Perchance if Gertz were to write enough works on the matter he will manage to at least touch upon all of its many aspects. Gertz is not a storyteller. His job is not to entertain, despite what his publishers might desire without the ultimate objective of every publisher which is to sell books. As a journalist, he delivers the news, lays out the facts as they are, and to the extent that he may provide analysis, he edifies and enlightens with his insights. Gertz has the power to intellectually stimulate with his words

The present situation between the US and China is recognized by many scholars, academics, policy analysts, and journalists as being unhealthy. Gertz’s reports on Chinese plans and actions have run concurrently to those of other journalists and scholars writing on the subject and the main features of their stories tally. Indeed, a lengthy list of authors have written fine books on the matter and offer similar perspectives. Concerning those other books, greatcharlie would not dare offer even a short-list of them for it would only open the door to judgments on the the selection of them and perhaps their numerical order. As this review is focused on Gertz’s work, all of that would be beside the matter.

It would be difficult to convince greatcharlie that Gertz wrote Deceiving the Sky with the objective of eclipsing the whole of its kind. What he has done is add an invaluable volume to the body of literature that accurately discusses “The China Threat.” He articulates the struggle in a manner that gives all matters that hang from it real meaning. Gertz only asks readers to follow closely what he has written and learn. Some seem disposed to remain content with that situation as long as it lasts. Though he lays it all out impressively before his readers, those not so warm to Gertz’s views will for themselves determine what if anything in the book is essential and what is not. Certainly, one must also accept that not everyone will be attuned to the scream of writers such as Gertz on the real and immediate threat China poses. 

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) To those who seek to find normality and safety in what China is doing in Asia and beyond and see it all as being modest enough, it is likely Deceiving the Sky put their noses are not out of joint. Whether they might be characterized as rejectionists or alarmist in accord with their responses to Gertz, nothing in Deceiving the Sky was apparently intended to harshly cut so deep into the foundations of thinking of proponents of an ascending China that they should find his facts and deductions threatening to their own analyses or interests. He is not on the attack. His goal is to illuminate. He encourages all readers to simply evaluate for themselves how things have actually been moving and where they are actually heading. Not just out of a sense of professional satisfaction but rather the urgency and importance of the matter, he would welcome and wish for an effort by them to test the virtues of what he presents.

Xi and senior decision makers on foreign policy within the Communist Party of China albeit are individuals of an exceptional nature judging from what they have displayed of themselves in challenging the US for the position as the world’s dominant power. That is a desire that they have in abundance. They have shown themselves to be a thoroughly bad lot. Gertz paints an even more sinister picture of Xi in a discussion of historical figures among his role models.

To accept that China would cause the release of COVID-19 through what might be called deliberate negligence would cause one to accept China was capable of any fantastic outrage. Doubtlessly, many already believed that. Gertz would perhaps be among their number. China was frugal with information about COVID-19 enough so that rather than being seen as heroes, they have set themselves up as the antagonist of every Western country, primarily the US, struggling to resolve the COVID-19 pandemic in this all-too real global tragedy. Many in the federal government foreign and national security policy bureaucracies and the US Congress with the responsibility to monitor what China is doing, have refrained from telling too much about its actions and intentions and the full extent of what its intelligence services are doing against the US to the public possibly for fear of figuratively frightening the horses. An unwavering conviction over China’s malign intentions appears to be a luxury that many especially in US foreign policymaking circles sense they cannot afford to have. They understand that one’s political fortune could possibly be balanced against it. That job has really been left to individuals as Gertz.

It appears important to note that in more than one spot in Deceiving the Sky, Gertz’s discussion on US policymaking on China is colored by his political perspective, recognizably conservative. As aforementioned, Gertz is a national security correspondent for the Washington Times, a daily newspaper with a conservative political alignment and was employed in that position at the time he wrote Deceiving the Sky. The book was published in 2019, and Gertz also expressed some satisfaction with the decision-making of the administration of US President Donald Trump under a strategy of competitive engagement. (Readers for whom this will pose some problems have been forewarned.) Not to make a labor of this matter, suffice it to say that such digressions in the text should not distract somber and astute readers from taking into consideration the healthy, accurate, and urgent message Gertz offers exposing the true intentions. That discussion, in greatcharlie’s assessment, is not partisan.

What greatcharlie Found Most Interesting

Deceiving the Sky is 256 pages, portioned in 13 chapters and a titillating conclusion. It presents what could perhaps be called a catalogue of sins by China. The range of Gertz’s coverage of China’s activities in Deceiving the Sky can be readily observed in his descriptive chapter titles. They include: Chapter 1: How Communists Lie: The 2007 ASAT Test; Chapter 2: The East Is Red: Communism with Chinese Characteristics; Chapter 3: China Wars: The Failure of Pro-China Appeasement; Chapter 4: The Coming Space War with China; Chapter 5: Assassin’s Mace in Space; Chapter 6: Seeking Digital Superiority: China’s Cyberattacks; Chapter 7: High-Tech Totalitarianism; Chapter 8: Chinese Intelligence Operations; Chapter 9: Influence Power: Beijing and the Art of Propaganda and Disinformation Warfare; Chapter 10: Financial and Economic Warfare with Chinese Characteristics; Chapter 11: Corporate Communism: Huawei and 5G; Chapter 12: Military Might: World Domination Through the Barrel of a Gun; and, Chapter 13: Flashpoints at Sea and China’s String of Pearls Expansion. He sums up the book with the thought-provoking segment: Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People. 

It would be impossible for greatcharlie not to receive the lessons and messages of books as Deceiving the Sky and feel compelled to ruminate upon them. Yet, in this review, greatcharlie’s focus is not turned dutifully and perhaps expectedly toward the fundamental and vital issues of concern such as China’s military growth, military strategy, investment in space platforms, ties to Russia, moves in the South China Sea, threat to Taiwan, and other issues of the utmost importance concerning its expansion and hegemony in its the Far East and ambitions beyond Asia. Regular readers of greatcharlie are aware that the blog’s editor has a keen interest in what author’s offer about what makes those of interest to them tick. For years, such independent analyses by reliable sources have often saved federal bureaucracies an infinity of extra trouble by offering insight on what may very well be on the minds of decision makers in foreign capitals. After examining a sufficient record of an individual’s attitudes and behavior in the aggregate sometimes, their motives may still remain inscrutable and those writing books on their policy making and decision making with little resource may turn to speculation. An additional interest of greatcharlie of late are the activities of Chinese intelligence services in the US.

Four chapters in which Gertz offers insights into the thinking of the leadership of the Communist Party of China at the present and into the future  and Chinese intelligence services that caught greatcharlie’s attention are: Chapter 2: The East Is Red: Communism with Chinese Characteristics; Chapter 3: China Wars: The Failure of Pro-China Appeasement; Chapter 8: Chinese Intelligence Operations. Insights Gertz offers in the book’s close, Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People, are also worthy of special note.

According to Gertz, no other Chinese leader since Mao has embraced the rigid orthodox Communist ideology more than Xi Jinping, who came into power in 2012. Soon after, Xi engaged in a ruthless, albeit less viable, ideological cultural revolution of his own, a political purge of thousands of officials, some were among the most powerful players in the system. By 2018, under Xi, the Party once again emerged with Mao-like devotion to the Socialist ideal of creating New Chinese Man. He lays out how Xi has assumed more power than any Chinese leader since Mao.

Chapter 2 The East Is Red

It is in Chapter 2, Gertz’s more fully explains, as mentioned earlier, that no other Chinese leader since Mao has embraced the rigid orthodox Communist ideology more than Xi Jinping, who came into power in 2012. Soon after, Xi engaged in a ruthless, albeit less viable, ideological cultural revolution of his own, a political purge of thousands of officials, some were among the most powerful players in the system, such as regional Communist Party boss Bo Xilai, police, intelligence and security czar, Zhou Yongkang, and former Vice Chairman of the Central Military Commission, General Guo Boxiong. 

Gertz reminds that beginning in the 1980s and over the decades that China noted the post-Mao policy dubbed “reform and opening up,” Gertz has readers cast their minds back to the years when Chinese Communist leaders went to great lengths to hide their ideology. He states that “ideological speeches were reserved for Party meetings and three-hour long recitations on the great works of the Party.” He continues further explaining that propaganda organs deliberately substituted the more-moderate sounding Socialism in place of Chinese Marxist-Leninsm in a strategy designed to win widespread support from non-Communist countries around the world.

Gertz then emphasizes how all of that changed with Xi. By 2018, the Party once again emerged with Mao-like devotion to the Socialist ideal of creating New Chinese Man. He lays out how Xi had assumed more power than any Chinese leaders since Mao. Gertz notes that following the death of Mao, the next leader of China, Chairman Deng Xiaoping, argued that Mao’s fanatic view of the World Communist Revolution needed to be changed. In its place, he adopted a new strategy called “Beyond Ideology and Social Systems” that sought to scale back Maoist ways but not give up Communism. Deng intentions were not benign. Gertz asserts that Deng believed world peace was at hand and that China should find a way to exploit it. To that extent, Gertz writes, Deng put forth China’s pragmatic strategy enabling massive trade and investment with the Capitalist world. As Gertz explains,”Bide our time, build our capabilities” was the Dengist ideology, and when the peace eventually collapsed, China would be ready both economically and militarily to dominate. Interestingly, despite appeasement of China by successive US administrations after Chinese tanks crushed the hopeful democracy movement in Tiananmen Square in June 1989, Gertz notes that Beijing continued to harbor the conspiracy theory of US plans to subvert and contain the People’s Republic.

As a very intriguing and instructive point, Gertz explains that “Chinese Communism mimics religion-it presents a version of history with a journey of deliverance played out in chapters written in a chosen language. It boasts its own priesthood–political commissary ubiquitous throughout–and an enforced infallibility of its leadership.” There are prophets and devils, along with a council of senior religious leaders who have the power to change or interpret the Communist historical narrative. Gertz goes on to state that Party loyalty equals morality; doubting history is blasphemy, heresy and treasonous. He then declares: “There is a chosen people, the Chinese, a promised land, China, temples, pilgrimages, faith in the face of contrary facts, deep intrusion into the personal life of each person, and the indoctrination of children into the tenets of Chinese Communism.”

Perhaps a very apparent expression of Chinese Communism as religion is through united front work. To better understand united front work, greatcharlie turns to the expert source for perspective, Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published a superb book, Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019). According to Mattis, the central element to understanding what the Chinese Communist Party is doing and why to shape the world outside the party is united front work. Mao described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a paper in the 1950s, the Central Intelligence Agency (CIA) defined united front work as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the party. To that extent, as Mattis explains, united front work entails shaping those outside the party, and not simply the Chinese people or world outside the People’s Republic of China. United front work must also be a tool of political struggle. It is not confined to activities that we would call propaganda or public diplomacy. It is not limited to covert action. In 1939, Mao wrote: “Our eighteen years of experience show that the united front and armed struggle are the two basic weapons for defeating the enemy. The united front is a united front for carrying on armed struggle. And the Party is the heroic warrior wielding the two weapons, the united front and the armed struggle, to storm and shatter the enemy’s positions. That is how the three are related to each other.” Mao’s outline of united front work within the party’s toolbox remains as the core understanding of it within the Communist Party of China today. United front activities have “aided” the Communist Party of China in resolving several dilemmas of the post-Mao era. That was most apparent following the Tiananmen Square and the death of Deng.

Evaluated on the basis of the united front policy system, the Communist Party of China’s management of political influence operations runs to the very top of the party, involving senior leaders directly. The policy system extends through the party’s hierarchy and spills over into China’s government ministries as well as other state-owned and state-administered organizations. The State Council ministries to include the Ministry of Foreign Affairs and many other organizations with a party committee offer unique platforms and capabilities that the united front policy system can draw upon for operational purposes. United front work is conducted wherever the party is present. To that extent, as Mattis explains, united front work is not an “influence operation” or a campaign. It is the day-to-day work of the party. The importance of united front work to the Chinese Communist enterprise is the reason why Xi has repeatedly emphasized the importance of a working organ of the Communist Party of China’s Central Committee, the United Front Work Department (UFWD ), to China’s rejuvenation. Among experts on China, UFWD is generally understood to be a Party intelligence organ,

One could only have imagined that foreign policy decision makers at the top of the Communist Party of China were aware that if the COVID-19 disaster was not put right with urgency, it would have had an unfortunate effect on US-China relations. Relative to the enormity of the crisis created, Beijing’s response could not reasonably have been considered apologetic or a recognition of their misstep at all. Overall, the design of the response appeared to be to protect the image and reputation of the Communust Party of China, and leave the impression that it was infallible in its response.

United front work in diplomacy can often be a dominant feature. Diplomacy with leading industrialized Western countries and prominent industrialized countries in their own region is used as a platform to promote the message of the Communist Party of China and bolster its standing. To discern such efforts, one might watch for matters stated publicly that might have little purpose in a more private setting and in fact might be best conveyed on the sideline meeting or during a break in bilateral or multilateral talks.

The reason for this is that the target audience of those comments will not be the party to the negotiation. The target is the people of China and people of underdeveloped and burgeoning industrialized countries who erroneously might see China as having eclipsed the power of leading industrialized countries and directly confronting them. China’s effort to pull countries of the Third World in Asia and Africa and even countries in Eastern Europe, with a particular focus on the Balkans, within its sphere of influence to turn a phrase has the characteristics of a near collection mania. However, the behavior of the Communist Party of China perhaps has had its best results among countries led by tyrants and other potentates who themselves have engaged in the ions old quest for dominance in their region or in the world. Aliquis latet error. (Some trickery lies hidden.)

A tangible demonstration of how China is leading the march to a “better” future for the world, by taking on US power publicly. This was recently done during a two-day bilateral meeting from March 18, 2021 to March 19, 2021 at the Captain Cook Hotel in Anchorage, Alaska. A  US delegation led by US Secretary of State Antony Blinken and US National Security Adviser, Jake Sullivan met with a People’s Republic of China delegation led by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi. The two-day meeting got off to a tense start, with a public display of the strained nature relations between the US and China. 

Blinken laid out many of the areas of concern, from economic and military coercion to assaults on basic values. Sullivan made clear that the overriding priority of the US was  to ensure that its approach in the world and approach to China benefits the US public and protects the interests of US allies and partners. Further, he explained further that the US did not seek conflict, but welcomed stiff competition and will always stand up for its principles, for its people and its friends.

Yang responded boldly, taking a bit of time to express sharp criticism of the US. He spoke with great authority. There was an air of ceremony in his reproach. Yet, through his words were evinced the restricted, mental prison of Communism. His statement must be examined in some detail to allow readers to sense the style, tone, rhythm, mood, the expression of indignation, and the recognition that a new world order is on the horizon that will have Chinese characteristics. One can discern a certain flavor in expressions of united front work in diplomacy.

Yang explained: “We believe that it is important for the United States to change its own image and to stop advancing its own democracy in the rest of the world. Many people within the United States actually have little confidence in the democracy of the United States, and they have various views regarding the government of the United States. In China, according to opinion polls, the leaders of China have the wide support of the Chinese people. So no attempt to–the opinion polls conducted in the United States show that the leaders of China have the support of the Chinese people. No attempt to smear China’s social system would get anywhere. Facts have shown that such practices would only lead the Chinese people to rally more closely around the Communist Party of China and work steadily towards the goals that we have set for ourselves.”

In an effort to turn a disadvantage into advantage with mere words, Yang went on to say: “On human rights, we hope that the United States will do better on human rights. China has made steady progress in human rights, and the fact is that there are many problems within the United States regarding human rights, which is admitted by the US itself as well. The United States has also said that countries can’t rely on force in today’s world to resolve the challenges we face. And it is a failure to use various means to topple the so-called authoritarian states. And the challenges facing the United States in human rights are deep-seated. They did not just emerge over the past four years, such as Black Lives Matter. It did not come up only recently. So we do hope that for our two countries, it’s important that we manage our respective affairs well instead of deflecting the blame on somebody else in this world.

Ostensibly speaking on behalf of peoples “oppressed” and formerly oppressed by Western powers as China, itself, once was. Yang was particularly biting, stating: “The United States itself does not represent international public opinion, and neither does the Western world. Whether judged by population scale or the trend of the world, the Western world does not represent the global public opinion. So we hope that when talking about universal values or international public opinion on the part of the United States, we hope the US side will think about whether it feels reassured in saying those things, because the US does not represent the world. It only represents the government of the United States. I don’t think the overwhelming majority of countries in the world would recognize that the universal values advocated by the United States or that the opinion of the United States could represent international public opinion, and those countries would not recognize that the rules made by a small number of people would serve as the basis for the international order.”

No doubt was left as to his loyalty and dutiful nature toward the Communist Party of China as Foreign Minister Wang performed his united front responsibilities expressing the following position: “China certainly in the past has not and in the future will not accept the unwarranted accusations from the US side. In the past several years, China’s legitimate rights and interests have come under outright suppression, plunging the China-US relationship into a period of unprecedented difficulty. This has damaged the interests of our two peoples and taken its toll on world stability and development, and this situation must no longer continue. China urges the US side to fully abandon the hegemonic practice of willfully interfering in China’s internal affairs. This has been a longstanding issue, and it should be changed. It is time for it to change. And in particular, on the 17th of March, the United States escalated its so-called sanctions on China regarding Hong Kong, and the Chinese people are outraged by this gross interference in China’s internal affairs and the Chinese side is firmly opposed to it.”

Latrant et scitis estatint praetesquitantes estis. They bark, so you know that you are in front of them.) One could reasonably presume any genuine negotiations planned by Chinese officials was secondary to what was stated at the outset of the meeting. Nothing stated by them could have led one to believe they were negotiating, seeking to establish common ground and points of agreement on issues and ways to come together on the most nagging ones. The meeting in Anchorage, Alaska provided a grand stage. The target audience of the Chinese officials’ reproaches was not really Blinken and Sullivan who were present in the room, but rather the people of China stand people of underdeveloped and burgeoning industrialized countries who would likely see China directly confront the US through their words. The Chinese officials sought to establish separate warring identities between the US and China. They sought to create the impression that some equipoise of power had already been by China versus the US.

Further, the Chinese officials clearly wanted to establish an image for the world to see of how disassociated China’s worldview was that of the US. They also appeared to want to demonstrate that China’s old view was more closely related with underdeveloped and burgeoning industrialized countries. They wanted to create the impression that there were both positive and negative forces present at the meeting, setting China up as the positive force and the US as the latter. 

Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi in Anchorage, Alaska, March 2021 (center). Gertz explains that in the 21st century, “the US is facing the potential of a new world war by miscalculation involving China that has been quietly and systematically building up what it terms comprehensive national power–military, diplomatic, economic–for what the Chinese Communust leadership believes will be an inevitable showdown in creating a new anti-democratic socialist and communist world order without the US.” In his most acidulous commentary, Gertz declares that “the pro-Beijing hands in and out if government were complicit in these policy crimes that deliberately appeased China through a rigid, establishment view that ignored the reality of the People’s Republic and cast it as a normal nation and not as a nuclear armed Communist dictatorship.” Gertz says that it was not until 2015 that the pro-China view was recognized as being no longer sustainable.

Chapter 3: “China Wars: The Failure of Pro-China Appeasement”

In the four decades after the period of reform and opening up began in 1972, Gertz says that “the vast majority among a relatively small and close knit community of China experts who glowed into government policy positions, intelligence agencies, and the officer corps from universities and think tanks produced one of the most serious failures of foreign and security policy in US history.” Gertz explains again that “forty years of willful blindness about China led to the adoption of disastrous policies toward China that have produced a new era of danger many experts see as analogous to the 1930s,” a period when shortsighted diplomats and policymakers prevented the US military from preparing to meet the threat of the growing power of the Japanese Empire. As that story goes, tabletop war games against Japanese forces were forbidden. The ruling elite feared that “it would create a new Japanese threat where there was none.” Gertz says that similarly, pro-Beijing hands created another strawman argument for the appeasement of China. In the aggregate, the result according to Gertz has been “a devastating run of policies toward Beijing that avoided all reference to China’s illicit activities and behavior from the massacre of unarmed pro-democracy students in Beijing’s Tiananmen Square in 1989, to China’s role in stealing US secrets on every deployed nuclear weapon in the US arsenal and hastening their spread globally by supplying nuclear warhead design secrets to Pakistan.”

Cuiusvis hominis est errare, nullius nisi insipientis, in errore perseverare. (Any man can make a mistake, only a fool keeps making the same one.) Gertz explains that in the 21st century, “the US is facing the potential of a new world war by miscalculation involving China that has been quietly and systematically building up what it terms comprehensive national power–military, diplomatic, economic–for what the Chinese Communust leadership believes will be an inevitable showdown in creating a new anti-democratic sociakist and communist world order without the US.” In his most acidulous commentary, Gertz declares that “the pro-Beijing hands in and out if government were complicit in these policy crimes that deliberately appeased China through a rigid, establishment view that ignored the reality of the People’s Republic and cast it as a normal nation and not as a nuclear armed Communist dictatorship.” He goes on to state the dominant pro-China community of both officials and non-government experts “inflicted serious damage on US interests by consistently producing biased and misleading assessments on both China’s intentions and capabilities.” Gertz says that it was not until 2015 that the pro-China view was recognized as being no longer sustainable.

As greatcharlie discussed in its March 29, 2021 post entitled, “Listening to and Understanding the Positions of Others: A Requirement for Thoughtful and Fruitful Talks in All Cases,” diplomacy has been defined as the established method of influencing the decisions and behavior of foreign governments and peoples through dialogue, negotiation, and other measures short of war or violence. In its practice, its key for negotiators to ensure the other side is listening and understanding what they are communicating. That necessitates managing negotiations without arousing hostility. Any awkward situations must be handled with tactfulness. 

Although only in office for a few months at the time of this writing, the administration of US President Joe Biden and Vice President Kamala Harris presumably has used US citizens, individuals with the very best reputations to contact Beijing through so-called back channels. Those individuals would be doyens, men or women of the world with a natural turn for diplomacy, and for discreetly presenting issues of concern and arranging delicate matters as a point of honor for Washington. China appears to commit itself to nothing where the US and Western countries are concerned, or where any other country is concerned for that matter. China’s government is founded on a movement that produced a revolution. It believes it provides a way of living based on Mao’s teachings that should be embraced for all humanity. It will never be satisfied until it puts the rest of the world’s government’s on a solid footing in that direction.

Whether diplomats, intelligence officers, Communist Party of China operatives, or businessmen, they spout the old propaganda line while overseas, “Communism is the wave of the future.” The Biden-Harris administration’s policy makers will have ample opportunity to test theories on how to get the best results from US bilateral relations and economic competition with China. Gertz does not use page space to present readers with exact details of how the US has bargained and negotiated with China, or the tone heard during opportunities in which they communicated bilaterally. The outcomes of such talks speak for themselves. It is one thing to establish a competitor firmly in one’s mind to help drive the effort “to up one’s game.” It is wholly another thing to seek something akin to world domination and to find a way up by stealing from, forcing out, and stepping upon, others. China is attempting to do all of the latter to the US. China will almost always be happy to meet with US officials to negotiate and sign any agreements both to humor themselves, satisfy those among US policy makers and decision makers naive enough to believe there would be any hope of hampering China’s march to dominance, and mollify others who may “fear” the change that Beijing assures is coming.

Qui cumque turpi fraude semel innotuit, eriemsi verum dicit amittit fides.  (Whoever has once become known for a shameful fraud, is not believed even if he speaks the truth.) One could go as far as to say it is delusional to persist in communicating entreaties of that kind to Beijing. This is especially true when it is clear how the troubling behavior in question is associated with China’s quest for dominance. There is no shortage of ambition. One cannot show a tender conscience to Beijing without soon facing a test of will or other undesired effect. The next generation may say preceding ones were dull indeed not to recognize and respond to China’s maneuvers. To go on in partnership with the Chinese, US administrations have forgiven, while not warranted, its worsening behavior. They have forgiven much. Diplomatic outcomes on contentious matters may often be part of larger arrangements, schemes of the Chinese. Indeed, Chinese negotiators will expect that parties to a negotiation will be willing to accept and start with the conditions they initially present. They will strenuously negotiate. If the Chinese can find no flexibility and no further room for satisfactory results from the negotiations they may alter their position more in line with the other party’s terms. The other party may be eager to accept China’s new amiable terms but they may be unaware that there could be a catch. A follow-on malign action, may weaken the benefit of any settlement on the same original matter. An opportunity for the Communist Party of China to test the the virtues of this approach presented itself with the Trump administration when it negotiated and signed a trade agreement in 2020. The Communist Party of China was already aware of the burgeoning COVID-19 crisis at home. It no longer appears Beijing is disposed to negotiating fairly, nobly, on anything. This may appear all the more the case as Beijing may feel it is moving closer and faster to its goal of overcoming the US as the world’s dominant power. After examining this, readers should recall the discussion earlier in this review of the “decieving the sky” strategy ascribed to China’s approach. It is very fitting. Quite so!

By the time the second action is realized by the second party, be it the US or otherwise, it is usually still too unfathomable to imagine that the more malign outcome was sought all along by China. By the time it may be accepted by the second party that every step taken by China was part of one larger scheme, the dye will have long since been cast. In its business of conquest, Beijing almost always does everything completely. China’s efforts in this manner do not seem to have an end.

US political leaders must be willing to do the hard yards to ensure its position is protected. This is not a situation that can be nuanced through talks at the negotiation table. China will not surrender any of its gains or leave what appears to be clear paths to its objective for anything the US might offer, except surrender or capitulation.

However, those US political leaders might also consider the words of Paine, 18th Century American political writer, theorist, and activist of the American Revolution asserted in The Crisis No. V (1778): “To argue with a man who has renounced the use and authority of reason, and whose philosophy consists in holding humanity in contempt, is like administering medicine to the dead, or endeavoring to convert an atheist by scripture.”

Workers in a high-tech facility in China (above). Gertz explains that an expert source in the US Intelligence Community revealed to him that Chinese intelligence operations only began receiving the attention they deserved in the late 2010s after China stopped using more cautious methods and adopted bolder approaches to stealing secrets and recruiting spies. Citing a retired source from the US Intelligence Community, Gertz notes that Chinese intelligence activities are akin to a storm. That Chinese intelligence storm is a secret assault on the US that is without parallel since that mounted by the Soviet Union in the 1930s and 1940s. Gertz explains that current Ministry of State Security recruitment efforts are focused on all US citizens with access to secrets China wants. Those secrets come in two main categories: counterintelligence information about Chinese working for US intelligence, and government secrets and even openly available information that will boost China’s military and civilian modernization and industrialization programs.

Chapter 8: Chinese Intelligence Operations

In Chapter 8 “Chinese Intelligence Operations”, Gertz takes the reader into the arcane world of espionage via the operations of Chinese intelligence services in the US. US counterintelligence services have tried to grapple with the matter of Chinese espionage, however the situation with the activities of Chinese intelligence services nevertheless has become an impossible one for them. The anecdotes that Gertz presents well depict the course of that intelligence struggle. He reconstructs the drama of each case. He does this so clearly, that one would believe that he was present in each case to watch events unfold.

At the core of the chapter’s discussion, Gertz explains that today, the Ministry of Public Security (MPS), Ministry of State Security (MSS), and People’s Liberation Army (PLA) intelligence agencies, along with the United Front Work Department, a Communist Party intelligence unit, are the leading forces of China’s intelligence power. Gertz supports the well-established view that the power of those services is focused solely on maintaining and expanding the power of the Communist Party of China in its drive for global domination. At the end of the chapter, Gertz briefly explains that there was ano important reorganization of the PLA intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) now resides with the new Strategic Support Force under the Central Military Commission. To provide a bit more detail on that transition, the Second Department of the People’s Liberation Army, responsible for human intelligence, the Third Department of the People’s Liberation Army, the rough equivalent of the National Security Agency, responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army, responsible for electronic warfare have been rolled into the new Strategic Support Force. The PLA’s human intelligence operations are managed by the Joint Staff Department, and comes under the Central Military Commission. Surely, Gertz is aware of all of this. However, as the main focus of Deceiving the Sky was shed light on the realities of China’s attitudes and behavior, actions and intent, with regard to the US, it was reasonable for him to preclose where he saw fit in his discussion of the Chinese intelligence services.) As for the United Front Work Department, as mentioned earlier in this review, it is one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three are the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.

Regarding MPS, Gertz says that it is the Chinese version of what has been called intelligence led policing that seeks to preempt crime. Yet, unlike the West, where laws limit the activities of police and security services, Gertz says Chinese security operations have few boundaries. One feature of the MPS is a system called “the Big System” that seeks to fuse masses of data from Chinese police and intelligence services into one program. Big intelligence is the intelligence version of the PLA’s drive for “informatization,” a term used for high technology analysis activities. 

Gertz informs that the massive police intelligence apparatus promises to make it more difficult for those seeking democratic political reforms in China to operate. As Gertz puts it, dissidents and enemies of the state as well as actual criminals will find it hard to plan and organize without leaving behind digital breadcrumbs that security services can collect and connect. He notes that theos MPS has also created the Golden Shield, a military style command structure designed to share intelligence throughout China. The systems have created pathways designed to breakthrough bureaucratic obstacles and link data. Golden Shield involves automatic analysis and cloud computing for analyzing masses of data including computerized facial, voice, and gait recognition. While MSS and PLA focus their spying operations on technology acquisition, MPS agents are engaged in spying on Chinese dissidents in the US.

Citing a former CIA director of counterintelligence, Gertz notes that Chinese intelligence activities, lay those of MSS and the PLA, are akin to a storm. That Chinese intelligence storm is a secret assault on the US that is without parallel since that mounted by the Soviet Union in the 1930s and 1940s. Gertz appears absolutely taken by the fact that penetration of US national laboratories has led to the loss of at least six nuclear weapons designs and the enhancement of Chinese offensive and defensive capabilities. Gertz explains that current MSS recruitment efforts are focused on all US citizens with access to secrets China wants. Those secrets come in two main categories: counterintelligence information about Chinese working for US intelligence, and government secrets and even openly available information that will boost China’s military and civilian modernization and industrialization programs. The modus operandi of MSS counterintelligence Includes the recruitment of foreign intelligence officers and their agents for work as double agents. Gertz tries to get to the center of the mystery of how MSS was able to completely destroy the CIA’s networks in China through combination information from an operative within the CIA and communications system breach. An estimated 30 agents were caught of which three were killed.

Beyond its own human intelligence activities, the PLA, particularly what Gertz, as mentioned, still refers to as the 3rd Department of the PLA, has engaged in a cyber campaign which has inflicted considerable damage to include the theft of sensitive government trade and industrial secrets.

Much Gertz explains here, greatcharlie has also observed in previous posts that little progress has been made in halting it or even making a discernible dent in Chinese intelligence operations. Many minds in the US national security bureaucracies are certainly working fiercely on this matter of utmost importance, but too few facts have been collected for them to run on to break new ground or produce anything worthwhile for that matter. Trails of espionage may lead to the MSS and PLA, directly in many instances, but those who commit the devilry of spying on Beijing’s behalf, in the US and from China, are seldom caught. With estimates as high as 25,000 Chinese intelligence officers, operatives, and informants on the loose in the US, it is difficult even the most partisan observers such as greatcharlie to deny China has secured a massive advantage for itself. Publicly, there appears to be not much of anything comparable achieved to knock back Chinese espionage. If US counterintelligence services had ever managed to achieve some significant breakthrough on the Chinese intelligence front, one would hear “singing in the valleys.” US intelligence services, much as those of other countries, abhor the prospect of public scrutiny, but it is too late now to be concerned by such anxiety.

The deluge of Chinese espionage has torn away so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among possible dissenters, an interest, not solely due to exigency, will grow on the idea. Chinese intelligence services have hampered the work of US businesses, research and development firms, high-tech firms, academia, and the federal government itself. They have created spy networks within institutions critical to US economic security and defense. They have attempted to inconvenience the US in its efforts to improve bilateral and multilateral relations in under developed, less industrialized countries and even long time friends of the in certain regions, and multilateral institutions that the US actually had a hand in creating.

In Aristophanes’ play, Birds (414 BC), the character Epops states: “The wise can often profit by the lessons of a foe, for caution is the mother of safety. It is just such a thing as one will not learn from a friend and which an enemy compels you to know. To begin with, it’s the foe and not the friend that taught cities to build high walls, to equip long vessels of war; and it’s this knowledge that protects our children, our slaves and our wealth.” Chinese intelligence services, perhaps at one time, expecting to face something out of the ordinary, that US counterintelligence services would have a few tricks up their sleeves, have not been challenged in any way that has halted or deterred their cyberintelligence or human intelligence activities. Chinese intelligence services have unfortunately managed to do their job successfully, collecting mountains of secret and information from the government bureaucracies and research and development sites, private businesses, high-tech firms particularly, academia, and think tanks. Surely there must be an atmosphere of optimism in the halls of the headquarters buildings of the Chinese intelligence services. The Communist Party of China most likely delights that without openly admitting to possessing such intelligence capabilities, at least through perception, it has that power over the US. 

One can imagine that on more than one occasion, resources, energy, and time were squandered following a false scent. (God help those who have been wrongfully suspected and falsely accused by mistaken or errant officers of any of the US counterintelligence service. It happens. No amount of reparation could ever fix the psychological and material damage very likely done to innocent targets and their loss of reputation and honor.)

Nam qui peccare se nescit, corrigi non vult. (If one doesn’t know his mistakes, he won’t want to correct them.) Perhaps US counterintelligence services are applying old ways of thinking to a new type of intelligence struggle that bears little resemblance to previous ones. The key to it all remains out there somewhere. Finding those who would be capable and disposed to sniff it out using traces available would seem to be the real task ahead. One might presume that US counterintelligence services would hardly imagine anyone from outside the bureaucracy would be capable of producing some shred through their amateur study of the matter. Indeed, some senior executives and managers of US counterintelligence services, determined to stand as solid pillars of standard thinking and behavior that will not be blown down by the winds of change, may brook the idea of bringing in outsiders to handle sensitive matters. They may be mistaken. 

The solution to this espionage riddle, at least based on public reports, appears no closer within their reach. If the matter has not indeed already been settled, it may seem to some that it is at least at the edge of the end. The chance for US counterintelligence services to exhale will not come for a while. Chinese intelligence services do intend to let it come at all. US counterintelligence services have not despaired of getting a handle on the situation. Uppermost in the minds of senior executives and managers in US counterintelligence services is whether anyone within the bureaucracy can produce the magic that will allow them the ability to gain and retain the initiative in a cause that appears to be lost. They must press ahead on the forward foot.

A US B-2 bomber and two US F-22 fighter jets fly in formation (above). The rocky nature of US relations with China is a matter of great urgency. Yet, Gertz is not planting seeds of war in a time of peace. Despite how he labels his conclusion, he does not propose war as a solution. He still holds hope that US officials will come across something along the way that might bring a solution to the crisis. Gertz explains that there is a growing bipartisan political consensus that new strategies and policies urgently are needed to deal with China. Ostensibly to assist in that effort, he presents a set of 14 recommendations for a policy of liberation for the Chinese people from the yoke of Marxist-Leninism with Chinese characteristics.

Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People

Readers might recall the words of the 16th century Italian diplomat and political theorist Niccolo Machiavelli in his famous instruction guide for new princes and royals by The Prince (1532): “There are two ways of contesting, the one by the law, the other by force; the first method is proper to men, the second to beasts.” The rocky nature of US relations with China is a matter of great urgency. Yet, Gertz is not planting seeds of war in a time of peace. Despite how he labels his conclusion, he does not propose war as a solution. Prosing out on that matter, he still holds hope that US officials will come across something along the way that might help them develop a solution to the crisis.

Gertz explains that there is a growing bipartisan political consensus that new strategies and policies urgently are needed to deal with China. He does not believe it will be impacted by what he calls the national predicament, a seeming loss of clarity amid increased political polarization. To assist in finding that solution, he presents a set of 14 recommendations for what he hopes will be a policy of liberation for the Chinese people from the yoke of Marxist-Leninism with Chinese characteristics. Gertz emanates a sense of assurance in his writing that the recommendations he offers in Deceiving the Sky would obtain good results.

Each of the 14 recommendations is sufficiently self-explanatory, some are accompanied here with a précis of his summary on it or greatcharlie’s own comments on it. Together, his recommendations have a cumulative effect. They include: 1) Information: Conduct aggressive competition in the realm of ideas. He proffers that the first step in creating a free and democratic China would be regime change, an effort to peacefully oust Communist Party of China; 2) Reciprocity: Restrict access by China to the US in ways equal to Chinese restrictions. A key measure would be to counter Chinese financial warfare with a US program of economic warfare; 3) Intelligence: Shift the focus and operating methods of American intelligence toward more robust and aggressive operations and more effective analysis. Rather than accept being pushed back on its heels, Gertz recommends that the US Intelligence Community should step up aggressive intelligence and counterintelligence operations against the Communist Party of China and the PLA; 4) Foreign Policy/Diplomacy: Restructure and Reform the diplomatic system. Such reforms would need to be implemented in a way that would allow the US to better confront and counter growing Chinese hegemony; 5) Alliances: Create a pro-freedom, pro-prosperity, and pro-rule of law network in Asia. What was already seen in the Trump administration and still being seen in the Biden-Harris administration is Gertz recommendation that the US develop “a global network of democratic alliances targeting China that will seek to pressure Beijing into abandoning its totalitarian communist system and global designs.”; 6) Cultural/Educational: Severely restrict activities by Chinese nationals in the US who are abusing the American system. Gertz suggests that such activities should be restricted in recognition of the subversion and technology theft threats many unfortunately pose; 7) Counterintelligence: Major strategic counterintelligence operations and analyses should be implemented that focus on aggressively targeting Chinese intelligence and security services; 8) Economic: The US should begin a gradual policy of disengagement from Communist China economically; 9) Financial: Plan and carry out covert financial warfare operations against China; 10) Military Exchanges: The Pentagon and US Military must adopt a new policy that recognizes the Communist Party of China and the People’s Liberation Army as the main enemy; 11) Military Missile Defense: Expand American Regional missile defenses. As part of a strategy of neutralizing China’s massive and growing force of ballistic, cruise and hypersonic missiles, Gertz says US missile defenses around the world should be expanded; 12) Military Gray-Zone Warfare: Develop asymmetric warfare capabilities designed to negate Chinese military, cyber, electronic, and psychological warfare capabilities; 13) Political: Create a Parliament in exile. The creation of a “democratic Chinese parliament in exile” that will develop new policies for a free China is an old chestnut.; and, 14) Russia: Play the Russia card. One might call Gertz the suggestion that the US should play the “Russia card” against China by seeking a free and democratic Russia aligned with the free world somewhat fanciful.

Most notable to greatcharlie in the context of this review is Gertz’s recommendation on “Foreign Policy/Diplomacy: Restructure and Reform the diplomatic system.” In his summary of that recommendation, Gertz suggests that US diplomats and foreign service personnel should be retrained in the use of new and innovative diplomatic methods and techniques for the information age that emphasize successfully implementing new strategic objectives toward China that reject the failed diplomacy of the past. The new diplomacy will be rooted in honest assessments and understandings of the true nature of Communist China. A new objective will be to report on and take steps to force an end to the systematic abuse of human rights in China as a high priority. The US should seek to create a new alliance of nations that will seek to isolate China and spur internal democratic political reforms and promotion of freedom and free market systems in the region. Strategic and economic dialogues such as those in the past that produced no results must be ended. New engagement should be limited to conducting bilateral and multilateral talks on concrete, achievable objectives such as verifiable arms limitation and enforceable trade agreements. It certainly would not be velvety going forward if such a course were followed, but perchance US values and interests would be well-served.

In Deceiving the Sky, Gertz’s research sheds an extraordinary side light on the undeniably aggressive thinking of Beijing. While US political leaders are still in a position to reexamine the facts, they should do so. Surely, if any of them were to take the time to look at Gertz’s book with an open mind, it would given them the necessary nudge to begin thinking in that direction. Deceiving the Sky could also lend support to deliberations among colleagues on the matter. 

There are likely quite a few citizens in the US who have heard about China’s aggressive activities. Surely, they would appreciate reading Deceiving the Sky as it would provide them a firm basis for understanding the many issues involved. As greatcharlie has already stated in this review, information from the text that is discussed here only represents a fraction of what the reader will find in Deceiving the Sky. For greatcharlie, the book was both edifying and a pleasure to read. Without hesitation, greatcharlie recommends Deceivibg the Sky to its readers.

By Mark Edmond Clark

Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts

The People’s Republic of China Consulate in San Francisco (above). The Consulate has been a bit troublesome. On occasion, it has been linked to suspected Chinese espionage efforts on the West Coast. However, Chinese intelligence operations in the region, which holds world-leading science and tech firms, have more often been tied to state-owned businesses, private firms, academic institutions, or research institutes than the Consulate. In a January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence. In Chapter Six, Olson lists 10 “benefits of a counterintelligence operation” and explains how to reap them. In this essay, greatcharlie presents some suggestions on how Olson’s precepts might be applied to help defeat Chinese espionage efforts throughout the US.

In its January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019. In Chapter Six “Double-Agent Operations,” Chapter Seven, “Managing Double-Agent Operations,” and Chapter Eight “Counterintelligence Case Studies,” in particular, Olson provides a generous amount of information on how counterintelligence operations have been conducted by US counterintelligence services. Readers are also favored with many of the logical principles that Olson would practice and expound during training during his service in the Central Intelligence Agency (CIA) counterintelligence. Included among what he presents is a list of benefits US counterintelligence seeks to gain from a double-agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Many of the tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination and creativity. One discovers how double-agents were dangled to garner interest from adversarial intelligence services, false information spiked with just enough truths, “chicken feed,” was transmitted, and nuanced communications between the double-agent and his handler were managed. In 12 case studies, Olson finally presents a classical series of demonstrations along with lessons learned. He tells it all in an apposite way. Virum mihi, Camena, insece versutum. (Tell me, O Muse,of the skillfully man.)

In fairness, Olson’s work should not be judged in terms of his reaction to the prevailing national security crisis at the time of this writing: Chinese intelligence penetration into the foundations of US power. A criminal strain is observed running through the thinking of the Communist Party of China as it dispatches Chinese foreign intelligence services to steal volumes, tons of information from the most secure locations in the US. Perhaps what the future may hold is made darker by the fact that among its central members, are individuals of immense intellect, making them a far more dangerous threat to US interests. In greatcharlie’s view, there is much that can be extracted from To Catch a Spy that might constructively provide some suggestions on how to address this crisis. With the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. That does not imply that a bias colors its discussion. No information is skewed or bent with preconceived ideas. What it does mean is that readers will likely discern facts are interpreted from that perspective.

In Chapter Six of To Catch a Spy, Olson lists the 10 “benefits of a counterintelligence operation” related in particular to double-agent operations and explains, in brief, how to reap them. In this essay, greatcharlie may albeit step out on shaky ground to present some discreet suggestions on how 9 of Olson’s 10 precepts might be applied in efforts to defeat Chinese espionage activities in the US. The suggestions are the result of some creative thinking on what if anything new might be said on the matter. In the essay’s discussion, greatcharlie hopes to avoid any appearance of instructing counterintelligence officers on what to do. Rather, the only desire is to offer all readers its suggestions, leaving it up to those in US counterintelligence to observe, reflect, and act as they may. It would be satisfying enough to know that some of what is presented here might  resonate with a few of them. It is presumed by greatcharlie that Olson’s precepts harmonize to a great degree with those that currently guide US counterintelligence officers in active service and thereby anything resulting from them would not be deemed too fanciful or even recherché. Applying Olson’s precepts to developments on the Chinese intelligence front in greatcharlie’s would have been beyond its scope of its preceding review of To Catch a Spy –although some readers noting the review’s length might sardonically query why there might be any concern over a few thousand words extra. In response to such concerns, greatcharlie has attempted to apply Olson’s teachings to the discussion here without making it an exercise in “large data processing.” It should also be noted that from the corpus of work on Chinese intelligence, a great influence upon greatcharlie are the writings of Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant.

Additionally, upon consideration of what it could offer to support the development of more effective approaches to defeat Chinese human intelligence and electronic intelligence collection activities against the US, greatcharlie bore in mind that it would need to be somewhat Delphic in its discussion. Therefore, what is offered are fragments of ideas with the aim of leaving a figurative trail of breadcrumbs that  a few officers in the US counterintelligence services might pick up. Hopefully, after testing their virtue, they will find something useful. Given this approach, greatcharlie apologies in advance to other readers who may find the discussion somewhat cryptic or a bit “undercooked” at places. De minimis grandis fit magnus acervus. (From the smallest grains comes a big heap.)

Chinese Foreign Intelligence Versus US Counterintelligence

Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know. At the top, senior executives and managers must account for the failing of their respective US counterintelligence services. Imaginably, they resent the deficiency. Surely, they are feeling terribly unsettled by regular reports of so much being blown, so much intellectual property and classified material being lost. They have certainly had a bellyful of the failure rate against the Chinese intelligence networks. There has been so much scandal–or at least what should be scandal–with US political leaders becoming entangled with Chinese intelligence operatives, from interns, drivers, fundraisers, to “camp followers.” Expectedly, senior executives and managers should be wondering whether the rank and file of US counterintelligence has gone on hiatus. To use contemporary sports vernacular in the US, US counterintelligence services “have not shown up” in the struggle with China. They may also be wondering, given the array of tools and considerable resources available to them, whether the rank and file, led by squad, shop, or unit supervisors and commanders, have told them the whole story. Perhaps harshly, they would question whether the rank and file were organizing valid plans or going off on profitless “school boy larks,” not remotely sufficient to defeat a most cunning opponent. Against the Chinese style intelligence operations, it may very well be the case that the ordinary principles of trade craft and security have gone to the wall. French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Directors and commanding officers of US counterintelligence services can only come to the US Congress for hearings on oversight and appropriations seeking sympathy not approval or report any real success.

Perchance little has really been provided in any official assessments of why US counterintelligence efforts have been so unsuccessful. Perhaps senior executives are not asking the right questions or any questions. When one is overmatched, one will usually lose. Some enhanced intelligibility in the discussion of what has been occurring would help to bring at least the US public around to a better understanding of what where things stand and the prospects for success. Without that, policy analysts and other observers are left to presume that the Chinese are that much better. Indeed, as of this writing, the suggestion that has frequently been voiced in certain quarters concerned with the crisis, and has even spilled out into the newsmedia, is that the professional, diligent officers of the US counterintelligence services–and sadly those qualities cannot be ascribed to the entire group–are simply unable to get a handle on the Chinese threat. That suggests there has been a complete eclipse of their faculties. However, that should not be taken as the gospel truth. Surely, the men and women of the US counterintelligence services, correctly focused, will be able to gain and retain the initiative and start pulling apart Chinese intelligence networks. The renowned US industrialist Henry Ford once remarked: “Failure is simply the opportunity to begin again, this time more intelligently.” The US counterintelligence services maintain their vigil.

Olson’s Precepts from To Catch a Spy

On “Spreading disinformation”

Olson begins his veritable “mini manual” by explaining double-agents can be used to provide the opposition service with false or misleading disinformation, but this a relatively infrequent objective. Deceiving the enemy in this manner requires tremendous planning and subtlety because adversarial foreign intelligence services are not easily deceived. Very often they possess the means to verify the provenance of the double-agent’s reporting. Moreover, if the double-agent reports that some action will take place in the future and it does not, the double-agent’s credibility is seriously undermined. According to Olson the use of disinformation in a double-agent operation would only make sense when the stakes are unusually high or the opposition has limited means of verification.

With reference to “Determining the other side’s modus operandi”

Olson explains that a double-agent is in a perfect position to report back on the opposition’s modus operandi. For any counterintelligence officer responsible for monitoring and thwarting hostile services operations, it is invaluable to know how the service conducts its business. Olson recalls that when he was tasked with developing counterintelligence programs at CIA field stations, the first thing he did was review all of the double-agent operations that any US government agency had run in that location. What he wanted to learn was how the target services operated. Among the questions that he would ask were the following: “Did they meet their agents in safe houses, cafes, parks, vehicles, or some other location? What time of day did they prefer for agent meetings? Were there sections of the city they overused? Did they incorporate initial contact points into their modus operandi, and if so, what kind? What kind of equipment and training did they provide for their agents? Did they use electronic communications of any kind? Where were their dead drops and what did their concealment devices look like? What type of signal device did they prefer?”

Olson remarks that It was especially helpful to have double-agent history in the same city that you are operating, but there was value in reviewing any foibles of double-agent operations run by the target service anywhere. As Olson explains, the case officers of the service have all had the same training and follow the same operational doctrine. They tend to fall into habits and use operational techniques that have worked for them elsewhere. The result can be predictability–a major vulnerability in spying that can and should be exploited by the opposition’s counterintelligence. 

Concerning “Identifying hostile intelligence officers”

Foreign intelligence services take great pains to hide their case officers under a variety of covers according to Olson. They can pose as diplomats, trade officials, journalists, students, businessmen or businesswomen, airline representatives, employees of international organizations, and practically any other profession that gives them an ostensible reason for being in the country. US counterintelligence is tasked with piercing those covers and identifying the spies. One of the best tools available for this task is the double-agent.

In some cases the handling officer is the recruiting officer. If the recruiting officer first met our double-agent dangle when he was providing the dotting and assessing venues in true name, then the double-agent can provide a positive identification from the beginning. As standard practice, however, the case officer will use an alias in meeting with the double-agent. The double-agent can still provide a detailed description of his or her handler and can often make an identification through a photo spread. Also, since counterintelligence service running the double-agent operation knows when and where the case officer will show up, for example to meet to meet the double agent, to service a dead drop, or to mark a signal, it has technical options to assist in identification. The case officer usually comes from a known pool of officials from the local embassy, consulate, the UN, a trade mission, or some other official installation. Olson claims that it never takes long “to make” who the handler is.

Double-agent operations that go on for an extended period, as many of them do, Olson explains that they will lead usually to additional identifications of hostile intelligence personnel. Case officers rotate regularly to other assignments, and their agents doubled or otherwise, are turned over to a new case officer for handling. Other case officers are sometimes introduced into the operation as a back-up or as a subject expert. The primary case officer may handle the day-to-day operational aspects of the operation but may not have the in-depth knowledge required to debrief the double-agent effectively on a highly technical subject. Olson says it is not uncommon in these cases for intelligence services to insert a more knowledgeable debriefer into an operation from time to time. He continues by explaining that If the primary case officer may not be able to get a surveillance break to pick up a dead drop, for example, or may not have cover to mark or read a given signal. In that event a colleague from the residency is called on to help out–and can be identified by employed cameras or other surveillance techniques nearby. Olson states that in some long term double-agent  operations, as many as twenty or thirty opposition case officers and support personnel have been exposed in this manner.

Olson warns that things get funny when the handling or servicing officer if a double-agent operation is an illegal or nonofficial cover officer (NOC). Case officers in these categories face arrest or imprisonment if caught. For that reason, illegals or NOCs are used carefully and as a rule only handle or support a case in which the bona fides of the operation are considered airtight.

With respect to “Learning the opposition’s intelligence collection requirements”

In what Olson calls “the cat-and-mouse game” of counterintelligence, even the slightest advantage can be the difference between winning and losing. A good double-agent operation can provide a winning edge by alerting the sponsoring service to the opposition’s collection requirements. Knowing what the double-agent is being asked to provide the handler is a valuable window into what the opposition’s priorities and gaps are. A question posed would be “How much pressure is being put on the double-agent to collect intelligence in a certain area?” He says that the range of tasking is limited, of course, to what the double-agent professes his access to be,  but a good double-agent might hint at the possibility if expanded access to smoke out the opposition’s response. For example, a high technology double-agent might tell his handler that his future duties might include research in high technology devices. Olson says the question then would be: “Does the opposition service respond either alacrity or lassitude?” According to Olson, the latter reaction could indicate that this requirement is being covered by another agent.

Olson demonstrates another ploy that can be used to learn the adversary’s collection priorities which was to have a military double-agent, for example, announce to his handler that he is up for reassignment and is about to put in his wish list for a new posting. Olson says the double-agent would be prompted to ask his handler: “Where would the service like him to go?  Where does the service not want him to go? For what kind of bullet should he be applying?” Olson explains that how the handler responds can indicate the services collection priorities and gaps in locations where it thinks it can handle the double agent safely.

Olson further explains that intelligence services do not task their agents haphazardly. The requirements are generated by a systematic process that includes input from all the interested parties. In the US, for example, requirements for the intelligence community result from an elaborate consultation and give and take managed by the Office of the Director of National Intelligence. The process is far from casual. Any intelligence service can learn a lot by analyzing the requirements given to its double agents. There is significant meaning in what the opposition service is asking for and what it is not.

Regarding “Acquiring positive intelligence”

Olson reveals that occasionally, a foreign intelligence service so believes in the trustworthiness of a double agent that it shares with that double-agent positive intelligence information. The purpose may be to give the founder agent background information to assist in his or her collection efforts. Another reason for doing so might be that the case officer-double-agent relationship may become so critical that the case officer assumes the double-agents ironclad loyalty and “talks out of school.” Olson also says a case officer may try to enhance his or her standing with the double-agent by boasting about past or current accomplishments.

With reference to “Tying up the opposition’s operations”

Every minute an opposition case officer spends on a double-agent, proffers Olson, is a wasted minute. The handlers time is wasted. Also tied up in the operation for no productive purpose are technical teams, linguists, surveillance, and analysts. Olson goes on to note that It is perhaps a perverse but still undeniable pleasure for a US counterintelligence officer to sit back to survey his or her double-agent operations and to gloat about owning a big chunk of that adversary’s time and energy. Every useless thing that a foreign intelligence service does in handling one of our double agent operations leaves less time for it to hurt us with real operations. In the great game of counterintelligence, these are gratifying victories.

As to “Taking the oppositions money”

Foreign intelligence services vary tremendously in how much they pay their agents, but Olson admits that with the right kind of material, a good double-agent can command big money. He explains that the willingness of an adversarial service to pay our double-agents large amounts of money is a good indicator of how deeply we have set the hook. 

About “Discrediting the opposition”

Commenting generally, Olson says intelligence services hate to lose face. Enough of them around the world have acquired such bad reputations for violating human rights, torture, other violent acts, and murder, that there is not too much for the many to lose in terms of good standing. They want to project to the world an image of competence, professionalism, toughness and discipline. Olson explains that any publicity that highlights their failures can undermine their support from their government and demoralize their troops. He notes that in closed societies like the Soviet Union, East Germany, China, and Cuba, intelligence services were hardly accountable to the press and public as those of Western democratic societies. However, he maintains that they still did everything they could to protect their reputations. Olson says that the same is true today of our major counterintelligence adversaries.

The US is reluctant to publicize expired double-agent operations out of fear of revealing sensitive methodology or subjecting the American principal of notoriety. In selected cases, Olson states that he would like to see US counterintelligence be more proactive in capitalizing on the other side’s failures. He believes that by doing so the US can make them gun shy about engaging in future operations against its citizens. He asserts that the US could publicize how they fell into our trap and how much they gave away to us in the process. He suggests that once they are lured into operating inside the US, counterintelligence services can do a splashy expulsion of case officers who have diplomatic immunity and arrest those who do not. As a benefit, Olson suggests the hostile service looks bad for letting itself be duped by our double-agent operation, and should pay a price for it. It loses some of its operational staff, its reputation for professionalism suffers. He feels that no mistake by the opposition should go unexploited. 

The People’s Republic of China Minister of State Security, Chen Wenqing (above). Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know.

Suggestions Drawn from Olson’s Precepts

Do Not Fume, Think!

In Greek Mythology, there was Até, an unpredictable figure, not necessarily personified, yet represented rash, chaotic, ruinous responses by both gods and men to a situation. She was famously mentioned in Act 3, Scene 1 of  William Shakespeare’s play The Tragedy of Julius Caesar, when Mark Antony addresses the body of Caesar and predicts civil war: “And Caesar’s spirit ranging for revenge,/ With Até by his side, come hot from hell,/ Shall in these confines, with a monarch’s voice,/ Cry havoc, and let slip the dogs of war.” Até has been described as a chain reaction, a mechanism in which evil succeeds evil. In finding a handle to the current espionage crisis with China, it is not a time for a “gloves off” attitude. Minds should be directed toward getting at the opponent to send a message, to bully or even to overwhelm, The requirement in this situation is subtlety, nuance, thinking, not any heavy-handed business. If any US counterintelligence officer involved cannot sustain that, he or she is working the wrong target. Informed by experience, greatcharlie is aware that it is a predilection among not all young special agents in a particular US counterintelligence service, but some, to be frightfully eager to prove something to their cohorts and to themselves. Ira furor brevis est; animum rege. (Anger is a brief madness; govern your soul (control your emotions)).

Practicing what is compulsory for all investigations in the Chinese crisis is sine qua non. However, if one’s thinking is not yielding satisfactory outcomes, then one must focus upon how and what one thinks. A corrective step must be to concentrate to enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. It is one thing to supposedly see everything–certainly the tools available to US counterintelligence services allow them to see an extraordinary amount of things, but another thing to properly reason from what one sees. US counterintelligence officers must think harder and conceptualize better. They must ruminate on events in relation to those that proceed them and meditate on what the future may bring. They must practice forecasting decisions by their adversary that may shape what might come and then proof their efforts by watching events unfold in reports. 

The question that must beat the brain of every US counterintelligence officer working on the matter is most likely: “Where will they strike next?” As a practical suggestion, the focus of many investigations–if not all investigations–of Chinese intelligence networks send operations might be placed on two points: those controlling networks and running operations in the field; and the composition of operations in the field.

Know Who Controls the Chinese Intelligence Networks

As it was discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” personnel of the Ministry of State Security (MSS), the civilian foreign intelligence service of China, are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for ten years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is near certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army (PLA) and Communist Party of China intelligence units are operating without official cover throughout the West. (Note: The four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders are the United Front Work Department, the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.) Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. They are known to often operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. 

There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial. In a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations. For some time, those provincial and municipal sub-elements performed mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus By the time of Mattis’ writing, they had become small-sized foreign intelligence services. They were given considerable leeway to pursue sources. In Mattis’ view, that independence accounted for variation across the MSS in terms of the quality of individual intelligence officers and operations. At the present, the provincial and municipal state security departments and bureaus may be operating entire networks of their own in the US with appropriate guidance from MSS Headquarters and the Communist Party of China.

There are likely many unexplored possibilities that perhaps should be considered about the managers of Chinese intelligence networks in the US. Anything that can be gathered or inferred about the individuality of such a person must be put forth for study. A constant effort must be made to understand what makes the network manager tick. Using some of what is publicly known about how Chinese intelligence services have been operating in the US from a variety of sources, to include US Department of Justice indictments and criminal complaints, one might conceptualize traits that could be ascribed to those managers possibly on the ground in the US, controlling operations day-to-day, are: energy, enthusiasm, and creativity. Among their traits, one might expect that they would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. That energy is transmitted to US citizens and Chinese émigrés being recruited to serve the purposes of their intelligence services and, of course, the Communist Party of China. There would very likely be the hope among Chinese intelligence services and the Communist Party of China that following the detection of each of their victories by US counterintelligence services there is an opposite effect upon the officers of those organizations. Chinese intelligence services would surely hope that a sense of defeat reaches deep into the psyche of US counterintelligence services rank and file and firmly sets within them a sense of disponding woe, sorrow, and discouragement. They doubtlessly want them to feel gutted.

The managers controlling operations of Chinese foreign intelligence networks in the US have undoubtedly been selected due to their proven mental alertness, quick thinking, adaptability, and curiosity. They surely have the right stuff to be open-minded and imaginative, within authorized parameters, and are willing to adapt. Surprisingly given the iron-grip culture among managers and executives in Beijing, these “field managers” have apparently been given some leeway to use their initiative to achieve progress. It likely accounts for how the Chinese are able to react quickly to any changing circumstances. To an extent, it may also explain why Chinese intelligence services may appear to some to be so disdainful of any danger that US counterintelligence efforts might pose to their operations despite knowing that they are actively being pursued by them by the hour. To be on top of everything, the network managers are likely sharp as a tack and no doubt endlessly study what is known by Chinese intelligence about US counterintelligence tactics, techniques, procedures, and methods, concepts and intent, and the latest counterintelligence tools US counterintelligence has fielded. Among such individuals, a solid foundation of information likely allows for the development of viable inferences and strong insights which in turn allows for confidence in using their intuition on what may come or what is coming their way. These network leaders are also likely able to identify any “bad habits” that may have ever brought US counterintelligence services too close for comfort. 

There remains the possibility that the network manager may not even be located in the US. Still, someone must be present on the ground in the US, to relay, with authority, directions from the manager and respond to inquiries and urgent matters from those operating in the field. It could be the case that they maintain modest lodgings not only to reduce costs and keep a low-profile in general. However, the presumption of a low-profile manager could also be entirely incorrect. It may very well be that they are individuals who have achieved considerable success and prominence in areas such as business and finance. As such, they, as a professional requirement, would both have access to and daily accumulate knowledge far beyond average boundaries of the latest events in industry and government. They would know what is important and urgent, what is moving things forward, what is the next big thing, who and where are the individuals influencing events and how to make contact with them and get connected to all of it. In their fields, they may be among the most capable at doing that and may have the recognition, awards, and the financial benefits that would confirm it. It would appear that they avoid engaging in any surreptitious or malign efforts in their own companies or in their own fields. However, it is still a possibility.

Such prospective network managers would very likely be untainted by any apparent or questionable affiliation with Chinese universities, the PLA, and the Communist Party of China. (That does not mean family members who may reside in China would not be thoroughly connected to such organizations.) If the individuals have family ties back to China, there would be nothing apparent about them that would make them suspicious. They would likely have no overseas travel or contacts that would create suspicion. Doubtlessly, an endless list of notables from their fields might be prepared to vouch for them. All the while, though, they would be managing intelligence operations of their networks in an exquisite fashion, and feeding back information to China vital to US national security and the key to helping US businesses maintain their competitive edge against foreign rivals. (If the manager is situated in the US, oddly enough, there may actually be a number of creative ways to draw out such senior managers of field operations. As aforementioned, greatcharlie will never offer any insights even from its position outside the bureaucracy that it believed might result in any negative outcomes for the US as it seeks to resolve the China crisis. That being stated, as stated in the December 13, 2020 greatcharlie post entitled, “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago,” if one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. Not one case has been a “wilderness of mirrors.”)

Perchance those of a younger generation would say that Chinese intelligence network managers in the US, as described here, as being  “woke,” or as the Germans would say, “wach,” both words roughly refer to them as being awake. In greatcharlie’s view, spying on the US is not woke. Nonetheless, everyday, the network managers place their keen eyes on the world around them and have a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

Perhaps reading this, one might get the impression that greatcharlie was attempting to convince readers that Jupiter himself was running the Chinese intelligence networks. That is surely not the case. However, it must be recognized that the sort controlling those networks are likely of a very special nature. Surely, with regard to politics which is all so important in the regime of the Communist Party of China, one would expect that network managers deployed against the US, despite not having much physical contact with anyone in Beijing, would be the fair-haired boys or gals among one or more of the senior executives in MSS or even a senior leader of the Party, itself. 

Whatever any US counterintelligence service may attempt to do in an effort to break Chinese intelligence operations, its officers must be mindful that this may likely be the sort of individual they are seeking to maneuver against. Without the ability to get up close to these managers, it might be enough to conceptualize them, given the pattern of activity and interrogations of intercepted officers, operatives, and informants and reinterviewing the handful of “recent” defectors in US hands. (It is wholly plausible that the officers, operatives, and informants working in the US have never seen and do not know the identity of their network manager on the ground. They may only recognize the individual by code via orders, rectifications, responses to inquiries and requests, and inspirational messages.) If the abstract entity, de créature imaginaire, constructed here is, by coincidence, correct in every particular, there may be the rudiments to get started on trying to “steal a march” on perhaps a few of the Chinese intelligence network managers. Shaping one’s thinking against thinking and conceptualized tratits of de créature imaginaire, may be enough to open new doors. Perhaps in time, such in-depth study of these aspects will allow informed counterintelligence officers to develop true intimations, not valueless surmisals or absurd speculation, of what may be occurring and what is about to occur. In “A Story of Great Love,” published in the Winter 2011 edition of the Paris Review, Clarice Lispector writes a sentence that is amusing yet conceptually germane to what is discussed here: “Once upon a time there was a girl who spent so much time looking at her hens that she came to understand their souls and their desires intimately.”

The People’s Republic of China Consulate in Houston (above). From this now closed building, China directed government, economic, and cultural activity across the southern US. Ministry of State Security (MSS) personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations.

Discover the Composition of Network Operations

One might suppose the Chinese intelligence networks in the US, as a primary purpose, unlikely conduct operations in which they blithely seek out new targets day-after-day, although there are perhaps some operations underway that serve to monitor individuals in positions that might be interest and sites of information of interest with the guidance of MSS headquarters, provincial bureaus and municipal departments based on available intelligence. The settled, more fruitful networks that have nettled US counterintelligence services the most are likely set up to run operations on targets of a certain type, rich with prospects at locations in  which Chinese intelligence operatives and informants are well ensconced. One could reasonably expect that there will be a commonality in location for both predator and prey. (Although, nothing can really be certain for espionage is a deke business.) The Chinese intelligence operation will be set up in proximity of a figurative “happy hunting ground,” a high-tech firm, laboratory, academia, political network, foreign, national security, economic, trade policymaking office, agribusiness, and aviation, and energy business to list only a handful. In addition to propinquity, there will be a common functionality of any Chinese owned business that may establish themselves in the hunting ground, and very apparent efforts to create employee links by them with their likely targets. 

Control remains essential in the authoritarian (totalitarian) regime of the Communist Party of China and therefore there is a certain specificity intrinsic to every operation–despite nuance in design, methods, and other imaginative approaches attendant–that will presumably allow for monitoring, oversight, and audits. If it ever was detected that an odd Chinese intelligence network was skillfully mixing tactics, techniques, procedures, and methods in operations conducted following an aggregate rollup of known Chinese intelligence efforts in the US, it is unlikely that particular network’s approach, while perhaps creative to the extent possible, will never stray too far from any observances that would be laid down by their respective Chinese intelligence services. If the tactics, techniques, procedures, and methods used by Chinese intelligence networks are really so similar, one could say their operations will likely have a common “DNA.” The adversary’s known practices are undoubtedly cataloged by US counterintelligence services. It will be necessary to more closely study the common functionality of networks and operations. As much information on their operations must be collected as possible. Study what has been learned by allies. Identify common vulnerabilities in every network. Identify, study, and exploit their deficiencies.

As much of what the networks Chinese intelligence services are exactly doing day-to-day in the US remains unknown publicly at least, it is impossible to say with certainty how the COVID-19 pandemic has impacted their operations. One can imagine there has been some impact. Nevertheless, given that reality, in considering how COVID-19 factors into their efforts, one must again enter the world of supposition in which one analysis of how those networks are not only operating, but more specifically, how managers of those networks are communicating with Beijing and with their officers, operatives, and informants, can be just as good as another.

Even before COVID-19 hit, for Chinese intelligence networks on the ground in the US, managing communications in any direction was imaginably no mean feat. As it was discussed in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).” Perhaps, the main lesson for Chinese intelligence services was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. 

One might venture to say that a likely move to hard documents may have been evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

From what is publicly known, it appears that Chinese intelligence networks do not recruit after simply spotting a potential operative or informant. If that were the case, the success rate of US counterintelligence services against them would be far higher given the opportunities such activities would present and given the experience of their organizations in dealing with such a basic set up. Chinese intelligence services clearly work wholly on their own terms, investigating only those “targets” who they choose to investigate, essentially ignoring anyone that may have the slightest appearance of being dangled before them. It is a benefit for them to operate in what could be called a target rich environment in the US. Recruitment is “by invitation only.” If one is not on the figurative guest list, one does not get in! As part of their investigations of targets for recruitment, doubtlessly it is important to identify the psychological profile of a person, his political orientation, his attitude towards his motherland, China or towards the US, where he or she has become a citizen or visiting for school or long-term employment. And then, after accumulating a sizable amount of material (based on a whole array of undertakings: plain observation, audio- and video-surveillance of the places of residence, agency-level scrutiny, including “honey traps”), on the basis of the analysis, a decision is made about a transforming the investigation into a recruitment with appropriate conditions (such as through compromising materials or a voluntary agreement) or about wrapping up the whole matter by “educating” a foreigner, conveying a favorable message on China and the wave of the future, Chairman Mao Zedong’s vision of Communism.

After studying what is being specifically done by a network long enough, one will begin to see dimly what a network or specific operation is driving at. After finding a few missing links, an entirely connected case will not always, but can be obtained. Once a clear picture emerges, one can start developing attack vectors against Chinese intelligence networks with a forecast of nearly assured fruits. Lately, the identification and aim at any networks has clearly been far less than accurate. Do not use individuals lacking good judgment and sanguine required based on one’s own standard. Create the best team possible. Know your people well. Keep a close eye on neophytes. (As touched on in the discussion of Olson’s “Ten Commandments of Counterintelligence” of Chapter Four in greatcharlie’s review of To Catch a Spy, a supposition verging on the ridiculous must be seen as such by a supervisor and appropriately knocked down. A keen interest must be kept on how subordinates, especially novices, are reasoning with facts. A supposition verging on the ridiculous might involve imputing criminal motive or involvement on a party that could not have been part of a criminal conspiracy or ascribing characteristics to an individual who could not possibly possess them or has not displayed them. A good case could be blighted by such wrongheadedness.)

Gnawing a bit further at the matter of using young, novice counterintelligence officers on such delicate cases concerning Chinese intelligence, one should avoid the pitfall of allowing them to manage surveillance work for a case and turn it into something that might more reflect the work of a security service in a totalitarian country to soothe their egos. Be mindful of the use of time, energy, and budget by them such as placing heavy, wasteful surveillance on the street not to advance the casework but to prove some immature point of power. Casting some wide net will bring in nothing but a lot of extra things that time, energy and money cannot be wasted upon. Differ nothing to their judgment. Every mistake or misstep made by US counterintelligence, whether the result of a manager’s use of some clever misdirection or whether self-inflicted, represents a success for a Chinese intelligence network manager. Keep firmly in mind the managers of Chinese intelligence networks are flexible enough in their thinking that they appear to be able to change horses in midstream while maintaining the metaphoric helm on a steady heading so to speak. 

Concerning contractors, by their nature, they are owned and managed by businessmen out to make money as priority. That focus among many of them can be boiled down to the  precept, “minimum effort, maximum gain” and that can be most apparent in how they conduct their so-called operations on the street. As already alluded to here, their “operatives,” often poorly vetted before being “hired,” many times find it difficult in the field, physically surveilling a target or trying to open a clandestine conversation, to be their higher selves. They are often too aggressive, even ruthless, and engage in what could politely be called “aberrant behavior.” Strangely enough, for many contractors, the reality that their operatives display these characteristics is a point of pride.. As it was discussed in greatcharlie’s January 31, 2020 review of To Catch a Spy, the negative behavior of contractors witnessed in the field by an adversarial intelligence service’s officers, operatives, and informants could very likely have an impact on their impressions of US counterintelligence services beyond what has already been inculcated within them by their masters. It should be expected that any negative impressions could have the deleterious effect of negatively impacting a decision to defect or be recruited if the idea might ever cross their minds. It is impossible to calculate, but it surely can be imagined that a number of potential defectors and recruits may have been deterred from taking the first step over this very issue. Recognizably, there is a reduced ability to effectively oversee what contractors are doing at all times on behalf of US counterintelligence services. At best, the managers of a particular counterintelligence operation that they may be hired to support will only know what the contractors divulge about their efforts. Close observance of them in operation, done furtively by managers of US counterintelligence services, would doubtlessly substantiate this.

Those in US counterintelligence services considering what is noted here might cast their minds back to the observation of the renowned 17th century French philosopher Blaise Pascal in Pensées (1670): “Justice without power is inefficient; power without justice is tyranny. Justice without power is opposed, because there are always wicked men. Power without justice is soon questioned. Justice and power must therefore be brought together, so that whatever is just may be powerful, and whatever is powerful may be just.”

Surely at one time the relationship between contractors and US counterintelligence services was quite beneficial as they provided real assistance through manpower and talent, but again, the situation has since changed considerably. They are shadows of what they once were in terms of quality.  Beyond some possible invaluable assistance they may be providing through precious outside of the bureaucracy analysis and advice on Chinese intelligence activities in the US, in the China case, US counterintelligence services should severely minimize or eliminate contractors if possible. There may be a place for such contractors and their ways in counternarcotics, organized crime control, human-trafficking or some other kind of criminal investigations. However, up against the sophisticated intelligence services of a determined adversary as China, those contractors are not a credit to US counterintelligence services. They are nothing but a liability. The China case is too important to indulge in any uncertainties. On an additional point, technical intelligence tools must be utilized effectively and appropriately. Monitor only those who need to be monitored. Resist the urge to play George Orwell’s “Big Brother.” That urge is another weakness. Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.)

The continued success Chinese intelligence services and counterintelligence services in being able to conceal their massive espionage efforts may suggest that conceptually, they may approach establishing their presence in the US with the thought of “peacefully coexisting” in the same environment as US counterintelligence services. The relationship that they seem to have sought with US counterintelligence services in order to ensure the security of their networks and operations is not “cat and mouse” or combative. It is strangely, but logically, symbiotic. 

That symbiotic relationship, however, is malignant, and designed to be parasitical. To that end, managers of Chinese intelligence and counterintelligence services in the US likely respond to any detection of the presence of US counterintelligence personnel or activity not by avoiding them, but by connecting in some smart way to them. Connecting to them, to give a couple of simple examples means having operatives work for a contractor engaged in physical surveillance, or take on low level employment in or around offices of those contractors. From such positions and similar ones, they would enable themselves to monitor the most well-orchestrated, well-conducted activities from the inside. Some operatives, finding work as operatives in the agencies of contractors for US counterintelligence services  could actually become, and have very likely actually been, part of those operations. Note that operatives of Chinese foreign intelligence and counterintelligence services directed to get close to US counterintelligence services personnel and activities may not necessarily be ethnic Chinese. (For a fuller discussion of that matter, see the July 31, 2020 greatcharlie post “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”) Such a precaution would likely be deemed less necessary by managers of Chinese foreign intelligence and counterintelligence services for operatives placed within or close proximity of contractors offices and personnel as those managers have likely become well-aware of the astonishing lack of due diligence and security practiced by them. Surely, US counterintelligence activities of greatest interest would be those against Chinese foreign intelligence networks and operations. However, there would undoubtedly be significant and considerable value in being aware of physical surveillance activities by US counterintelligence services against the other adversaries of those services. There is every reason to believe cooperative relationships exist among the intelligence services of US adversaries. To say the least, there would be some monetary value in information collected by China of that kind.

Much as some parasites, those operatives who might successfully penetrate any organizations of or pertaining to US counterintelligence services would never act directly  to destroy those personnel or organizations but would rather only nourish themselves off  of them by collecting critical information from them for the security and survival of Chinese Intelligence activities in the US. Reminding again of what might be called Olson’s maxim from To Catch a Spy, “Penetration is the best counterintelligence.” One can almost be certain that senior executives and managers in adversarial foreign intelligence services surely believe that, too! That is something for US counterintelligence services to be very concerned about.

With regard to working with quantitative data, broken down to the essentials, it must continually be used to keep US counterintelligence officers cognizant and well appraised of activity by confirmed Chinese intelligence officers, operatives, and informants tied to diplomatic missions. With quantitative data, users ought to drill down on data concerning their daily and hourly activity from communications to commuting. One must be able to discern even the slightest changes in activity, whether increased or decreased. Data should be reviewed daily to identify the slightest changes from the aggregate numbers. Revisiting data that has already been rolled up and aggregated is also advised. It should be mined through for more details, clues. (One should never get so caught up with data to believe that an opponent’s actions can be reduced to an algorithm. The opposition’s leaders are living, breathing, agile, flexible and–despite working in Communist China–potentially unconventional thinkers.)

Getting Results

Measures of success of the practices suggested here may hopefully be a marked increased prospective opportunities to: neutralize; displace; and, intercept, even recruit, from a targeted Chinese intelligence network.

1. Displace

If the purpose of US counterintelligence is to displace a Chinese intelligence network or operation, the rapid shutdown of an operation would be a sign of success in that endeavor. The threat of intercept or the very public revelation that an officer, operative, or informant in the network has been apprehended would naturally spur such an action. If the environment is made hot enough for the network, its managers and the remainder of their string of officers, operatives, and informants will indubitably go to ground with the hope of resurrecting their network with its diffuse operations at a more favorable point in time. However, if an operation has packed up and moved out, there will be a palpable change in the working atmosphere for the counterintelligence officer who has had their noses to grindstone working the case. In a frenzied rush to exit the US, individual suspected Chinese intelligence officers, working in academia or industry, in physical isolation from their compatriots, or ones that may appear to be operating independently and farthest away from their network compatriots and resources, may no longer see the need to carry on with any pretenses. It is also interesting to see that there is never mention of any effort by Chinese intelligence officers, operatives, or informants to figuratively throw dust in the eyes of those investigating, plant false leads or use other means to misdirect, as they make their escape.

Interviews can be used as a psychological tool to prompt displacement. For the network manager who is logical, visits to the residence or workplace of a subject of investigation by US counterintelligence officer to invite them for an interview in the respective office of their service, or to interview them at that location, may be viewed as probing based on some insight possessed by the adversary. There is the odd chance a network manager might believe a US counterintelligence service was on to something. However, it would seem they would more likely think a US counterintelligence service would “hold its cards a little closer” if it had something solid to act on. If the network manager is thinking in that way, it would mean  he or she has been trying to see through all things cooked up by US counterintelligence. Surely, for the Chinese intelligence  services as much as those of the US, studying their oppositions modus operandi is as important a task as anything else.

Operatives and informants, on the other hand, may become jittery. However, such a visit may not unnerve the network manager. The reaction of a network manager may be no visible  reaction at all. He or she will likely continually display nerve and knowledge. The possibility of such interviews has likely already crossed the managers mind. The network manager has likely already assessed how officers, operatives, and informants in his or her retinue will act or react when approached. The task of the network manager will be to deduce what triggered the interview, reason from cause to effect what is the likely course of events to follow, and act accordingly. That being stated, activities and especially the communications of those approached for interviews must be monitored. New travel plans by individuals with some association to those interviewed, scheduled closely by date, must be examined.

2. Neutralize

To assist in determining where to interdict, stand up a “Red Team” on a non-stop basis, using templates properly constructed from everything known and insights and inferences on Chinese operations and to continue to build up a legend for de créature imaginaire with the objective of achieving increasing accuracy. Among tools that should be made available for use in neutralizing Chinese intelligence officers, operatives, and informants, should be heavy financial rewards for “coming forward”; and whistle-blower-like protections. Casting one’s mind back to the “Chieu Hoi” program used to contend with the Viet Cong during the Vietnam War, US counterintelligence services, using an approach certainly not the same but conceptually similar to that, may very well be able net a few long-time operatives and informants of China see intelligence services with deep involvement in their efforts, who may have had their fill of the whole business and want to get out, but safely. Cela n’a rien d’évident. (The fact that the Chieu Hoi program was implemented in an Asian country is purely coincidental. No deliberate connection regarding a region, race, or political philosophy was made. The parallel is that much as the Viet Cong, Chinese foreign intelligence officers in particular, but any operatives and informants as well are often “true believers,” who act out of conviction. Similar to the Viet Cong, they are driven by a deep-seeded ideology. In their unique case, it is usually the erroneous belief that China is the champion of the oppressed and will become the dominant power in the world.) In case the point has been misunderstood, heavy financial rewards for them would mean steep rewards. Ideally, the result will be to threaten the rewards structure, financial and psychological, of the Chinese foreign intelligence and counterintelligence services. If money would not be the elixir to turn any Chinese intelligence officers, operatives, or informants, US counterintelligence services would only need to pose the question to themselves: Deployed to the US and caught in the business of spying, what else would truly satisfy them enough to cause them to  defect or to become a double? If the situation becomes desperate enough, ask the targeted Chinese intelligence officer, operative, or informant: “What do you want? Name it!” (In other words, at least to get things moving, do whatever it takes, but within reason!) Turning Chinese operatives and informants should ideally take on the appearance of something akin to a business enterprise while actually being a counterintelligence task, if successful. Cela encore n’a rien d’évident. (Note, however, that money can become poisonous in both directions, creating temptation among those in service ranks unfortunately disposed to transgressions. Therefore, its distribution must be very carefully supervised.)

To be succinct, the hope of US counterintelligence should be to come in contact with an officer, operative, or informant with an albeit idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. Pretio parata vincitur pretio fides. (Fidelity bought by money is overcome by money)

3. Intercept

Non capiunt lepores tympana rauca leves. (Drumming is not the way to catch a hare.) This could be entirely off the mark, but it appears that aggressive counterintelligence appears to have been directed at targets of opportunity versus the industry-centric networks of Chinese intelligence in the US. While there may be a meretricious benefit to this practice, it accomplishes nothing in terms of tearing down Chinese intelligence networks or smothering greater espionage operations. Again, elevated thinking is required. There must be an inflexion point at which US counterintelligence services become the fox, and the days of being the chicken come to an end. Better use must be made of tools available and good practices. There must be better use of deception. To lure Chinese intelligence networks into traps, network managers and higher ups in the Chinese system must be convinced that the figurative cheese in the trap is something worth the risk of trying to take. Psychological operations must be used to draw them closer to targets US counterintelligence can cover while remaining concealed. As part of the information warfare campaign with China, an effort must be made to surreptitiously “assist” Beijing in discovering a novel target worth pursuing. Chinese intelligence services have enjoyed a halcion season of success. They apparently have no intention of being thrown off their pace and streak of victories by what they in all likelihood suspect are attempts by US counterintelligence to score a victory against their effort during their moment of glory.

US counterintelligence officers must do their utmost to go beyond the normal scope in determining what will attract Chinese intelligence network managers. They must not proceed by pretending to know. There is no room for guesswork. Approaches developed must not be derivative. They must put as much time as necessary into developing them to become as certain as humanly possible that any new approaches will work. Any enticement or manipulation must not give off any indication of being a plant nor chicken feed. It must appear as genuine gold dust. Under extremely controlled circumstances, it may need to be actual gold dust! What is left is to wait for the network to show itself. There is nothing else to do otherwise. Efforts to stoke or prompt the adversary will lead to blowing the entire set up. Impatience is what the Chinese will look for because that is what every other foreign intelligence service expects of US counterintelligence.

Logically, it would be a capital mistake for Chinese Intelligence services to adulterate what could likely be characterized as an operation in which every aspect was well-known with individuals of ultimately unknown character, loyalties, or reliability and targets of likely no immediate unknown value and of no prior interest or desire. As senior executives and managers in Beijing might assess, if anything suddenly put before them was truly of any immediate value or desirable to China, the individuals or the information would have respectively been recruited or stolen already. Assuredly, that is the pinch for US counterintelligence services when it comes to getting decent double-agent operation off the ground.

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, offers the statement in The Honourable Schoolboy (Alfred A. Knopf, 1977): “A desk is a dangerous place from which to view the world.” US counterintelligence officers must be mindful of what may be perceived in the conference room as an advantage over the opposition intelligence network manager may be the ugly product of groupthink. They must judge perceptions in view of what is  actually known about that opponent, even if he or she remains de créature imaginaire and how that manager may act in response to what they plan to put in his or her way. Use of aggressive tactics or overwhelming superiority can be turned into a liability by an agile thinker. It is also important to understand that no matter how the Chinese intelligence network or operation may be approached, everything done, particularly if successful, will be studied by superiors in Beijing so that all gaps that may have been exploited in a disrupted, displaced, or destroyed network will be rapidly and quietly set right in all remaining networks. Operational missteps that might have been exploited will be identified and never made again. (Be observant for changes in practices among networks and operations being traced.) In view of what Beijing may learn from an initial attack, adjustments in the next US counterintelligence strike against a Chinese intelligence network or operation must be considered even before the first is executed. In a cycle, this approach to attacking Chinese intelligence networks and operations must be adjusted for each new situation and repeated.

To go a step further, one might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them. 

It is unlikely that the senior executives and managers of Chinese foreign Intelligence services are sitting back and gloating about their victories. Rather, it is very likely that everyday they work harder and harder to make their networks and operations better and more effective, pushing their espionage capabilities far-beyond the reach of the counterintelligence services of the countries in which they operate. All of that being said, one might still imagine that soon enough, in a gesture aimed at figuratively putting some dirt in the eyes of US counterintelligence services, the Chinese foreign intelligence services may spend some hours planning some upheaval that their networks could cause in the US to embarrass US counterintelligence services. It would imaginably be designed to knock them well-off track and symbolically mark China’s domination of their opponent on his own home ground. China would also be sending a message concerning its dominance throughout the espionage world. Of course, despite its meretricious effect, whatever such a potential ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would feel enabled to plausibly deny China’s connection to the action. (These are only some thoughts, ruminations, on the situation. Hopefully, this should not cause any undue concern. Or, cela n’a rien d’évident.)

The Chinese have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. To that extent, it is unlikely Beijing wants its intelligence services reaching after anything when their plates are already full follow up on leads they created for themselves. It is possible that the Chinese foreign intelligence services have never seen US counterintelligence services get anything substantial started against their networks in terms of penetration. However, the Chinese will unlikely mistake quiet for security. They probably never really feel secure in the US. It is hard to imagine what might ever be worth the candle to Chinese intelligence services to reach after. Assuredly, impatience in any US operation would be anathema.

People’s Republic of China President Xi Jinping (above). Given the success of Chinese intelligence services in the US, China might soon enough choose to send a message to symbolically mark China’s domination of their opponent on his own home ground. and its dominance in the espionage world. Chinese foreign intelligence services operating in the US may spend some time planning an upheaval that would figuratively put some dirt in the eyes of US counterintelligence services. Despite any meretricious effect such an act might have, whatever such a potential deplorable ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would be able to plausibly deny their connection to the action.

The Way Forward

Month after month, US counterintelligence services discover another set of occasions when China has incommoded a federal agency, a private firm, an academic institution, or research institute by stealing from them classified information or intellectual property most often vital to the national interest. Leave it to say, having engaged in an empirical study of public facts coming in what has been transpiring, the potential trajectory of China’s malign efforts is breathtaking. By 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. However, that is not the case. Perhaps in some allied country, success against China will be achieved showing US counterintelligence services the way forward. With a long history of successfully defending the United Kingdom from foreign spies, it may very well be that MI5 will not have the Cabinet, the Prime Minister, the exalted person herself, wait much longer for good news.

Whether this essay for some will cause a journey from unawareness, curiosity, or a lack of clarity to knowledge, remains to be seen. There has been more than enough talk about how bad the problem with China is. That becomes by the by. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and take the game back to China and destroy all of its networks. It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. In a very small way here, greatcharlie has sought to contribute to development more effective approaches to defeat Chinese intelligence collection efforts in the US. Before writing this essay, greatcharlie fully understood and accepted that there are those singular US counterintelligence services that would be completely uninterested in, and even shun, any voice or meditations from outside the bureaucracy that would dare offer assistance to them in their struggle with China’s intelligence services. (It must be stated that greatcharlie has either been retained to supply any imaginable deficiencies of US counterintelligence services nor has it been retained for anything by any of them.) Often in the US national security bureaucracy, perspectives on adversaries can become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, as suggested,, perhaps an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with Chinese foreign intelligence activity in the US.

With a near endless chain of losses, the following theft sometimes being a greater defeat than the one proceeding it, greatcharlie feels compelled to ingeminate the position expressed in the conclusion of its August 31, 2020 greatcharlie post US counterintelligence services should consider hiring individuals from outside the bureaucracy who are already known due to demonstrated interest in the subject matter and recognized as possessing some ability to present what may be unorthodox innovative, forward-looking perspectives. New thinkers can rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Thinking outside the bureaucracy would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. 

The suggestion should not seem so exotic at this point. Even the adversaries of the US would likely imagine the possibility that some assistance from an unexpected source and direction could pose the greatest threat to their success. Perhaps some US counterintelligence services will never brook the idea of receiving such assistance from outside the bureaucracy. However, in the end, the US counterintelligence service which opens itself up to new, thinking, new insights, new approaches, will very likely bag its tiger. Vigilando, agendo, bene consulendo, prospera omnia cedunt. (By watching, by doing, by consulting well, these things yield all things prosperous.)