Commentary: Maintaining the Harmony between the Ministry of Public Security and the Ministry of State Security in an Apparent Totalitarian China

People’s Republic of China President and General Secretary of the Communist Party of China Central Committee Xi Jinping (center right) in the Great Hall of the People in Beijing. On August 26, 2020, Xi presented Minister of Public Security (MPS) Zhao Kezhi and Minister of State Security (MSS) Chen Wenqing with the “Police Flag” at a ceremony in which over 300 police officers were present. Xi ordered the security forces to be loyal to the Party, serve the people, be impartial in law enforcement, and maintain strict in discipline. Xi also called on the security forces to uphold the Party’s absolute leadership. Historical evidence shows maintaining two main intelligence and security services with overlapping responsibilities is an odd choice as it usually creates difficulties for senior executives and managers of the respective organizations in sorting out issues over cases, turf, and budgets. At least publicly,, MPS and MSS have managed to coexist peaceably.

Among some Western intelligence and counterintelligence services, distracting bureaucratic and operational rivalries have been observed.  However, the two main civilian intelligence and counterintelligence services in China, Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS and Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS, have publicly avoided such problems despite inherent parallels in their domestic responsibilities. Except for experienced hands on China policy and the Chinese intelligence services and national security via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either organization. MPS is an intelligence service under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, is an intelligence service responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems mainly from providing consumers in Beijing to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, and ministers and senior executives of appropriate ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions. This commentary briefly focuses on the apparent management of a smooth working relationship between MPS and MSS as they share overlapping intelligence responsibilities in the service of Communist Party of China, all powerful in the People’s Republic of China. Concordia res parvae crescent. (Work together to accomplish more.)

These two national intelligence organs are the embodiment of the logic that created the Chinese system’s intimidating, authoritarian–perhaps it could even be called totalitarian–order and for years has choreographed events to accomplish the Communist Party of China’s purposes. To that extent, the Communist Party of China has entrusted the defense of the modern Communist Chinese state to these two complex government organizations. On August 26, 2020, at the ceremony held in the Great Hall of the People in Beijing, People’s Republic of China President Xi Jinping conferred the “Police Flag” to Minister of Public Security Zhao Kezhi and Minister of State Security Chen Wenqing. Xi ordered China’s security forces to be be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. In his address at the ceremony, Xi lauded the major contributions made by the Chinese police to safeguarding national security, social stability and people’s interests, He called them a mighty force that can be fully trusted by the Party and the people, and spoke highly of the major contributions made by the Chinese security forces to safeguarding national security, social stability and people’s interests. Xi also called upon the security forces to uphold the Party’s absolute leadership.

Xi has placed considerable focus on police, judges, prosecutors, public security,, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. The campaign is also said to be part of an effort by Xi to bolster domestic discipline as he prepares for a leadership shake-up at the Communist Party Congress in 2022. Reportedly, Xi has been spurred on to push for iron authority down to local police stations as a result of the reaction among Communist Party of China leaders toward near-endless protests in Hong Kong, and their need to be assured of the Party’s total control of the population after that became an issue during China’s coronavirus outbreak. The ministers of the MPS and MSS understand their marching orders. Zhao, the Minister of MPS, was quoted as saying, “Resolutely put absolute loyalty, absolute purity and absolute dependability into action.”

Ubi concordia ibi victoria. (Where there is unity, there is victory.) As already alluded to briefly, historical evidence shows that maintaining two main intelligence and security services with many overlapping responsibilities is an odd choice gor it normally creates difficulties for senior executives and managers of the respective organizations in sorting out issues over over cases, turf, and budgets. However, MPS and MSS have managed to coexist peaceably, at least publicly. The most apparent reason that such high profile parochial struggles over turf and budgets do not exist at least publicly between MPS and MSS, interestingly enough is that they are actually prohibited under the People’s Republic of China National Security Law. Hypothesizing on the matter, purely out of academic interest, if a competitive relationship between MPS and MSS had ever taken flight, it very likely would have been the result of happenstance in the 1980s. During the after its inception in 1983 and the larger part of the 1990s, MSS took on an assignment from the Communist Party of China concerning a burgeoning student movement that was redundant given the matter was covered by MPS.

As that situation stood, the Communist Party of China’s leadership became concerned about the student movement as a threat to social order and its power. In response, there was a call for all hands to mitigate those fears. MSS, newly minted, had the officers and was available. The Communist Party of China insisted that it place its focus on students in both China and abroad after the Tiananmen Square protests. Tiananmen Square, in addition to being embarrassing to the Communist Party of China leaders, caused them to remain greatly concerned over a possible follow-on move by students. That concern was somewhat supported when Chinese authorities announced that some 200 Chinese had been accused of spying for the Soviet Union. One might conclude that due to the counterintelligence aspect of the assignment, it made some sense to pass it the MSS. The MSS as an organization, threw itself into the immediate domestic task set for it by the Communist Party of China.

Inter cetera mala, hoc quoque habet stultitia proprium, semper incipit vivere. (Among other evils, folly has also this special characteristic, it is always beginning to live.) Perchance to further satisfy and impress the Communist Party of China or perhaps in an attempt to redesignate the intelligence service’s purpose wholly, MSS leaders at the time, arguably taking a turn down the wrong path, exploited the situation by deciding to expand and invigorate their organization’s presence in the provinces and municipalities. That expansion occurred in four waves. In the first wave during MSS’ inaugural year, the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai were created. A second wave appeared shortly thereafter between 1985 and 1988, including Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang. The third wave from 1990 to 1995 completed the expansion of the Ministry across at the provincial levels, bringing in Anguilla, Hunan, Qinghai, and Sichuan provinces. The fourth wave the provincial-level departments expanded vertically, taking over local public security bureaus or established subordinate municipal or County bureaus. The MSS policy of expanding representative offices in most major towns and cities was reversed in 1997. Nevertheless, by then, the MSS was a nationwide security organization at every level. Presumably, having reached that status, it may have been called upon to perform some special tasks for the Communist Party of China’s leadership on occasion.

To add to that situation, in its first two decades, the ranks of the MSS were filled with longtime MPS who transferred over to the office. MSS provincial branches were often staffed with PLA and government retirees. The new MSS was funded in part by the MPS.To help MSS take on its mission, MPS also passed some networks to the new organization. With some uncertainty that existed as to the political nature of MSS, MPS was reportedly reluctant to make such transfers. MSS was declared to be a foreign intelligence organization, but as things stood then, it was doing more of what its rank and file knew how to do best, which was to perform as police.

In the end, though, MPS has remained the dominant service concerning the domestic counterintelligence mission. Moreover, with regard to MPS’s organizational identity, as aforementioned, from its beginnings, has embodied the will of the Communist Party of China, and its leaders insisted upon retaining that grand status. Even today,, MPS leaders are regularly striving to garner praise and the further favor of the Communist Party of China from the flash and bang, bells and whistles, of high profile cases. MSS leaders returned to shaping their organization into a truly effective foreign intelligence organization. The MSS foreign intelligence capability was built up most effectively when intelligence cadres from the Communist Party of China were brought into its ranks. An uptick in both competency and necessity favored a rise MSS influence in foreign policymaking. When direct political power is absent, influence usually relates to merit and necessity. Senior leaders of the Communist Party of China involved in foreign policymaking  would eventually want the MSS in the room, contributing to deliberations. Yet, MSS still maintains a very significant domestic operation via provincial and municipal offices throughout China. Presently, the MSS’ thirty-one major provincial and municipal sub-elements. Sic utere tuo ut alienum non laedas. (Use what is yours without harming others.)

Placing MPS and MSS alongside the Federal Bureau of Investigation (FBI) and Central Intelligence Agency (CIA) in a search for parallels, the record indicates their situation was the contrary as considerable conflicts over cases, turf, and budgets once existed between the two US organizations. A growing schism resulted in cooperation between them on intelligence and counterintelligence being mandated by authorities to the chagrin even to date of some case officers and special agents. Notably, the CIA does not independently determine its intelligence collection priorities. The CIA’s intelligence activities are instead conducted in response to intelligence requirements established by the President and the CIA’s other intelligence consumers. Specifically, the Director of National Intelligence approves the National Intelligence Priorities Framework (NIPF), which establishes national intelligence priorities that reflect the guidance of the President and the National Security Advisor with input from Cabinet-level and other senior government officials. The CIA’s duly authorized intelligence activities are conducted in response to the NIPF priorities or other intelligence requirements imposed by the President and other intelligence consumers. Under the framework established by Executive Order 12333, the CIA’s intelligence activities are primarily focused outside the US. The FBI is responsible for coordination of clandestine collection of foreign intelligence through human sources or human-enabled means and counterintelligence activities inside the US. Generally though, the CIA can cooperate with the FBI to collect foreign intelligence within the US, subject to the restrictions imposed by statute, Executive Order 12333, the Attorney General Guidelines, and other legal and policy requirements. Specifically, the National Security Act prohibits the CIA from exercising police or subpoena powers or otherwise engaging in law enforcement or internal security functions, with the exception of the security protective officers who protect CIA facilities within a limited jurisdiction pursuant to the CIA Act. If, for example, the FBI has a cooperative relationship with an individual inside the US who provides foreign intelligence information, the FBI may appropriately consult with the CIA regarding the relationship, and the CIA may continue the relationship for intelligence purposes should the individual travel overseas.

Of course, the situation between the MPS and MSS is also made quite different from that of FBI and CIA particularly due to the nature of the government in which the two intelligence services respectively function. In a country such as China, there is a need among leaders to create some acceptable degree of certainty about their world that is existential. As an expression of need, they tend to find it preferable to have as many ears to the ground as possible, know what comes next, be sure of who can be trusted, understand how to protect their personal interests, be made aware of where the next likely challenge from the inside, and be forewarned of the next threat to the country from the outside, will come from. The role of the security services in satisfying that need is not an ancillary role. Thereby, protecting the interests of the political leadership is really their raison d’être.

The 20th century US philosopher and political theorist, Hannah Arendt, in her seminal work The Origins of Totalitarianism (Schocken, 1951) provides an excellent discussion of why multiple security services exist in totalitarian countries. The history of Chinese intelligence validates what she presents. The most relevant passage, too precious to condense, is presented here in its entirety. Using the situation in the Soviet Union as a yardstick, Arendt explains: 

In Russia, the ostensible power of the party bureaucracy as against the real power of the secret police corresponds to the original duplication of the party and State known as Nazi Germany, and the multiplication becomes evident only in the secret police itself, with its extremelycomolicate, widely ramified network of agent, in which one Department is always assigned in the supervising and spying on another. Every enterprise in the Soviet Union has its special Department of the secret police, which spies on party members and ordinary personnel alike. Coexistence with this department is another police division of the party itself, which again watches everybody, including the agents of the NKVD [Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs)], and whose members are not known to the rival body. Added to these two espionage organizations must be the unions in the factories, which must see to it that the workers fulfill their prescribed quotas. Far more important than these apparatuses, however, is “the special department” of the NKVD which represents “an NKVD within the NKVD,” i.e., a secret police within a secret police. All reports of these competing police agencies ultimately end up in the Moscow Central Committee and the Politburo. Here it is decided which of the reports is decisive and which of the police divisions shall be entitled to carry out the respective police measures. Neither the average inhabitant of the country nor any one of the police departments knows, of course, what decision will be made; today it may be the special division of the NKVD, tomorrow the Party’s network of agents; the day after, it may be the local committees or one of the regional bodies. Among all of the departments there exists no legally rooted hierarchy of power or authority; the only certainty is that eventually one of them will be chosen to embody “the will of the leadership.”

The only rule of which everybody in a totalitarian state may be sure of is that the more visible the government agencies are, the less power they carry, and the less is known of the existence of an institution, the more powerful it will ultimately turn out to be. According to this rule, the Soviets, recognized by a written constitution as the highest authority in the state, have less power than the Bolshevik party; the Bolshevik party, which recruits it members openly and is recognized as the ruling class, has less power than the secret police. Real power begins where secrecy begins. In this respect, the Nazi and Bolshevik states were very much alike; their diffetence lay chiefly in the monopolization and centralization of secret police services in [SS-Reichsführer Heinrich] Himmler on the one hand, and the maze of apparently unrelated and unconnected police activities in Russia on the other.

It must be noted that there remains some debate in a few scholarly circles as to whether China would qualify as a totalitarian state, such as that deliberated on by Arendt. China certainly ticks off most of the boxes that would qualify it as such. Totalitarian countries are those in which the government does not permit its people to partake in political decision making. Instead of giving the people a voice, a totalitarian country is typically ruled either by a single dictator or a group that has not been collectively elected by the people. The ruling leaders, in China’s case, a ruling party, of totalitarian countries do not merely enact laws. Rather, the people or person in charge controls all aspects of both public and private life. There is no limit to what a totalitarian government can control because there are not any checks or balances placed on the leaders of the country. Essentially, totalitarian leaders can do whatever suits their agenda and say anything that comes to mind.

Citizens are stripped of all freedoms in totalitarian countries. Denial of the right of free speech will usually include a ban on freedom of the press. Ideologies, beliefs, and religions may even be highly curtailed or absolutely forbidden in a totalitarian country. The national government has full and total control. Totalitarian leaders often rule through fear because they take advantage of citizens’ emotions in order to keep them from revolting and protesting. When you live in fear, you do not know how to speak out against injustices because you are scared. It becomes a matter of staying silent in order to stay alive, and totalitarian rulers know this. In fact, they thrive off of this natural human instinct. To reinforce the idea that citizens must show complete alliegance and compliance with the government, totalitarian leaders typically have security forces, some secret, that ensure citizens do not fall out of step. In some totalitariam countries, certain religious minorities and political groups by the security forces. Expressing dissent toward government decisions and actions is strictly prohibited in these countries. Although liberal democracies pride themselves with regard to the way people can form and express their own reactions to the government, people who live in totalitarian regimes must agree with everything the government does, says, and enforces. Outward expressions of disagreement are forbidden. By these qualifications, China certainly could be viewed as a totalitarian state. Audi vide, tace, si vis vivere in pace. (Use your ears and eyes, but hold your tongue, if you would live in peace.)

Senior executives and managers of the MPS and MSS are mutually responsible for creating tranquillitas ordinis—the tranquility of order. That is indeed a charitable perception of their work, especially MPS, which has a history using brutal methods in the name of establishing law and order. It would seem that between the two intelligence services, there has been the some successful creation of a figurative cross organizational masonry through which fruitful communication, agreements, and interoperability can be shaped and facilitated. One might imagine establishing that order has rested in efforts such as obliging both MPS and MSS to mutually keep each other informed of developments. One could hardly imagine that one organization steps on the figurative toes of the other by suggesting anything as grand as using an alternative strategy in an ongoing investigation of an individual or group of individuals would occur. At this stage, MPS does not desire to share the anxieties of MSS, and visa-versa. There would appear to be enough for both organizations to do. Further, sources of funding and support for both derive from specified sources, leaving little need to struggle for means. Periclum ex aliis facito tibi quod ex usu siet. (Draw from others the lesson that may profit yourself.)

The Case of a NYPD Officer Allegedly Engaged in Intelligence Activities for China Spotlights the United Front Work Department

The People’s Republic Consulate in New York City (above). According to a US Department of Justice criminal complaint, New York City Police Department officer, Baimadajie Angwang, allegedly acted at the direction and control of officials at the People’s Republic Consulate in New York City.  Specifically, the NYPD officer allegedly reported on the activities of Chinese citizens in the New York area, spotted and assessed potential intelligence sources within the Tibetan community in New York and elsewhere, and provided Chinese officials with access to senior NYPD officials through invitations to official events. One of the Consulate staff members at whose direction Angwang allegedly acted, was an official from the “China Association for Preservation and Development of Tibetan Culture,” a division of the People’s Republic of China United Front Work Department.

On September 21, 2020, the US Department of Justice filed a criminal complaint against Baimadajie Angwang, a naturalized American citizen who serves as a member of the New York City Police Department (NYPD) and the US Army Reserve has been charged with acting as an illegal agent of China. The criminal complaint explains that Angwang reportedly acted at the direction and control of officials at the People’s Republic Consulate in New York City.  Specifically, the NYPD officer reported on the activities of Chinese citizens in the New York area, spotted and assessed potential intelligence sources within the Tibetan community in New York and elsewhere, and provided Chinese officials with access to senior NYPD officials through invitations to official events.  One of the Consulate staff members at whose direction Angwang allegedly acted, was an official from the “China Association for Preservation and Development of Tibetan Culture,” a division of the People’s Republic of China United Front Work Department. That department is responsible for, among other things, neutralizing potential opponents of the Chinese government and co-opting ethnic Chinese individuals living outside China. In their criminal complaint, prosecutors explain that Angwang was explicit about his motivations, telling his Chinese contact that he wanted to get promoted within the NYPD so that he could assist China and bring “glory to China.”  Further, Angwang told his contact that his superiors in Beijing “should be happy . . . because you have stretched your reach into the police.” In addition to being charged for acting as an illegal agent of China, Angwang was also charged with committing wire fraud, making material false statements and obstructing an official proceeding.  Reportedly, as part of his employment with the US Army Reserve, Angwang maintained a “SECRET”-level security clearance.  According to court documents, in 2019, Angwang completed and electronically submitted an SF-86C form for a background investigation.  On the form, Angwang lied by denying that he had contacts with a foreign government or its consulate and by denying that he had close and continuing contacts with foreign nationals, including his family members who live in China, some of whom were affiliated with the Communist Party of China and the People’s Liberation Army. In accord with the charges in the criminal complaint against Angwang, if convicted, he could face a maximum of 55 years imprisonment.

It appears that Angwang’s guilt was never in doubt to the US Department of Justice. It was apparently not an astounding challenge to pursue Angwang, based on what is reported in the US Department of Justice criminal complaint against him. Although a confession covering Angwang’s behavior was captured, enough incriminating evidence used against Angwang for the espionage charge was found in recordings of telephone conversations between him and an official of the People’s Republic of China Consulate in New York. Yet, while on the surface, the case, intriguingly, did not reach some great proportions of espionage, with nefarious entanglements with sinister civilian or military Chinese foreign intelligence officers and daredevil thefts of information of the utmost importance, violent plots, or high speed chases, there is far more to it that meets the eye concerning a very dangerous threat to the national security of the US.

In a reappraisal of the espionage aspect of the case outlined in the US Department of Justice criminal complaint, greatcharlie brings to the fore the fact that case involves the seldom discussed activities of one of Communist Party of China’s largely unnoticed  intelligence organizations. In this particular instance, the organization identified was the United Front Work Department. The discussion of the United Front Work Department and its operations in the criminal complaint is limited.. As such, it does not allow for an understanding of how the United Front Work Department, despite its relative obscurity, has a high place within the Communist Party of China’s hierarchy. It fails to create a picture of the nature and scale of the operations of the organization and the Communist Party of China in general inside the US. From a discussion in the abstract, greatcharlie, provides a somewhat more detailed look at the organization, its intelligence role, and the important place it holds within the large-scale systematic plan of the Communist Party of China to become the world’s dominant power. Using the facts of Angwang’s activities in the criminal charge, greatcharlie then postulates on the possible interplay between Communist Party of China intelligence elements and civilian and military Chinese foreign intelligence services with specific regard to Angwang’s contacts with the People’s Republic of China Consulate in New York. In turn greatcharlie hypothesizes, absent any templates or manuals, on how those intelligence services likely interact on cases in diplomatic posts generally. The acts allegedly performed by Angwang on behalf of the United Front Work Department were not monumentous. However, the course of Angwang’s work as an operative for the organization and the actions of the organization’s official posted at the Consulate in New York with whom he was in contact, as reported in the criminal complaint, allow one to draw insights on the organization’s practices on a case with such circumstances. From those reports and insights, greatcharlie postulates, to a small degree, how the tactics, techniques, procedures, and methods of “regular” Chinese intelligence services compare and contrast from those of irregular Communist Party of China intelligence organs. Angwang’s case is made even more intriguing due to the many incongruities and outright oddities apparent in the activities of the parties involved in the matter. A number of them are given brief treatment.

Corruptio optimi pessima. (Corruption of the best is the worst.) In a US Department of Justice September 21, 2020 Press Release on the criminal charges leveled on Angwang, the fact that he was a NYPD officer involved in Chinese foreign intelligence activity was looked upon as a new, frightful phenomenon, which should put municipal police departments across the country on alert. However, what has really been put in the spotlight by the case is the reality that the United Front Work Department, essentially an intelligence organization promoted and well-supported by the very top of the Communist Party of China’s leadership, is very present and may eventually become more active in its unique ways in the US. Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.)

Police Officer Angwang in NYPD uniform (above). In a US Department of Justice September 21, 2020 Press Release on the criminal charges leveled on Angwang, it was noted that because he was a NYPD officer involved in Chinese foreign intelligence activity, his case should was looked upon as a possible  new, frightful phenomenon, that should put municipal police departments across the country on alert. However, what has truly been put in the spotlight by his case is the reality that the United Front Work Department, essentially an intelligence organization promoted and well-supported by the very top of the Communist Party of China’s leadership, is present in the US and may eventually become more active in its unique and nefarious ways in the country.

Developing New Perspectives

For greatcharlie, it is an absolute requirement to be careful before imputing reasons why one might engage in certain behavior on a matter without having all the hard facts about the individuals thinking at hand. Certainly, there was no psychological profile of Angwang included in the criminal complaint, and there very well should not have been. One could present multiple possibilities concerning the intent of Angwang’s behavior, each with certain ambiguities. The well-fashioned theory behind the criminal case of the US Department of Justice would be one among them. While prosecutors appear to have confidence in their case, even included in the US Department of Justice Press Release was a clearly explained caveat that the charges in the complaint are merely allegations and the defendant is presumed innocent unless and until proven guilty. The NYPD officer’s defense attorneys surely intend to have a great say in how his case goes.

Looking at the whole matter simplistically, one might also make the argument that Angwang’s Consulate contact may have genuinely believed initially that his connection with the NYPD officer may have been simply collegial. Perchance he assumed that contact with the People’s Republic of China Consulate in New York had special meaning for Angwang. The may have also thought that for Angwang, interaction with the Consulate stirred a sense of importance or satisfaction within him that was unique to his sensibilities. Further, Consulate official with whom Angwang had the most contact, may have simply been serving as a member of the Consulate who was engaged in outreach activities in the Tibetan community as part of his duties. For the official, It may have initially seemed fortuitous wind fall that an NYPD officer,who metaphorically fell into his lap, was willing to use his own time and energy to help them with his outreach efforts. (He  would hardly view his interaction with Angwang a stroke of luck now.)

Stoicius noster, “Vitium,” in quite, “non est in rebus sed in animo.” (Our Stoic philosopher said, “Vice is not merely in one’s actions but in the mind itself.”) It is hard to discern what Angwang really hoped to achieve by working for the People’s Republic of China Consulate in New York while serving as an NYPD officer. Although his antics had escaped detection, at least initially, for the reasonable, there could hardly have been any doubt that he would be caught given the intense scrutiny being placed upon China’s diplomatic stations by US counterintelligence services. As an NYPD officer, working with the Chinese diaspora, one would imagine he would have come across aspects and elements of the federal government’s close watch. One might theorize that for over two years, and during a three year period prior, he may have very well have immaturely believed that he was engaged in an ego-driven battle of wits, leveling his superior intellect upon a loyal servant of China’s Communist regime and his bosses ruling from Beijing. Indeed, Angwang may have believed that by insinuating himself into the Chinese government system, he would put himself in good stead with NYPD officials and top individuals in federal law enforcement and perhaps have value to them as a “counterespionage agent ” Under this scenario, the Angwang presumably would also want to believe that Consulate officials were in the dark about what he might have been cooking up against them. These respective scenarios for both Angwang and the officials of the People’s Republic of China Consulate in New York, with whom he interacted, appear unlikely. Angwang’s legal defense would likely insist that one must not confuse the unlikely with the impossible. In the aggregate, the facts as presented by the US Department of Justice indicate the situation is far more complicated. To examine them, it becomes necessary to better understand the two parties involved in the case:

On Angwang

Laying out what the Federal Bureau of Investigation (FBI) had collected on Angwang, the criminal complaint reveals that at the time he was charged, he was 33 years old. Angwang is a native of Tibet. Tibet is an autonomous region in the PRC. The region has historically been the home to ethnic Tibetans, among others ethnic groups. It is the spiritual home of Tibetan Buddhism and the traditional seat of the Dalai Lama. China  has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide, to include the US. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability. Interdum volgus rectum videt, est ubi peccat. (At times the world sees straight, but many times the world goes astray.)

Angwang initially traveled to the US on a cultural exchange visa. He overstayed a second visa, but eventually applied for asylum in the US on the basis that he had allegedly been arrested and tortured in the China due partly to this Tibetan ethnicity. While arguing against bail, prosecutors suggested in a court filing that Angwang secured his US citizenship under false pretenses. Interestingly enough, Angwang’s father is retired from the People’s Liberation Army and is a member of the Chinese Communist Party. His mother is a retired government official and also a member of the Communist Party. His brother serves as a People’s Liberation Army reservist. All three live in China.

Employed by the NYPD, Angwang reportedly was assigned to the 111th NYPD Precinct in the borough of Queens and worked there during his most recent period of contacts with the People’s Republic of China Consulate in New York. At the 111th Precinct, Angwang served as a patrol officer and member of the precinct’s crime prevention team. His latest assignment was in the community affairs unit in which his duties included serving as a liaison between the NYPD and the community that his precinct served, among other things. The only plausible reason for Angwang to have any connection with People’s Republic of China Consulate in New York as it relates to his work is that the Tibetan community in New York City which predominantly resides within the confines of the 111th NYPD Precinct in which Angwang worked. Angwang is also a member of the US Army Reserve in which he presently holds the rank of Staff Sergeant. He has been assigned to an Airborne Civil Affairs battalion based at Fort Dix, New Jersey. In his job as a Civil Affairs Specialist his duties and responsibilities include advising the command on the tactical and operational deployment of Civil Affairs teams. He also assisted in planning, training, advising and executing civil-military programs. In connection with his role in the US Army Reserve, as mentioned earlier, Angwang holds a “SECRET” level security clearance. Added to this record should have been information provided by the US Army that Angwang served on active duty in the US Marines from 2009 to 2014, and his deployment to Afghanistan from 2013 through 2014.

Angwang’s Consulate Contacts

According to the criminal complaint against Angwang, he received taskings from, and reported back to, officials at the People’s Republic of China Consulate in New York via telephone conversations which were recorded by the FBI. Those telephone calls enabled the FBI to identify his most recent Consulate contact as an official from the China Association for Preservation and Development of Tibetan Culture. The criminal complaint explains that the China Association for Preservation and Development of Tibetan Culture is a division of China’s United Front Work Department (“UFWD”). Among the UFWD’s tasks is neutralizing sources of potential opposition to the policies and authority of China. To achieve these goals abroad, the UFWD reportedly seeks to co-opt ethnic Chinese individuals and communities living outside China. UFWD officials often meet with local association groups whose purpose is to, among other things, connect Chinese emigrants from common geographic areas and ethnic backgrounds. Ostensibly, their purpose in meeting with these groups is to secure political, moral and financial support for China and to maintain control over Tibetans and other so-called potentially problematic groups, such as religious and ethnic minorities.

From recorded conversations of Angwang and the UFWD official, a portion the transcripts of which were placed in the criminal complaint, the FBI has determined that Angwang received tasks from, and reported back to him. The FBI, in fact, identified the UFWD official as Angwang’s handler. Even more, FBI’s investigation has revealed that Angwang, while acting at the direction and control of PRC officials, had, among other things, (1) reported on the activities of ethnic Tibetans, and others, in the New York metropolitan area to the Consulate, (2) spotted and assessed potential ethnic Tibetan intelligence sources in the New York metropolitan area and beyond, and (3) used his official position in the NYPD to provide Consulate officials access to senior NYPD officials through invitations to official NYPD events. None of these activities fell within the scope of Angwang’s official duties and responsibilities with either the NYPD or the US Army Reserve. Angwang both called and texted a UFWD official’s cellular telephone on at least 55 occasions in or about and  between June 2018 through March 2020. While performing these activities, Angwang failed to provide the Attorney General with any notification that he was acting as an agent of China by registering as such. The US Department of Justice Foreign Agents Registration Unit has no records associated with Angwang.

Curiously, Angwang also had contact with the People’s Republic of China Consulate in New York from August 21, 2014, through August 11, 2017. Those contacts took place apparently without incident or significant interest of US counterintelligence services or the US Army Reserve. It must be reminded that was a period of time prior to his becoming a NYPD officer. It was not an issue for the NYPD. It was imaginably unaware of those contacts, and Angwang apparently did not reveal them. At that time, Angwang reportedly called and texted the cellular telephone of a Consulate official, dubbed PRC [People’s Republic of China] Official-1, on at least 53 occasions. The criminal complaint’s discussion of Angwang’s contacts and activities connected to the Consulate is limited. The period of his contacts with the Consulate from June 2018 through March 2020 is referred to in the criminal complaint as “the relevant time period.” The latest contacts have been severed from Angwang’s nearly three years of initial contacts with the People’s Republic of China Consulate in New York. That is quite intriguing.

A Map of China. Tibet is in the country’s southwest (above).Tibet is an autonomous region in China. The region has historically been the home to ethnic Tibetans, among others ethnic groups. It is the spiritual home of Tibetan Buddhism and the traditional seat of the Dalai Lama. China  has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide, to include the US. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans.

The narrative on Angwang in the criminal complaint provides a succinct summary of his background, particularly as it relates to his case. However, the narrative on the officials in People’s Republic of China Consulate in New York with whom Angwang was in contact, while making for an intriguing backstory, surely it does not provide the full picture of the organization in which at least one official supposedly worked, the UFWD. Indeed, the description of the UFWD in the criminal complaint is an underestimation of the organization to  a degree that it stands as a singular departure from the real UFWD. Yet, remarkably, what is provided in the criminal complaint is more than one might usually come across on the UFWD. The UFWD has not received an abundance of treatment in scholarly sources. Even those well-informed on Chinese affairs are not so attentive of the inconspicuous organization and its activities. In I.G. Smith’s and Nigel West’s reliable Historical Dictionary of Chinese Intelligence (Rowman & Littlefield, 2012), the UFWD is only briefly and with frightfully scant detail referenced as a branch of the Communist Party of China’s Central Committee, responsible for links with non-Communist émigré groups and has been identified by the Canadian Security Intelligence Service (CSIS) as an espionage organization active among Chinese émigrés and engaged in psychological warfare in pursuit of policy goals set by the Ministry of Foreign Affairs. What is left of the reference explains: “According CSIS analyst described the UFD’s [UFWD’s] role as ‘one of the compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats.’“ As mentioned in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 1),” central to greatcharlie’s understanding of China’s intelligence services and their activities are the writings of Peter Mattis. Since leaving the Central Intelligence Agency where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant. Primarily using sources published by Mattis, an effort is made here to provide a truer picture of the overlooked UFWD.

The Real UFWD

The UFWD holds a high place within the Communist Party of China’s hierarchy as a working organ of the Communist Party of China’s Central Committee, which is “the central administrative and decision-making body of leading party, state, and military officials.” The UFWD exerts influence inside and outside of China through sub-official contacts. Within China, the UFWD plays a vital policy development and coordination role, especially for ethnic and religious minorities. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. That has been evinced by Xi’s repeated urging that the Communist Party of China make use of the UFWD as a “magic weapon” to realize the Great Rejuvenation of the Chinese People. A bureaucratic reorganization that he has implemented lends further credence to this judgment that it is a tool of the utmost importance.

According to Mattis, the central element to understanding what the Chinese Communist Party is doing and why to shape the world outside the party is united front work. People’s Republic of China Chairman Mao Zedong described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a paper in the 1950s, the Central Intelligence Agency (CIA) defined united front work as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the party. To that extent, as Mattis explains, united front work entails shaping those outside the party, and not simply the Chinese people or world outside the People’s Republic of China. United front work must also be a tool of political struggle. It is not confined to activities that we would call propaganda or public diplomacy. It is not limited to covert action. In 1939, Mao wrote: “Our eighteen years of experience show that the united front and armed struggle are the two basic weapons for defeating the enemy. The united front is a united front for carrying on armed struggle. And the Party is the heroic warrior wielding the two weapons, the united front and the armed struggle, to storm and shatter the enemy’s positions. That is how the three are related to each other.” That outline of united front work within the party’s toolbox by Mao stands as the core understanding within the Communist Party of China today. United front activities have aided the Communist Party of China in resolving several dilemmas of the post-Mao era. That was most apparent following the Tiananmen Square Massacre and the death of Chairman Deng Xiaoping.

The UFWD is the executive and coordinating agency for united front work. The UFWD operates at all levels of the party system from the center to the grassroots. Sun Chunlan heads the UFWD, assisted by seven deputy directors. The leadership also includes the leader for the Central Commission on Discipline Inspection for United Front Work Group. The UFWD’s areas of responsibility both at home and abroad include: Hong Kong, Macao, and Taiwan affairs; ethnic and religious affairs; domestic and external propaganda; entrepreneurs and non-party personages; intellectuals; and people-to-people exchanges. There are UFWD subordinate elements at the provincial and local levels. The department also takes the lead in establishing party committees in Chinese and foreign businesses. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. Bureaus three, six and nine, for example, cover Hong Kong, Taiwan, Overseas Chinese, Tibet and Xinjiang. However, it is unclear how different bureaus manage their consequently overlapping responsibilities. For instance, there is no clear guideline on how the Tibet Bureau, responsible for “harmonizing Tibetan socioeconomic development,” interacts with the Ethnic and Religious Work Bureau, and the Economics Bureau.

The UFWD is one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three include the Chinese People’s Political Consultative Conference (CPPCC), the super secret and malignant International (Liaison) Department, and the Propaganda Department. According to the organization’s website, the CPPCC is “an organization in the patriotic united front of the Chinese people, an important organ for multiparty cooperation and political consultation.” The advisory body mediates between important social groups and the party apparatus. The CPPCC is the place where all the relevant united front actors inside and outside the party come together: party elders, intelligence officers, diplomats, propagandists, military officers and political commissars, united front workers, academics, and businesspeople. They are gathered to receive instruction in the proper propaganda lines and ways to characterize Beijing’s policies to both domestic and foreign audiences. Many of these individuals, particularly if they hold government positions, are known for their people-handling skills and have reputations for being smooth operators. CPPCC membership offers access to political circles, political protection for business, and minor perquisites like expedited immigration. The CPPCC standing committee includes twenty or so vice chair people who have a protocol rank roughly equivalent to a provincial party secretary. At the central level, the CPPCC includes more than 2,200 members, but the provincial and local levels include another 615,000.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above). The UFWD holds a high place within the Communist Party of China’s hierarchy as a working organ of the Communist Party of China’s Central Committee. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. President Xi Jinping has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. That has been evinced by Xi’s repeated urging that the Communist Party of China make use of the UFWD as a “magic weapon” to realize the Great Rejuvenation of the Chinese People. The bureaucratic reorganization that he has implemented lends further credence to this judgment that it is a tool of the utmost importance.

The International (Liaison) Department, founded in 1951, is the party’s diplomatic arm, handling relationships with more than 600 political parties and organizations as well as individual, primarily political, elites. The department previously handled the Communist Party of China’s relationships between fraternal Communist parties and cultivated splinter factions of Moscow-dominated Communist parties after the Sino-Soviet split. The activist bent of the International Department disappeared as the department began re-establishing itself from 1970 to 1971 following the tumultuous early years of the Cultural Revolution. Indeed, in the 1970s, as Anne-Marie Brady explained in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the International (Liaison) Department’s intelligence efforts often surpassed and even outmatched those of regular Chinese intelligence services. It became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies and guerrilla movements worldwide. Interestingly, the department originated as an UFWD bureau before being carved out into an independent entity.

Mundus vult decipi, ergo decipiatur. (The world wants to be deceived so let be deceived.) The Propaganda Department has been a core part of the Communist Party of China since 1924. The official description of its duties includes conducting the party’s theoretical research; guiding public opinion; guiding and coordinating the work of the central news agencies, including Xinhua and the People’s Daily; guiding the propaganda and cultural systems; and administering the Cyberspace Administration of China and the State Administration of Press, Publication, Radio, Film, and Television. Much as the UFWD, the Propaganda Department has subordinate elements at the provincial and local levels. The Propaganda Department cannot be regarded as an entirely internal organization that broadcasts outward to the extent that it is involved in influence-building abroad. For example, China Radio International developed in the 2000s a covert international network of radio stations to hide the Communist Party of China’s direct role in broadcasting Chinese-language propaganda inside target countries. The Propaganda Department presumably also plays a role in the cooptation, intimidation, and purchase of Chinese-language print media outside China.

The State Council ministries and many other organizations with a party committee also conduct united front work. These organizations all offer unique platforms and capabilities that the united front policy system can draw upon for operational purposes. Below are a few of the examples of the organizations outside the party that perform united front work or have united front work departments attached to their party committee: Ministry of State Security; Ministry of Foreign Affairs; Ministry of Civil Affairs; Ministry of Education; Ministry of Culture and Tourism; Chinese Academy of Sciences; China Baowu Steel Group; China National Overseas Oil Corporation (CNOOC); and, State-owned Assets Supervision and Administration Commission (SASAC). While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance. United Front organizations abroad often operate in the open, some with names that allude to “peaceful reunification” (which is understood to be code for Taiwan work) or include “friendship association.” Included on that list is likely the name “China Association for Preservation and Development of Tibetan Culture,” the organization in which the UFWD official with whom Angwang interacted “in the relevant time period” was employed.

Evaluated on the basis of the united front policy system, the Communist Party of China’s management of political influence operations runs to the very top of the party, involving senior leaders directly. The policy system extends through the party’s hierarchy and spills over into China’s government ministries as well as other state-owned and state-administered organizations. Indeed, united front work is conducted wherever the party is present. To that extent, as Mattis explains, united front work is not an “influence operation” or a campaign. It is the day-to-day work of the party. At the leadership level, there is a Politburo Standing Committee Member (PBSC) oversees united front work. The senior-most united front official is the Chinese People’s Political Consultative Conference (CPPCC) chairman, who is the fourth-ranking PBSC member. Leaders who have held the CPPCC chairmanship have included Mao and Deng, as well as Zhou Enlai and Li Xiannian. The State Council Vice Premier has a United Front Portfolio. The vice premier position serves as the link between the party center and the State Council ministries. The vice premier provides prestige to the united front system as well as a necessary position of authority to direct and coordinate the ministries’ united front activities. The position often looks as though the portfolio covers education and culture, because of the overlap with united front work. At meetings of the united front policy system, this vice premier appears in protocol order between the CPPCC chairman and the United Front Work Department director. Included are two Members of the Central Secretariat who have united front policy roles. The directors of the UFWD and Propaganda Department serve on both the Politburo and the Secretariat of the 19th Central Committee of the Communist Party of China. Since the Politburo does not meet regularly, the secretariat is empowered to make day-to-day decisions related to policy that has already been settled. This group is also responsible for moving paperwork among the central leaders and coordinating the party’s actions.

The Calibrated Interactions between Angwang and His Alleged UFWD “Handler”

Given what is presented here about the UFWD, and given the official account of the UFWD official’s interactions with Angwang provided in the criminal complaint, the UFWD official certainly suppressed far much more about his organization and its activities in their conversations than he exposed. Even in his discussions with Angwang, the UFWD official never offered specifics as to why his organization would be interested in working with him. He never discussed the names or titles of the UFWD officials over which Angwang probed him. Interestingly, the UFWD official assumedly never offered Angwang many specifics about his job with the China Association for Preservation and Development of Tibetan Culture in the Consulate or its link to UFWD. Moreover, the UFWD official never explained that UFWD was his association’s parent organization and what the larger picture and aims of his parent organization were. It is unknown whether the UFWD official asked Angwang directly about his interest in keeping contact with him. Angwang offered the attenuated explanation about love for his homeland, bringing glory to China, and making the official “look good” in Beijing.

Major ignotarum rerum est terror. (Apprehensions are greater in proportion as things are unknown.) Out of abundance of caution, the first impression of Angwang that the UFWD official might reasonably have been more negative than positive. In the US, it is understood that the majority of the members of the Tibetan diaspora harbor unfavorable, even hostile attitudes toward China. As a native Tibetan who reached a position of relative authority in New York as an NYPD officer, his intentions for reestablishing contact with him could not be accepted on face value. (Little is offered in the criminal complaint on his first contact.) Given the harm done to countless Tibetan families in China, it would be fair to assume Angwang could have held some idée fixe against Chinese government and was in some odd way seeking revenge. In fact, according to the criminal complaint, when Angwang first traveled from China to the US on a cultural exchange visa, he later sought asylum, claiming that he had been arrested and tortured in mainland China because of his Tibetan ethnicity. (That story apparently cannot be confirmed, and the US Department of Justice says it is doubtful.) As an NYPD officer, he would have the training and access to tools that allowed him to pose a considerable threat to the UFWD official and other staff at the People’s Republic of China Consulate in New York. After the UFWD official maintained contact with Angwang for a time, possible concerns about him may have been relaxed.

Based on his own words, as recorded by the FBI, Angwang fully intended on, and was satisfied with, establishing contact with the UFWD official to support China’s intelligence efforts in the US. He approached the UFWD official under the veneer of being an important, well-placed, and well-connected officer in the NYPD, but it was likely discerned by the UFWD official that Angwang was somewhat isolated. The presumption could plausibly have been made by the UFWD official that Angwang’s conversations and contacts with the officials at the People’s Republic of China Consulate in New York surely transgressed the NYPD’s code of behavior. An NYPD officer under normal circumstances, surely would not have been allowed such a long leash as to be able to negatively influence, harm US relations with China. The fact that his activities escaped the curiosity of onlookers perhaps misled Angwang into believing that he was free and clear of scrutiny. He possibly could not have imagined at the onset the upheaval that would eventually derailed him. Yet, he was under investigation by the FBI and apparently was blissfully unaware that his contacts and conversations with Chinese officials were being monitored. There was a display of flurried ambition and energy in Angwang’s actions, all of which was misdirected. To that extent, on first blush, UFWD official may have considered whether Angwang was excited by his own actions, and thereby may have assessed whether he was a sensation seeker.

A ruthless disregard of anything but self-interest is a common trait among individuals involved in espionage cases. However, Angwang seemed to strain in his effort to demonstrate that he was not focused on self-interest and to gain approval. Apparently, in a further effort to prove that he was focused on the well-being and success of the Consulate officials in which he was in contact, the Consulate, and China, Angwang made statements seemingly in an effort to prove that he knew all the ends and outs, the inside baseball of the Chinese government. In an account of a telephone conversation on or about October 30, 2018 between Angwang and the UFWD official, again dubbed as “PRC Official-2,” that was only recounted by the FBI in the criminal complaint, the UFWD official reportedly told Angwang that he was busy writing mandatory year-end reports. Angwang replied that UFWD official had done great work and, accordingly, there should be a lot to write in the report. Prying, Angwang also inquired if the reports written by officials within the Consulate were the same type of reports written by China based officials, to which the UFWD official stated that they were. Reportedly, Angwang stated that he was familiar with these reports because his mother used to write similar reports in China.

Perhaps going a bit too far in direction demonstrating what he knew, Angwang was willing to offer a judgment on every aspect of the Consulate staff member’s community outreach work, and he severely judged it at that. Boiled down, it appeared at point that Angwang was communicating: “You do not know your job as well as I do. Let me show you. I can help you do your job so much better that your superiors in Beijing will be impressed and reward you!” Reportedly, on or about November 19, 2018, UFWD official, dubbed “PRC Official-2” in the criminal complaint, called Angwang. (It is unknown whether he was actually returning a call from Angwang.) During the call, as recounted by the FBI, Angwang asked the UFWD official whether he wanted to attend NYPD events “to raise our country’s soft power” and also elevate the official’s position within the People’s Republic of China community. It was additionally recounted and interpreted by the FBI that the UFWD official expressed interest. Angwang then offered: “The Consulate does not know too clearly the workings and operations within the police department. And then because of the sensitivity of a diplomat’s position . . . then this, now, if it’s like this, I’m thinking of how to, how to use this opportunity, to use our er . . . one is to let the consulate to feel like us before . . . the wishes are the same as my wishes.” As interpreted by the FBI, Angwang was informing the UFWD official that he could provide non-public information regarding the internal operations of the NYPD. In the same call, it is reported in the criminal complaint that Angwang indicated that he wanted UFWD official to advance to a position of prominence.

Curiously, from what is available in the transcripts included in the criminal complaint, Angwang would never humble himself. When the Consulate official humbled himself, Angwang seemed to view it as an occasion to seek greater dominance in the conversation and in the relationship. During certain telephone contacts, he appeared to demand that the UFWD official humble himself to him. Angwang did not seem to recognize or respond to the fact that UFWD official was likely making an effort to remain tolerant of his repeated overstep of cultural and professional boundaries. He just seemed to want to have control. On or about October 30, 2018, Angwang called the UFWD official, again, dubbed as PRC Official-2 in the criminal complaint. During that call, as recounted by the FBI, Angwang advised UFWD official about a new Tibetan community center located in Queens. Angwang suggested that he and the UFWD official should visit the community center together. As recounted by the FBI, the UFWD expressed concern, but Angwang stated, “if it’s good or not, you need to know about this for your work’s sake. They are the biggest venue for activities right now. If they are involved with politics, then in the future more than half of the meetings might take place there.”

It is very possible that taking what was an abrupt, energetic approach, was an odd way for Angwang to gain the UFWD official’s approval. He perhaps was attempting to  show them how knowledgeable he was about the inner workings of their system. Moreover, he likely sought to bedazzle the UFWD official. In his mind, he may have believed the UFWD official was a flutter at his every word. Yet, it was rarely the case that anything Angwang said appeared to enlighten the UFWD official in any appreciable way. Veritatis simplex oratio est. (The language of truth is simple.)

Even beyond the issue of his contacts with the People’s Republic of China Consulate in New York, it is generally mistake for one, as an outsider, to try to convince those inside an organization, particularly a tight-knit organization, that one knows more about its inner workings and activities, than one actually does. Those inside will generally become suspicious of the outsider’s intentions which would most likely confound any effort to build confidence and establish trust. For whatever reasons he had, the attitude and behavior displayed by Angwang, in part, may have played a role in the undoing of his efforts. If the NYPD officer authentically wanted to connect with the UFWD official and his superiors in Beijing, then all efforts made presumably in the direction of impressing any of them in this manner could be judged as a grand blunder.

With specific regard to Angwang’s oft uttered remark that he wanted to make the UFWD official look good before his superiors in Beijing, that faux pax actually betrayed his misunderstanding of how the Chinese system worked. Those selected for deployment to those posts are usually from the top of a short list of the most qualified officials in a particular organization. if the UFWD official has not already proved himself to his superiors, he would not have received the privilege of being posted to the People’s Republic of China Consulate in New York. it is likely that Angwang may have appeared to him to be dramatic and theatrical, yet at the same time boorish. With no intent to insult, nothing displayed in the transcripts provided would have left the impression that Angwang was a masterful thinker. It may have very well been the case that the UFWD official’s intellectual powers far surpassed the opportunities in which he was presented to use them in New York. His encounters with Angwang might serve as evidence of that. Yet, while he was likely studying and judging Angwang, and surely masquerading as an august representative of the People’s Republic of China, the UFWD official was in reality a functionary of an organization that would certainly be willing to burn down the rest of world if it meant promoting the interests and goals of the Communist Party of China.

Sun Chunlan, head of the UFWD (above). Sun Chunlan directs the UFWD, assisted by seven deputy directors. The leadership also includes the leader for the Central Commission on Discipline Inspection for United Front Work Group. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance. United Front organizations abroad often operate in the open, some with names that allude to “peaceful reunification” or include “friendship association.” Surely included on that list is the “China Association for Preservation and Development of Tibetan Culture.”

As it concerned his UFWD mission in New York, the UFWD official’s opinion of Angwang  was not as relevant as those of his superiors in Beijing. If they wanted him to work with Angwang, that is what he would do. Senior executives and managers of the UFWD in Beijing would collate and validate intelligence, evaluating the reliability of sources and credibility of information, use various analytical techniques to assess and interpret any intelligence data, and liaise and collaborate with colleagues to gather further information, which may help to piece together the whole picture. They would determine whether a target had genuine potential to be an operative. As it so happened, It appears that in Beijing, approval of him was likely lukewarm. To the extent that might be accurate, it might be the reason why the UFWD official appeared to keep his relationship with Angwang limited in scope. The fact that they spoke on the phone and did not appear to meet in person may be an indication that the UFWD official was likely keeping Angwang at arms length. After two years, Angwang was figuratively treading water. He was never able to cement a solid link to the UFWD official that would lead to additional contacts with UFWD senior executives and managers in Beijing. Angwang’s true value, despite his decent background of accomplishments as a Tibetan émigré, may have been viewed as very low by the UFWD official as everything that he offered to provide could very likely have been collected at far less risk and anxiety from other sources.

Looking at the matter more carefully, the whole notion of Angwang providing access to top NYPD officials not only failed to make sense or seem plausible, it would appear to be something the UFWD offical would not find desirable. It is very hard to imagine how any top officials of the NYPD, to whom Angwang claimed to have had the ability to provide access, would be of any use to the UFWD official. The Consul General and his top subordinates in the People’s Republic of China Consulate in New York had sufficient ways to communicate with the NYPD in a manner officially approved by Beijing. The UFWD official would surely have been well out of his lane if he had met with such NYPD higher ups from his position, and more than likely disturb the bigger picture of People’s Republic of China Consular affairs in New York. It is hard to image why the UFWD official would want to have contact with NYPD officials with far more experience than Angwang, make them very aware of his presence in the Consulate and the city, and bring to bear their impressions of himself, the UFWD, and Angwang’s odd history of contacts with the Consulate and with him. They would surely see the UFWD official straight. Unlike Angwang, who jumped in twice to have contact with the People’s Republic of China Consulate in New York, top officials in the NYPD, possessing far more experience and being undoubtedly more mature and savvy than him–Angwang had scarcely marked two years of service in the department–would more than likely have concluded that becoming entangled with the Consulate and especially getting involved with a UFWD official, would neither be wise nor sound. They very likely would have become terribly alarmed by the request. Using good sense, they may have demanded that Angwang, himself, break all contact. Then, they might have thrown a huge spotlight on the UFWD official and informed not only their superiors and the NYPD Intelligence Division, but also US counterintelligence services about his presence and the direct attempt via Angwang to contact them. As for Angwang, his NYPD career would very likely have seen dark times. Additionally, no matter what level of relationship and confidence any top NYPD official might have had in Angwang that might have led the neophyte NYPD officer to reason that he could arrange some one-on-one interaction between that official and his UFWD contact, the reality is that, even for personal reasons, no top NYPD official would ever put his or her career at risk with any unofficial, unauthorized contacts with the People’s Republic of China Consulate in New York and the UFWD. Top NYPD officials often retire from the department and acquire very rewarding senior positions in the corporate world. To errantly follow Angwang’s recommendation and put themselves in contact with the People’s Republic of China Consulate in New York and the UFWD, could have very likely blemished their records, making any future corporate position unattainable. Given their rather neat situations, doing anything Angwang might have suggested would have been a singular act of stupidity.

One might go as far as to theorize that by all appearances Angwang may have actually been rejected by UFWD. Relative to what the UFWD may have asked of someone they might have been eager to work with, his contacts were rather prosaic. He was a volunteer of his own making, no training in tradecraft, no direct instructions. For “the relevant time period,” there is no word of payments, no mention of recompense in the form of gifts. Apparently, there was nothing asked for in trade. Angwang was not encouraged, yet not discouraged from continuing on with his volunteer work. It is not clear cut that the UFWD official never insisted that Angwang do anything. If it ever appeared that he was giving him any directions, it took the form of giving a begrudging nod to something Angwang had both suggested and volunteered to do. Nothing that Angwang did was of any momentous consequence in the end. Whatever efforts Angwang made, were activities well-off on the margins, having a diminutive impact on the UFWD mission and the People’s Republic of China Consulate in New York’s overall mission. In fact, his activities actually fell somewhat outside of the primary purpose of UFWD activities.

As explained in greatcharlie’s discussion of UFWD here, unlike Chinese intelligence services as the Ministry of State Security and the PLA’s Second Department, the organization is not as interested in those who can do a little this and a little that for the Communist Party of China. The UFWD is most interested in finding agitators and destroyers, who could open the way for the organization to shape the political picture in the targeted country, and eventually ease the way for the Communist Party of China then level its influence full bore and pull the country in China’s direction. As aforementioned, that is what united front work is all about. In part, through that method, China hopes to become the dominant power in the world. Even pushing out the Communist Party of China-line is not as important for an operative recruited by UFWD as being a disruptive force in his society, or having the ability to facilitate the destructive activities of radicals and anarchists. To that extent, Angwang inherently would not have much value to the organization as a member of the NYPD. It is hard to imagine any radicals or anarchists making the leap to trust a NYPD officer. If Angwang had revealed some oddly arrived at ties to such organizations or suggested ways to support them, he would have been far more valuable to the UFWD. As for being a native Tibetan relating to an Chinese official in an organization ostensibly concerning Tibet, it was nearly irrelevant in this situation.

It may have also been the case that Angwang was ignored by the Ministry of State Security, the People’s Liberation Army, or other Communist Party of China intelligence services that potentially could have been lurking about in the Consulate. Perchance the thinking at UFWD and other Chinese intelligence services was in harmony as it pertained to his case. Perhaps all on the Chinese side would have been satisfied to see Angwang wear himself out and fall away quietly.

Angwang’s UFWD Linkage May Have Concerned Intelligence, but Was Espionage Actually Involved?

Angwang’s “renewed” contact with the Consulate was indeed a dangerous undertaking from all sides, He eventually discovered that. With the advantage of hindsight, one might make the argument that Angwang foolishly entered into a milieu in which was completely unknown to him, yet he perilously travelled down a path that was his undoing. As mentioned initially, among the charges made against Angwang by the US Department of Justice, he reported about the activity of Chinese citizens located in the New York region, identified and gauged possible intelligence sources in the Tibetan community and made access to NYPD officials via invitations to events available to his UFWD contact at the New York Consulate. Angwang’s attorneys will no doubt argue that charging Angwang with anything close to espionage was somewhat of a liberty. However, they would have some difficulty arguing in defense of Angwang’s actions.

In Henry S. A. Becket, The Dictionary of Espionage: Spookspeak into English (Stein & Day, 1986), “Persons who volunteer themselves to an espionage agency” are defined as “walk-ins.” A quote from a former CIA officer added to the definition that explains: “’It’s the walk-in trade that keeps the shop open’ is one of the first bits of operation wisdom that is impressed on newcomers to the business.” (While the author of The Dictionary of Espionage, published under the pseudonym “Henry S. A. Beckett,” was revealed as Joseph Goulden, and the book was republished in April 2013  by the under the authors true identity name by the Courier Corporation, greatcharlie prefers to use the original text published during the 1980s Cold War and intelligence agencies worldwide struggled to solve the puzzle of the author’s name.)

When Angwang went into the People’s Republic of China Consulate in New York, he reportedly did so, in his own words to help his “motherland achieve glory.” He was a walk-in. Angwang did not say outrightly that he wanted to spy according to the criminal complaint, however, the document indicates that it was Angwang in an October 30, 2018 telephone call who broached the idea in conversation with the the UFWD official at the Consulate that he might have some value, as the FBI interpreted his words, with regard to intelligence.

Added to his legal defense’s problems is the fact that, as mentioned earlier, UFWD is an organization that engages in intelligence work. The UFWD is absolutely one of the tools the Communist Party of China employs to engage in foreign intelligence. The UFWD is distinct from regular civilian and military Chinese foreign intelligence services, given its overt and benign appearance. As was also mentioned earlier, UFWD organizations abroad often operate in the open, using names as the “China Association for Preservation and Development of Tibetan Culture.”

By directing his comments to the UFWD official, the indications and the implications for one line of thinking, particularly that of the FBI, are that Angwang likely believed that he was a foreign intelligence officer or that he could put him in contact with an intelligence officer from the Chinese foreign intelligence services. By offering to provide services in support of the intelligence work of  Chinese intelligence services, as the FBI suggests, Angwang opened himself up to accusations of espionage. Cast one’s mind back to Angwang’s November 19, 2018 telephone conversation with UFWD official during which he suggested to the UFWD official that they should visit a  community center together. The FBI assessed that the purpose of a proposed visit to the community center was twofold: (1) Angwang  was advising UFWD official to visit the community center in order to maintain visibility on the activities of ethnic Tibetans in the New York area; and (2) Angwang was advising the UFWD official that visiting the community center would assist in spotting and assessing potential intelligence recruits or sources within the Tibetan community.

Certainly, in the People’s Republic of China Consulate in New York, it would hardly be the case that the foreign intelligence officers, on one side of the house, if they were in fact there, would be unaware of what diplomats and officials on the other side of the house, were doing, especially when it concerned a contact as unusual as one  with an NYPD official of any rank. The behavior of this particular NYPD officer, Angwang, was so unusual that it could have drawn the attention of officers of any of the civilian and military Chinese intelligence services posted within the Consulate. Officers of those Chinese intelligence services might have been expected to take some interest in Angwang, particularly given his position, alleged capabilities to reach into the Tibetan community, and access to senior NYPD officials. Recall also that he had been in contact with the Consulate before and they likely possessed a dossier on him. Still, in a possible scenario, nothing might have led civilian and military Chinese foreign intelligence service officers assumedly posted in the Consulate to find interest in Angwang for their purposes and on the outset they might have decided not to become involved with him. Beijing, too, may have received reports about Angwang, yet no great urgency may have been generated by what they read. Angwang may have been viewed not as a walk-in with potential, but merely an unsolicited contact, albeit a local police officer and “a son of the motherland” who had a familial connection to Tibet.

While they probably had a good chance to look Angwang over during his first flap of contacts with the People’s Republic of China Consulate in New York, in his second go around with the diplomatic post, Chinese counterintelligence services presumably there would surely be concerned that the unusual contact with the NYPD officer might be an effort to compel the UFWD officer to defect, and even worse, engage in espionage on behalf of US foreign intelligence services.

Additionally, having a member of the Consulate staff fall into a US counterintelligence trap would have spelled disaster for UFWD senior executives and managers in Beijing, the Ministry of Foreign Affairs, and the all of the officials working in the People’s Republic of China Consulate in New York. They would not want anything to transpire that might have embarrassed the Communist Party of China and people of China. They also wanted to avoid anything that might put their situations in jeopardy as well. Once the Communist Party of China leadership in Beijing got wind of the troubles, they would become difficult to console. The UFWD official and others in the Consulate could have been sacked and called home or their records would have been severely damaged at the very least. The decision was most likely made from the start to contain the NYPD officer’s attempts to connect with the UFWD official. To that extent, although he remained in contact with Angwang for two years, the UFWD official, according to the portion of the transcripts of recorded conversations placed in the criminal complaint, appeared to be a methodical individual, taking every precaution with the NYPD officer, measuring every statement and response, not knowing how events might turn.

As of this writing, Angwang, is the one who now faces possible punishment from the US Department of Justice and the NYPD. The names of the People’s Republic of China Consulate in New York officials involved with him, to include the UFWD official, were not mentioned in the criminal complaint, which is the norm in a federal espionage case.

Detained Tibetan Bhuddist monks paraded while wearing demeaning placards (above). Officers of Chinese intelligence services might have been expected to take some interest in Angwang, particularly given his position, alleged capabilities to reach into the Tibetan community, and access to senior officials in the NYPD. Still, in a possible scenario, nothing might have led civilian and military Chinese foreign intelligence service officers assumedly posted in the People’s Republic of China Consulate in New York to find interest in Angwang for their purposes and on the outset they might have decided not to become involved with him. Beijing, too, may have received reports about Angwang, yet no great urgency may have been generated by what they read. Angwang may have been viewed not as a walk-in with potential, but merely an unsolicited contact, albeit a local police officer and “a son of the motherland” who had a familial connection to Tibet.

If Chinese Intelligence Services Had an Interest in Angwang, What Could It Have Been?

Recall from the initial discussion of the UFWD here that some State Council ministries and many other organizations with a party committee also conduct united front work. These organizations all offer unique platforms and capabilities that the united front policy system can draw upon for operational purposes. The Ministry of State Security, although outside of the Communist Party of China, is one of those organizations. Attached to its party committee is a united front work department. Its resources and personnel of the Ministry of State Security can be called upon to perform united front work. One can imagine the interplay between UFWD officials and Ministry of State Security foreign intelligence officers in overseas diplomatic posts. However, standard civilian or military Chinese foreign intelligence and counterintelligence officers possibly posted to the People’s Republic of China Consulate in New York, just as those of every country, had the understanding drummed into their heads by trainers and managers was to avoid traps of all kind and to thoroughly evaluate a potential target first with the guidance of Beijing or in the case of the MSS departments and bureau, back to provincial or local from which they were deployed.

Chinese intelligence services, hypothetically characterizing Angwang as a walk-in in this scenario, might have reasoned that he should be allowed to do a little this and little that in the interests of China. However, it would also seem logical that senior executives and managers, much as the UFWD, may have believed that for the most part, Angwang should be kept figuratively on ice to see how events surrounding him would develop.  would be the best tack. If that theory were actually the case, then the US Department of Justice could very well have acted a bit impatiently to indict him. If one could progress in thinking to a follow on theory, one might also be willing to suppose that Angwang, much as Chinese counterintelligence officers were likely to believe, may have actually been serving as a counterespionage operative for US counterintelligence. Theoretically, the objective of that work would have been to insinuate himself within any active foreign intelligence network of China in New York he might come upon.

Alternatively, in following the theory of the US Department of Justice, that Angwang was under the firm control of Chinese intelligence, it is possible that Chinese intelligence services may have actually been considering him for handling by non resident foreign intelligence officers in New York. However, no proof of this has been made public.

Lastly, it is possible that other elements of the Communist Party of China, similar to the UFWD, such as the furtive yet prodiguous International (Liaison) Department and the Propaganda Department, might have been closely monitoring activities of what it would “dangerous influences” abroad concerning Tibet, and thereby may have taken at least a passive interest in the Angwang situation that never materialised into anything.

Radix malorum est cupiditas. (Greed is the root of evil.) There were a number of aspects of Angwangs’ approach to the UFWD official that would have made Chinese foreign intelligence and counterintelligence officers very likely in the Consulate or senior executives and managers in Beijing that would make them highly suspicious of unsolicited contacts in the current environment. First and foremost, quite different from the majority of federal criminal cases against US citizens incepted while engaging in espionage for China, Angwang was apparently driven by the spirit of grab and greed. Angwang certainly never created that impression. As it was already mentioned in the discussion here, according to what was reported in the criminal complaint, the issue of payments for the work done was never broached by the Consulate staff member. Even more unusual, the matter of payments was never broached by Angwang either. Chinese counterintelligence, if involved, would have believed that US counterintelligence services were well aware that no money had been exchanged because if the UFWD officer had raised the matter of payments, it absolutely would have been in the criminal complaint. Interestingly, according to that document, Angwang, in 2016, wired a total of $150,000 to accounts in China controlled by his brother and another individual. It was also emphasized that Angwang had “also received multiple substantial wire transfers from the PRC [People’s Republic of China].” The matter was explained in the criminal complaint using examples in the following manner: “On or about May 23, 2016, a US bank account held in Angwang’s name received $49,985 from an account held in the name of Angwang’s brother in China Moreover, on or about January 29, 2014, a US bank account jointly held in the name of Angwang and Angwang’s wife received separate credits of $50,000 and $20,000 from an account held in the name of an individual at the Bank of China in New York.” None of this banking activity was said to have occurred during “the relevant time period.”

The matter of payments takes on even higher meaning with regard to counterintelligence. Chinese counterintelligence officers, in particular, would recognize that profit gives an act such as espionage purpose. Rarely will one come across an act of espionage that is purposeless. Without an exchange of money, payments, it is hard to see what was the purpose of Angwang’s desire to work for the People’s Republic of China Consulate in New York, and why anyone might insist the UFWD official was directing Angwang without any apparent means to encourage or reward activity. Savvy counterintelligence officers know that clever operatives may attempt to put investigators off the scent by laying out their actions with cunning and plausibility. Counterintelligence officers, as part of their tradecraft, look for consistency. Where there is a want of it, one must suspect deception. If an imaginable “virtual profit” were to be gained on the side of Angwang, in the minds of Chinese foreign intelligence and counterintelligence officers possibly in the Consulate or senior executives and managers in Beijing it would have been to lay the groundwork to potentially initiate a counterintelligence case against the UFWD official and presumably seek to infiltrate his imaginable organization to bag officers and other operatives in the what may have been theorized by US counterintelligence to be an espionage network.

Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.) According to the criminal complaint, on or about February 13, 2019, Angwang called the UFWD official, dubbed as “PRC Official-2,” and greeted him as “Boss.” Using that term “boss,” would indicate to some that the UFWD official was in some capacity had Angwang in his employ, albeit as an intelligence operative in this case. On November 14, 2019, Angwang called the UFWD official, and in addition to referring to the UFWD official as “boss” again, Angwang sought permission from him to participate in an interview with New Tang Dynasty Television. (New Tang Dynasty Television is run by the Falungong, an anti-PRC spiritual group that China banned in 1999 and declared an “evil cult.”)  In almost a protective way, recognizing Angwang’s desire to be connected with China, the UFWD told Angwang during their telephone exchange, “I think you absolutely shouldn’t do it.” Angwang responded: “It’s is better to avoid it, right?” The UFWD official, beginning to explain himself uttered: “This message this . . . the cost is too high.” Angwang seemingly pleased to respond to his inquiry stated, “Yes, yes. However, in further explaining the reason for his opinion, the UFWD, further stated: “Because NTD [New Tang Dynasty Television], China is totally against it. Angwang seemingly urging further comment said: “Yes, yes.” The UFWD beginning to offer more stated: “Their people [unintelligible] on the list.” Angwang then interjects, “Yes, yes,” but the UFWD official continues: “In the future, if you want to go back or something, it will have an enormous impact.” Thus, he was warning Angwang that by going on New Tang Dynasty Television, he would hurt his chances of ever traveling back to China again, but he did not command him not to go forward with the idea from a position of employer to an employee, although some may conclude that was such. Chinese counterintelligence officers, hypothetically observing the contact with Angwang develop, would likely recognize that it was completely possible that US counterintelligence services would portray these interactions as proof that the UFWD official was providing directing Angwang. To the extent that it is at all possible, such Chinese counterintelligence officers would likely be satisfied as the criminal complaint actually evinces, that there was no indication word for word that any instructions for action were issued to Angwang. What Angwang really did on this matter was advertise the limits he had. He should have been able to discern the liabilities of such an action on his own.

Chinese counterintelligence officers, hypothetically observing the contact with Angwang develop, would also likely be satisfied by the fact that throughout his contacts with Angwang, the UFWD official simply collected what he shared with him and accepted services as if they were benign gifts. It may very well be that in missing segments of the transcripts, the UFWD officer could be found explicitly giving instructions to Angwang to act on the Consulate’s behalf. Chinese counterintelligence officers would likely be convinced no espionage charge could possibly be leveled against the UFWD official because Angwang, would be seen in their eyes, as operating under a type of self-management on his own time and at his own expense.

Senior Executives and Managers of UFWD and Chinese Intelligence Services Were Likely Hsaken but Not Stirred by Angwang

Interestingly, in one of Angwang’s conversations with the UFWD official about November 19, 2018, Angwang said that he wanted him, as aforementioned dubbed as “PRC Official-2” in the criminal complaint, to advance to a position of prominence “in Beijing” and that he would “wait for your [the UFWD official’s] invitation.” Angwang reiterated: “It’s true. In the future–in the future, after you get a whatever position in Beijing, I will wait for your invitation.” However, the UFWD official demurred stating, “Beijing, that place is too awesome.” Pushing further, Angwang confidently stated: “You, you do well here, gradually, gradually you will move up, when the time comes. The UFWD official responded: “It’s not that easy. Beijing, that place, smart people there indeed.” It must be reiterated here that in selecting diplomats of the Ministry of Foreign Affairs, People’s Liberation Army Military Liaison officers, Ministry of State Security foreign intelligence officers and officials of front organizations for Communist Party of China intelligence groups such as China Association for Preservation and Development of Tibetan Culture, only the very best are selected. China puts its best foot forward. While it appears the UFWD official had some difficulty verbalizing what he wanted to say in English, his intellect would still shine through his words. The indications and implications of that last statement made by the UFWD official may have been that Angwang should not be so confident that anything more than collegial contacts would be permitted. In that Delphic statement, the UFWD official may have possibly been expressing to Angwang that there may be some concerns in Beijing about him that his case was being considered by experienced and cautious senior executives and managers would be able sort out whether he was legitimate or not. Further, in that same statement, UFWD official also seemed to blandly express to Angwang that he was not giving Beijing much credit for its singular faculties of deduction and logical synthesis. At the same time, he may have possibly been having a little fun with Angwang, knowing it was very likely that he could not decipher what was being hinted at.

In an assessment of Angwang for possible recruitment, senior executives and managers in the Chinese intelligence services would surely look for what might be beneficial for them in order to twinkle out what was right. His contact was presumably regularly reviewed and assessed. It may very well be that much about Angwang was found to be questionable early on, and there was little interest afterward to exploit anything he might have had to offer. To work with an operative, there must be some assurance of behavior and desired outcomes of tasking. Given Angwang’s discordant behavior, in the long run, one could only imagine random results from his work. Expectation otherwise from such characters based on optimism typical walk hand in hand with an intelligence officer’s doom.

Seemingly none the wiser to such a possibility, Angwang continued to market himself to UFWD official. According to the criminal complaint, in an October 30, 2018 telephone call, the fact that Angwang was being assessed appeared to have been revealed. In the conversation with Angwang, the UFWD official, dubbed PRC Official-2 in the criminal complaint, complimented him concerning his promotion within the NYPD. Angwang informed UFWD official that he was preparing to take a promotional exam and that he was “taking [the exam] . . . for the people back home.” The UFWD official reportedly agreed and then made a very Dadealian yet telling remark  that “there’s a whole bunch of people looking at you.” Curiously, Angwang simply spoke past that weighty statement and went on to state rather egotistically that his position within the NYPD was valuable to China because from it, he could provide NYPD information to the Consulate.

French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Reading federal indictments, criminal complaints, and judgments of those caught engaging in espionage for MSS over the past decade, one develops a picture of US counterintelligence while having some success intercepting Chinese intelligence officers, operatives and informants, it is usually only after they had for years delivered a considerable amount of classified information concerning US national security equities, projects, strategies, operations, and policies, US tactics, techniques, procedures, and methods and US defenses against foreign intelligence penetration, and of course, cutting-edge technologies had been put in MSS officers’ hands. According to what was reported in the criminal complaint, one could hypothesize that Angwang seemingly sought to fit the mold of individuals spotted and recruited to be Chinese foreign intelligence operatives and informants who had been intercepted by US counterintelligence. The traits and aspects of the individual spotted and recruited to work for Chinese foreign intelligence services were surely better understood from those cases. If Angwang had been operating under the direction of US counterintelligence services as Beijing may have presumed, the information from any cases would likely have been used to assist Angwang in shaping himself to become as attractive a target possible for recruitment. (Not to go too far out on shaky ground, but it appears, intriguingly, that everything Angwang offered, or claimed to have access to, essentially mirrored what the UFWD would supposedly desire in support of its activities and he, himself, ostensibly matched the sort that UFWD would likely have a proclivity to recruit based on the FBI’s description of the organization in the criminal complaint.)

Yet, all in all, it appears that the risks were too high for regular civilian or military Chinese intelligence officers to approach him, especially knowing the priority given to US counterintelligence to score victories against Chinese foreign intelligence services. Chinese spy networks have run roughshod through political, economic, military, diplomatic, intelligence, academic, social, mass communications industries in the US, seemingly stealing information with impunity.

Chinese Intelligence Services Have Been Doing Well Enough That They Could Pass on Angwang

Under the circumstances alleged in the criminal complaint of the US Department of Justice, if there was interest in recruiting Angwang, Beijing was going to reason with the facts, not odd suppositions that might be primed by Angwang’s statements. If there were any doubts about the bona fides or the authenticity of anything Angwang was saying, the matter had to be studied.

Omne ignotum pro magnifico est. (We have great notions of everything unknown.) Senior executives and managers of Chinese intelligence services observing from Beijing when considering the big picture surely took into consideration the predicament in which US counterintelligence services found themselves. They imaginably recognized that US counterintelligence services surely want to accomplish a lot against them, but they have had great difficulty in devising ways to deter, disrupt, and destroy the intelligence efforts of Chinese intelligence services. When they achieve any victories against a Chinese intelligence operative or informant, and the occasional intelligence officer, they come only after massive amounts of secret government information of the utmost importance or intellectual property of private firms and academic institutions that is the product of intense and gifted research and development work has been stolen. US counterintelligence services would prefer that Chinese foreign intelligence recruitment efforts would lead over and over to traps. Information stolen should only that which is cooked and valueless. They would like to regularly penetrate Chinese intelligence networks and roll them up in waves at times and places of their choosing. They would like to infiltrate ongoing and developing Chinese intelligence operations and use them as conduits to push disinformation back to China. Doubtlessly, they wish they had a way to identify all Chinese intelligence officers, operatives, and informants and at least intercept, neutralize, and recruit a few as counterespionage agents.

To the extent any of that is plausible, Chinese foreign intelligence and counterintelligence officers, hypothetically may have looked upon Angwang as a potential counterespionage agent of the US, they would have most likely classified him as a dangle. As defined more specifically in the earlier referenced Dictionary of Espionage, a dangle is “a person who approaches an intelligence agency in such a manner that he is asking to be recruited as an agent to spy against his own country.” It is further explained that in some cases a dangle will engage in efforts to interest an intelligence service in his or her intelligence potential, or actually begin to provide services on his or her own initiative. Accordingly, senior executives and managers of Chinese intelligence services observing from Beijing may have suspected Angwang was being dangled before the UFWD official with the hope that he would in turn be passed on to Chinese foreign intelligence officers in the People’s Republic of China Consulate in New York and consequently gobbled up. With regard to that, Chinese intelligence services are not so desperate at the moment that they would have jumped at the odd native Tibetan NYPD officer dropped at their Consulate door step teeming with the right bona fides, attempting to say all the right words. As aforementioned, senior executives and managers in all of the  Chinese intelligence services know that their opposite numbers in US counterintelligence services are the desperate ones. Attempting to ensnare officers Chinese foreign intelligence services–or a UFWD official in this case–with such an over the top lure may have been presumed to be more of a reflection of the desperation of US counterintelligence services. To that extent, it could be viewed as a projection of their own concerns and anxieties.

With no intention by greatcharlie to be insulting or impolitic, but quite frankly, repeating what was mentioned a bit before, there was truly very little authentically impressive about Angwang as a potential espionage operative for any Chinese foreign intelligence service to consider. Chinese foreign intelligence services have actually been doing well enough so far at spotting their own targets, recruiting their own way, and running their operatives and informants with their tactics, techniques, procedures and methods. It is estimated that their 25,000 officers on the ground in the US show little fear as they steal US technologies and secret information and data of all kinds. Again, with things going so well for Chinese intelligence services in the US so far, that would be a catastrophe.

If a decision had been made to place Angwang under the control of Chinese intelligence services, the last thing China would want would be to see its whole US enterprise come crashing down, much as a wall. Attendantly, Chinese intelligence services would not  want to see a resident intelligence officer or a member of his team hypothetically posted to the People’s Republic of China Consulate in New York caught under the debris or associated in any way with the problem. They could be certain that US counterintelligence services would make a disturbance greater than bedlam if they could make a case against them.

It is highly unlikely that the UFWD official with whom Angwang was in contact, was an foreign intelligence officer from the Ministry of State Security who was simply using the UFWD’s creature, the China Association for Preservation and Development of Tibetan Culture as a cover. He failed to tick enough required boxes to even be considered such. In describing Chinese foreign intelligence officers, the renowned expert on the subject, Mattis, explained in a July 9, 2017 article in the National Interest entitled “Everything We Know about China’s Secretive State Security Bureau And it’s not much,” there are apparent signs that one is dealing with genuine officer of the Ministry of State Security. A Chinese diplomatic official who wears a tailored suit and speaks  with idiomatic English is one sign. A businessman working from a sketchy consulting outfit with a few faked LinkedIn profiles and that does not own the domain it claims is another. Reviewing the word-for word conversations, the UFWD official could only converse with Angwang, to use the vernacular, in “broken English.”

Maintaining a low profile means preventing one’s activities from becoming anything passively noticeable, inquired about by the suspicious, reported to authorities by the dutiful, and written about by reporters. As part of their tradecraft, Ministry of State Security officers would prefer hole-in-corner meetings with prospective recruits in small, quiet locations such as cozy, dimly lit establishments, conversing over coffee or tea, perhaps a dash of brandy or even a bite to eat. Such would be a far better site for a furtive discussion than some crowded establishment or a spot nearby some busy thoroughfare. Other sites usually selected are hotel rooms, gardens, and parks. Most of Angwang’s contacts with the UFWD official and another Consulate official were by telephone.

Further with regard to the telephone calls, unless they had worked out some elaborate code for communicating, nothing was hidden. The UFWD official surely had received more than one security briefing about telephone conversations in the US and the likelihood of being monitored by US counterintelligence. Chinese intelligence services have been aware of such capabilities for some time. In public statements, Chinese officials have expressed concerns about US capabilities to intercept telephone conversations of its government personnel. In the end, the telephone conversations were intercepted and declared by the FBI as the means used by the UFWD official to issue instruction to Angwang.

Equally, even if the UFWD officer, in the very unlikely case, was completely free from anything nefarious and not involved at all in any standard united front work, doubtlessly he would still be very aware and concerned that his conversations with Angwang were being monitored and assessed by Chinese foreign intelligence and counterintelligence officers. His career would be put on the line with every word he spoke even though it was his job to speak to contacts in the Tibetan community as Angwang.

Learning by Observation

In his novel, Siddhartha (1922), the German born Swiss poet, novelist, and painter, Hermann Hesse, the words are written: “I have always believed, and I still believe, that whatever good or bad fortune may come our way we can always give it meaning and transform it into something of value.” It is possible that after a period of contact with Angwang, senior executives and managers of the UFWD in Beijing, in akin to the judgment of senior executives and managers of civilian and military Chinese intelligence services, as greatcharlie hypothesized, may have instructed their official in the People’s Republic of China Consulate in New York to observe him for his reactions in response to statements he should make under their direction. Using reports from the UFWD official in the Consulate, they might hypothetically choose to  study Angwang much as a rat in a Skinner box. Whatever might have been of interest in his comments and inquiries was mined potentially to help create a template for how US counterintelligence operatives might respond when placed in certain situations. Most certainly from the get-go, the UFWD official would most likely have been weaponized with questions to ask Angwang and instructions on how to relate to him so that Beijing could be better gauge him for potential recruitment.

Incongruities

Multum in parvo. (Much in little. (Small but significant.)) Closely reviewing the criminal complaint, Angwang’s case is made even more intriguing given the many incongruities and outright oddities apparent in the activities of the parties involved in the matter. Each fact is suggestive of itself. Together, they have a cumulative force.

It is hard to imagine, but not exactly improbable, that in selecting an official of the UFWD, to send to New York as a representative of the China Association for Preservation and Development of Tibetan Culture,  UFWD senior executive and managers would choose someone who lacked proficiency in English. It would be doubly hard to imagine that of all the choices, Beijing would send someone who was also not proficient in Tibetan. After all, it even noted in the criminal complaint, among the department’s tasks is to engage with ethnic Chinese individuals and communities living outside China. Without proficiency in Tibetan, the UFWD official could not possibly have been expected to converse in the native language of the community in which he was ostensibly assigned to engage in outreach. Lacking proficiency in Tibetan would also mean vacuously surrendering the opportunity to establish an immediate basis of commonality with those in the Tibetan diaspora in New York who might have been willing to interact with him. (Perhaps some would say his walk-in NYPD informant defied that reality.) It would be counterintuitive to do so.  Standard Tibetan, along with Mandarin Chinese, is an official language of the Tibet Autonomous Region of the People’s Republic of China. Some schools in Tibet teach all subjects in Chinese, especially in areas where most students are ethnic Chinese. As Standard Tibetan is a widely spoken form of the Tibetic languages that has many commonalities with the speech of Lhasa, an Ü-Tsang (Central Tibetan) dialect. Standard Tibetan is often referred to as Lhasa Tibetan.

According to the criminal complaint, Angwang and both UFWD officials conversed in English, although presumably at least Angwang and the UFWD official could comfortably speak in Tibetan. Tibetan is in fact Angwang’s native language, but he repeatedly spoke with the UFWD official in English. He continued to do so, despite what could be inferred from the transcript segments in the criminal complaint, the difficulty that he was having in verbalizing what he wanted to say. It was, indeed, one more instance in which Angwang failed to humble himself, and actually a moment when he was decidedly rude.

The failure of Angwang to avail himself of the opportunity to speak in Tibetan may have raised eyebrows of UFWD senior executives and managers in Beijing who were very likely monitoring the progress of the contact. To them, the odds would stand against this being a coincidence. Indeed, Angwang who professed a love of his motherland, China, preferred to speak English rather than speak his native language. As a Communist Party of China loyalist might express it, Angwang further “subordinated” himself and their conversation to the language of a foreign land and an adversary. Culturally, Angwang may have been criticized in Beijing for failing to be humble and display respect for before an official, albeit low level, of the People’s Republic of China. It may have very well been viewed in Beijing also as ungracious and shameful. One might speculate that some grumblings might have even been heard in the meetings of UFWD senior executives and managers about Angwang that perhaps it was really a manifestation of his true mental attitude to his homeland.

Angwang’s repeated efforts to speak with the UFWD official in English, hypothetically may have led UFWD senior executives and managers in Beijing monitoring the contact to theorize that if US counterintelligence services were using their would be informant as an clandestine operative against the UFWD official, having Angwang discuss everything in English would serve to ensure that any direct, incriminating statements made by the Consulate staff member would be taken exactly as stated and his statements would not be later declared as part of a legal defense as having been subject to poor translation or completely misconstrued due to misinterpretation.

UFWD senior executives and managers of Chinese intelligence services observing from Beijing may have made the assumption that If US counterintelligence services were operating against the UFWD official posted to the Consulate, they could have potentially insisted that their operative, who they would imaginably could have assumed Angwang was, spoke in English as a manifestation of poor tradecraft. It would be a dreadful missed opportunity to enhance the comfort zone between their operative and the target, in this case the UFWD official, and establish more firmly establish a commonality between them. (To that extent, the criminal complaint does not indicate that the UFWD official had suggested to Angwang that he speak English.

Further, UFWD senior executives and managers in Beijing as well as  Chinese foreign intelligence and counterintelligence officers possibly working out of the New York Consulate who were experienced with the modus operandi of US counterintelligence, might have presumed Angwang’s unwillingness to speak to native language of the motherland that he claimed to have loved so much as possible act of laziness by US counterintelligence service, who might have insisted that their operative spoke English in order to avoid having to later engage in the extra step of translating transcripts of their conversations, as witnessed in previous cases.

Lastly on the language issue, Angwang desire to speak in English with the UFWD official may have also raised concerns among UFWD senior executives and managers in Beijing monitoring the contact because Madarin was also langyage in which both men could converse. Relatedly, in a December 11, 2019 telephone conversation, reported in the criminal complaint, with the UFWD official, dubbed PRC Official-2 within, Angwang asked for advice on the creation of his official NYPD business cards. Angwang stated that the card should indicate that he spoke Chinese. To that end, Angwang asked the UFWD official if his business card should state that he speaks “Chinese,” or more specifically the Mandarin dialect. The UFWD official responded that the card should read “Chinese.” Later in the call, Angwang and the UFWD official mutually decided that the card should reflect his fluency in “Chinese, Tibetan.”

Tibetans detained by Chinese security forces (above). It is possible that after a period of contact with Angwang, senior executives and managers of the UFWD in Beijing may have instructed their official in the People’s Republic of China Consulate in New York to observe him for his reactions in response to statements he should make under their direction. Using reports from the UFWD official in the Consulate, they might hypothetically choose to  study Angwang much as a rat in a Skinner box. Whatever might have been of interest in his comments and inquiries was mined potentially to help create a template for how suspected US counterintelligence operatives might respond when placed in certain situations. Most certainly from the get-go, the UFWD official would most likely have been weaponized with questions to ask Angwang and instructions on how to relate to him so that Beijing could better gauge him for potential recruitment.

Oddities

According to a September 21, 2020 CNBC report, the US Attorney’s Office for the Eastern District of New York, in a detention memo, said that an investigation found that “Angwang has traveled back to the PRC [People’s Republic of China] on numerous occasions since his asylum application was granted.” UFWD senior executives and managers closely following from Beijing Angwang’s moves, may have found it curious that Angwang’s oft professed love of his motherland had not already led him to request help from the UFWD official in securing a visit to China, to meet with the managers and colleagues of the official, to see his family, and “examine conditions in Tibet,” as part of a government sponsored cultural program. True, in a November 19, 2018 telephone conversation, he mentioned that he would wait for an invitation from the UFWD official to presumably go to Beijing once the official attained some position of influence there. However, he otherwise showed no interest in speaking with other officials at the Consulate, with the imprimatur of the UFWD official, who would have the ability to facilitate his travel to China, perhaps even on a state sponsored visit. All Angwang seemed interested concerning Beijing, was urging the UFWD official to verbalize some linkage back to his superiors there or to reveal some business or personal contact with senior executives of his organization, or otherwise, senior members of the Communist Party of China who were associated with it. As mentioned earlier, the criminal complaint clearly indicates that the UFWD official never even creeped in that direction in conversations. Angwang seemed determined to ignite a discussion with the UFWD official on his  impressions of his superiors in Beijing and their hopes of what he might achieve from his post. He repeated his inquiries similar to a skipping compact disc. Angwang also seemed to have a strong interest in what would satisfy the UFWD official’s Beijing superiors in terms of the collection of information and activities in which he, Angwang, might engage.

In a large, populous city as New York City, with so much activity tied to the diverse cultures of its many diaspora communities, contacts by NYPD community liaison officers with diplomatic representatives of the home countries from which one of the diverse communities of citizens and residents originate, would likely be given scarce attention. With regard to the officers actions as an official representative of the NYPD and City of New York, and the decidedly aberrant nature of his behavior, it is hard to understand how NYPD senior executives and managers had not been made aware of the errant behavior of the officer. One might think that his repeated contacts would have roused some suspicion or the curiosity of a single fellow officer. If NYPD senior executives and managers were aware of what he was doing, given how odd it was, he should have been ordered to cease and desist and to break contact with the People’s Republic of China Consulate in New York immediately. Based on the absence of anything to the contrary in the criminal complaint, one must presume this was the case. It appears that no heed was paid by the NYPD to his two year long perilous entanglement with the People’s Republic of China Consulate in New York and the UFWD.

Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.) Being aware of that and the dangers security-wise that interactions with People’s Republic of China Consulate in New York would pose for an officer who might come in contact which such “dark elements” there, one might expect Angwang’s immediate superiors in the Community Liaison Department or at the 111th Precinct  would put some impetus into getting the officer as far away from that place. In the end, he became mixed up with the UFWD, which in many ways might be considered a far worse outcome than running into any in house spies.  have been  especially given the type of exchanges with a Consulate staff member in which he was engaged. If Angwang had been forewarned about being in contact with the Consulate by his superiors, yet then persisted in maintaining contact with officials there, the circumstances would be completely different.

After Angwang was charged, among his fellow police officers, there may very well be some grumblings to the effect that if at higher levels in the NYPD, there was an awareness of the dangerous waters was sailing into not simply by being in contact with the People’s Republic of China Consulate in New York, and worse being contact with an acknowledged official of the UFWD, consideration should have been to perhaps given to providing Angwang with the opportunity to jump to safety. That opportunity could have taken the form of a stern warning or even a reprimand with regard to those contacts as well as his activities from a supervisor. Sometimes one needs to hear the perspective of others to understand how far off course one has traveled. It is unimaginable that anyone kindly mentoring the NYPD officer was encouraging his interactions with the People’s Republic of China Consulate in New York. Imaginably, the NYPD Patrolmen’s Benevolent Association (PBA), the police officers’ union, may have something to say about how things panned out, too! Although the matter is now laden with national security implications and it is a federal criminal case, imaginably the PBA might have had something to say about how far the NYPD allowed the officer to stay if his superiors actually had been made aware of what he was doing. However, a PBA spokesman said the union would not be representing Angwang in the criminal case. It is stated with no interest insult or to condescend, that the majority of NYPD officers are neither steeped in international affairs and US foreign policy nor familiar enough with diplomatic arts to fully understand the implications of such contact with the local Chinese diplomatic post that garners great attention from the US Intelligence Community.

In view of how Angwang was operating with an extraordinary amount of autonomy with regard to contacts-as a local government employee–with the People’s Republic of China Consulate in New York. Experienced senior executives and managers in UFWD might have wondered whether the NYPD officer was being supervised and whether he was reporting any of his contacts with, and activities on behalf of, the People’s Republic of China Consulate in New York. Senior executives and managers in UFWD would want to know why no superior officer in the errant officer’s precinct chain of command did not order him to break contact with the People’s Republic of China Consulate in New York. One might assume that the Consulate had a fully complemented suite of foreign intelligence officers, likely from more than one service, to include Communist Party of China intelligence elements.

Once Angwang’s activities were discovered, one might have expected senior executive from the NYPD, out of an abundance of caution, to approach the Consul General of the People’s Republic of China in New York and inform the official that it was not the interest or intent of the NYPD to have its community liaison officers probe Consulate officials about the inner workings of their government. Further, one might expect that the NYPD would make it clear that it was not permissible to allow its officers, essentially in the role of agents, to perform community liaison tasks for their Consulate or any foreign government Consulate for that matter.

Interesting Behavior by the Chinese Government

On the other side of the coin, the People’s Republic of China Consul General of New York did not contact the NYPD about the probing, officer with his telephone calls, comments concerning evaluations of Consulate staff by senior officials in the Chinese government, and his efforts to insinuate himself in the activities of Consulate staff member by engaging, by his own admission, in a self-managed efforts promote a staff member with superiors in Beijing. As aforementioned, the officer’s pushy, boorish nature and peculiar efforts were hardly what a Consulate official from any country would want to cope with under normal circumstances.

What compelled the Consulate to actually let it all continue is difficult to discern. That decision surely has leaves the door open to consider the decision from a different angle than simply engaging in typical Consulate activities such as supporting China’s diplomacy with the US, handle legal matters, and foster business, educational, cultural, travel, social, and community relations in the New York Metropolitan Area and to that extent, the US. There are many possibilities.

As for the response of the Chinese government, a People’s Republic of China Ministry of Foreign Affairs spokesperson, Wang Wenbin, stated at a daily briefing on September 22, 2020: “The relevant accusations made by the US side are pure fabrication.” Interestingly using the word “plot,” he explained: “The US plot to discredit the Chinese consulate and personnel in the United States will not succeed.” Wenbin continued by curiously stating that the indictment against Angwang was full of hedging terms such as “seems” and “possibly,” giving the appearance that prosecutors were straining to make their case. From this particular statement, one can get a better sense of how, as postulated in the discussion here, Communist Party of China organs involved in this case, that publicly being the UFWD, and Chinese government bureaucracies interested in it, that being the Ministry of State Security and the Ministry of Foreign Affairs, surely examined the criminal complaint against Angwang closely. Both bureaucracies have the responsibility to support united front work. As presumed in this discussion also, certainly all information pertaining to Angwang’s contact with the People’s Republic of China Consulate in New York was carefully scrutinized by them. Perchance, as hypothesized by greatcharlie, for responsible senior executives and managers of the UFWD and also most likely among interested Chinese foreign intelligence and counterintelligence services of the Ministry of State Security, sufficient indicia existed to suspect that Angwang’s second set of contacts with the People’s Republic of China Consulate in New York and the UFWD official were most likely inauthentic.

To that extent and without a great leap of thought, it becomes more likely the case that the two year period of Angwang’s second contact with the People’s Republic of China Consulate in New York, which included numerous contacts with the UFWD official, was used in a curious way by UFWD senior executives and managers in Beijing to study, from arms length and with sufficient safety measures in place, the tactics, techniques, procedures, and methods of US foreign intelligence and counterintelligence services. They would seek to better understand and prepare for expectant future attempts to covertly insinuate operatives into the Chinese foreign and national security apparatus, including particularly both the clandestine posts and covert networks of civilian and military Chinese intelligence services and Communist Party of China organs operating overseas, as UFWD. As aforementioned, they doubtlessly understand the situation the US Intelligence Community has faced, scoring few victories and suffering many defeats in the intelligence struggle with China, and they very likely recognize that US foreign intelligence and services are anxious to turn the situation around and get some things going. Whether there is any merit to this theory that in Beijing relevant Communist Party of China elements and government bureaucracies viewed the whole matter in this way, remains to be seen. Given the peculiarities of the world of intelligence, this analysis should not be deemed too extravagant.

Angwang in his Community Affairs role (above). Communist Party of China organs involved in this case, that publicly being the UFWD, and Chinese government bureaucracies interested in it, that being the Ministry of State Security and the Ministry of Foreign Affairs, surely examined the criminal complaint against Angwang closely. As presumed in this discussion also, certainly all information pertaining to Angwang’s contact with the People’s Republic of China Consulate in New York was carefully scrutinized by them. Perchance, for responsible senior executives and managers of the UFWD and also most likely among interested Chinese foreign intelligence and counterintelligence services of the Ministry of State Security, sufficient indicia existed to conclude that Angwang’s second set of contacts with the People’s Republic of China Consulate in New York and the UFWD official were most likely inauthentic.

The Way Forward

There is no intention to remotely question the actions of the US Department of Justice on the Angwang matter. With an interest in better understanding the counterintelligence case that resulted in Angwang’s indictment, greatcharlie has taken a deeper dive into facts made available. Along these lines, it has provided a reappraisal based on what it has found. It is greatcharlie’s hope that if given some attention, perhaps in some small way it might assist those who work on matters of gravity in this province improve their approach to defeating and displacing adversarial foreign intelligence services operating against the US.

John Milton, the renowned English poet, polemicist, man of letters, and a civil servant for the Commonwealth of England under Oliver Cromwell, wrote in Comus (1634): “He that has light within his own clear breast May sit in the centre, and enjoy bright day: But he that hides a dark soul and foul thoughts Benighted walks under the mid-day sun; Himself his own dungeon.” Angwang’s behavior might only be explained by some mystery in his life. Left unknown to the public, it is possible to say. What stands out from the criminal complaint is that whenever Angwang involved himself in things, to include immigration, the US Army Reserve, and the NYPD, he has displayed an inclination to approach them in a way that was usually a bit off-kilter. For that reason, perhaps it can be estimated that Angwang’s aberrant and purportedly illicit choices in this case were the result of long habit. Indeed, this episode may be one more, but perhaps the most unfortunate, of a collection of odd instances in his life. To the degree that he was involved with a UFWD official, as laid out clearly in the criminal complaint, Angwang had provided him services, albeit seemingly voluntarily and arguably without direct instructions from that contact. He left no doubt that he wanted to promote what he apparently believed were the goals of UFWD official and his organization. When individuals turn their brains to misanthropy and wrongdoing, the world becomes more wicked. For certain, the FBI interprets Angwang’s services for the UFWD official as being aimed at supporting intelligence activities. As of this writing, the public has yet to hear a recounting of Angwang’s experiences in this case in his own words.

Angwang may very well be an isolated phenomenon within the NYPD ranks, and among municipal police departments around the US. However, the presence and activities of the array of Chinese intelligence services both of the government and the Communist Party of China must not be underestimated. It appears to be growing in intensity. Keen observers of China policy must appreciate the predicament of US counterintelligence services as Chinese intelligence services seek to further exploit it. There is a handle. As suggested in previous greatcharlie posts, new thinkers, from outside of the bureaucracy, may rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. They would surely look at issues from other angles, moving away from the usual track, and thereby most likely peel back surface layers, figuratively, to reveal what may have been missed for a long time. What outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that in some cases might very well have thwarted the recruitment of the outside thinker.

Hiring such outside thinkers could be done with delicacy. There should be an exactness about the selection process. Those sought should be already known and possess the ability to present what may be unorthodox innovative, forward-looking perspectives. The projects on which such individuals would work on would be very compartmentalized and limited in scope and duration. Their attention could be directed to  special cases that may be exceptionally difficult to crack. Some senior executives and managers of US counterintelligence services, determined to stand as solid pillars of conventional thinking and behavior that will not be blown down by the winds of change, may not brook the idea of bringing in outsiders to handle sensitive matters. However, the tide of Chinese espionage has lapped up so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among those possible dissenters, an interest, not solely due to exigency, might grow on the idea. Ratio et consilium propriae ducis arte. (Reason and deliberation are the proper skills of a general.)

China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2)

The Headquarters of the Ministry of State Security (above). The primary civilian intelligence service engaged in the political warfare struggle against the US is the Ministry of State Security (MSS). Yet, while fully involved in that work, MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. It has also robustly enhanced another mission of grabbing intellectual property and an array of advanced technologies from the US. This essay’s focus is not the political warfare effort by MSS. Rather, it provides a few insights on this topic from outside the box on MSS tactics, techniques, procedures, and methods used to keep its ears to the ground and to collect what it needs to improve China’s capabilities and capacity to compete and struggle with the US.

This post should be considered a direct continuation of the preceding one. The complete essay focuses on what the Ministry of State Security (MSS) is and what it does, day-to-day, for China. It is presented in two sections. “Part 1,” published on July 31, 2020, provides greatcharlie’s insights from outside the box on the MSS and the tactics, techniques, procedures, and methods it believes both help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US. That discussion is buttressed by a few celebrated and trusted sources. This section, “Part 2,” completes discussion begun in “Part 1,” and then it calls attention to how, over recent years, a number of less-familiar, self-inflicted wounds have hindered the prosecution of a successful campaign by US counterintelligence services against the MSS as well as other Chinese intelligence services. The extent to which those same issues concerning US counterintelligence services have impacted the Trump administration is also touched upon. Without pretension, greatcharlie states that there is no reason for it to believe policymakers and decisionmakers in the White House and among US foreign affairs, defense, and intelligence organizations, would have a professional interest in its meditations on MSS intelligence operations in the US. However, it is greatcharlie’s hope that if given some attention, perhaps in some small way it might assist those who work on matters of gravity in this province improve their approach to defeating and displacing the MSS networks and operations as well as those of its sister organizations in the US. Bonus adiuvate, conservate popular Romanum. (Help the good (men) save (metaphorically in this case) the Roman people.)

People’s Republic of China President Xi Jinping (above). President Xi Jinping is the man in charge, the top decisionmaker in China, therefore he has ultimate responsibility for what China has done, is doing, and will do. How China has responded to the crisis turned pandemic so far has been a source of curiosity and absolute outrage globally. The Communist Party of China and the National Party Congress were unapologetic and frightfully defensive concerning all discussion of China’s role in what was happening. They became particularly warm toward US President Donald Trump. It seems as if China’s leadership will continue to assail the global media with waves of distortions. In the meantime, around the world, the number of people infected by the coronavirus continues to increase, the death toll rises, and the financial loss is being calculated in the trillions. Hopefully, Chinese President Xi Jinping is genuinely aware of what is transpiring and has set some type of guidance on just how far this whole cabaret should go.

MSS Counterintelligence

A primary mission of the MSS counterintelligence service is the infiltration of all the foreign special service operations: intelligence, counter-intelligence, police forces all over the world. Its primary targets assuredly are its chief competitor, the US, the bordering Russian Federation, and Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes although China has not achieved prominence in their space. Second would come Taiwan, India, Pakistan, Nepal, Mongolia, and Iran which it trusts up to a point.  China must also measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. China has also stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

Certainly, counterintelligence would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning, Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations. The surveillance effort may not always be easy going. A foreign intelligence officer’s trade craft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some.

Chinese intelligence services are capable of constructing a sophisticated profile of the online activities of individuals. It does not appear, however, that the MSS and supporting agencies have established the capability to identify espionage in the offing. Every now and then, though, they are lucky enough to identify espionage underfoot with hum shoe detective work, online. In an excellent essay published May 7, 2014 on Jamestown, Mattis relays that in May 2014, Guangdong State Security Department (GSSD) of the MSS revealed brief details of an espionage case in which the chief suspect received a ten-year prison sentence. An unnamed foreign intelligence service reportedly recruited the suspect, dubbed “Mr. Li,” in an online chat room. Electronic prowling led him to documents of immense value, a variety of classified military documents and publications. Recognizing that a long price could be had for what he might acquire, “Mr. Li” turned to an online contact “Feige.” GSSD counterintelligence discovered that “Feige” had more than 40 other contacts—12 in Guangdong—spread over 20 provinces and provincial-level cities. Additionally, “Feige” had been an active online persona since 2007, collecting information off of military enthusiast (junmi) discussion boards and using services such as QQ to meet others like “Mr Li.” Those who “Feige” recruited collected military information through friends and contacts, subscribed to sensitive and internal military publications, and even took pictures of local military installations. Although a long price could surely have been had for what he had collected and provided the foreign intelligence service, “Mr. Li” was paid only a few hundred renminbi per month. Chinese authorities did not identify the foreign intelligence service behind the theft of the military secrets. Nevertheless, the case compounded an apparent sense of siege in Beijing over what then called US Internet hegemony, and the prevalence of foreign-made communications technology in sensitive Chinese systems. There were also allegations that the US had managed to exploit Huawei’s equipment, a concern that has since flipped the other way. For a state known to be as controlling of information as China, the reality is that an incredible amount of sensitive information was publicly accessible. It was all overwhelming for China which was well-aware of that its counterintelligence services could not stem figurative waves of attempts to penetrate its systems. The MSS will always want Chinese citizens to believe its elements such as the GSSD are as present as “air and water” with “information on everyone.” However, contradicting that, Chinese security officials were also reported at the time that more than 70 percent of state secrets cases involve information being leaked or passed to a foreign intelligence service online It led to changes.

It goes without saying that Chinese military and civilian intelligence services have immensely improved their cyber capabilities. Efforts by the, have tormented advanced industrialized countries. However, lessons learned in the past decade by MSS counterintelligence concerning foreign intelligence services’ cyber operations against China apparently stuck. Perhaps, the main lesson was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. One might venture to say that a move to hard documents was evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

Staff burning massive bundles of documents within the compound of the People’s Republic of China Consulate in Houston, Texas (above). Lessons learned in the past decade by MSS counterintelligence concerning foreign intelligence services’ cyber operations against China apparently stuck. Perhaps, the main lesson was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. The transition back to paper would be the best answer. One might say that a move to hard documents was evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

Once MSS foreign intelligence officers are lucky enough to recruit operatives and informants in the US, federal indictments and criminal complaints against those caught indicate that they task them as intelligence collection requirements demand. However, in almost all of those taskings, certain counterintelligence aspects can also be discerned. Those aspects appear aimed at providing ways to assist MSS counterintelligence in identifying and locating foreign intelligence officers, operatives, and informants, particularly in China, or assist in devising ways to intercept, neutralize, and recruit them. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In August 2016, Kun Shan “Joey” Chun, a Chinese-born naturalized US citizen, pleaded guilty to illegally acting as an agent of the Chinese government. Chun, an electronics technician and veteran FBI employee who had a top-secret security clearance, reportedly passed sensitive information to China concerning, among other things, surveillance technologies used by the FBI. Prosecutors said that while working for the agency in New York he sent his Chinese handler, “at minimum, information regarding the FBI’s personnel, structure, technological capabilities, general information regarding the FBI’s surveillance strategies, and certain categories of surveillance targets.” Chun’s Chinese intelligence contacts provided him with financial payments and partially paid for a trip to Italy and France, during which he met with a Chinese intelligence officer.

In order to develop ways to counter FBI efforts against MSS foreign intelligence officers, operatives, and informants, MSS counterintelligence would want to know how the organization is set up to confront adversarial networks of spies, who is who, where they are situated, and what exactly are they doing. Understanding FBI surveillance strategies, would inform MSS counterintelligence of what layers of surveillance are usually being pressed on MSS foreign intelligence officers, operatives, and informants in the US and how to devise better ways to defeat them. Technological capabilities would inform MSS counterintelligence whether all along the FBI has had the capability to monitor its activities or whether they have the capacity and have simply failed to use it effectively. The collection of information on what MSS foreign intelligence has been doing ineffectively in the face of US counterintelligence surveillance strategies and technological capabilities would undoubtedly inspire audits to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight.

Kun Shan “Joey” Chun, (above). Once MSS foreign intelligence officers are lucky enough to recruit operatives and informants in the US, federal indictments and criminal complaints indicate that they task them as intelligence collection requirements demand. However, in almost all of those taskings, certain counterintelligence aspects can also be discerned. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In August 2016, Kun Shan “Joey” Chun pleaded guilty to illegally acting as an agent of the Chinese government. Chun, an electronics technician and veteran FBI employee who had a top-secret security clearance, reportedly passed sensitive information to China concerning, among other things, surveillance technologies used by the FBI. Prosecutors said that while working for the agency in New York he sent his Chinese handler, “at minimum, information regarding the FBI’s personnel, structure, technological capabilities, general information regarding the FBI’s surveillance strategies, and certain categories of surveillance targets.”

In the case of former CIA case officer, Jerry Chun Shing Lee, who, in November 2019, was sentenced to 19 years in prison last year after pleading guilty to conspiring with MSS intelligence officers after he left the agency in 2010. According to the US Department of Justice, Lee had created a document including “certain locations to which the CIA would assign officers with certain identified experience, as well as the particular location and timeframe of a sensitive CIA operation.” Lee also possessed an address book that “contained handwritten notes” related to his work as a CIA case officer prior to 2004. These notes included “intelligence provided by CIA assets, true names of assets, operational meeting locations and phone numbers, and information about covert facilities.” Allegedly, Chun’s espionage activities led to the deaths of a number of the CIA’s Chinese informants.

The damage done to CIA networks and at least one ongoing operation in China, accompanied by the tragic loss of any operatives or informants as suggested by news media reports would create a sense of immeasurable anger and betrayal within CIA. However, the Agency has been through similar situations before with notables such as Edward Howard, Aldrich Ames, and Harold Nicholson. MSS counterintelligence would capitalize on Lee’s efforts by creating an active template based on how its case officers operated, the types of operatives and informants targeted and methods of their recruitment. Further, typical locations for meetings could be plotted and ways and means to surveil new operations and collection efforts could be developed. Most importantly, the information could allow for the conceptualization of the potential moves that CIA might make to resurrect lost networks and activities against China. Countermeasures would put in place to potentially thwart new recruitments and stymie new technologies that could support operations in the field and run alongside human intelligence collection.

Much ado was made in the US Intelligence Community about the espionage case of Ron Hansen. In a May 2019 guilty plea and plea agreement, Ron Hansen acknowledged attempting to communicate, deliver, or transmit to MSS intelligence officers, information concerning US national defense with intent or reason to believe that information would be used to harm the US and provide advantages to China. Hansen was a retired US Army Warrant Officer with experience in signals intelligence and human intelligence and former Defense Intelligence Agency civilian intelligence case officer, fluent in Mandarin as well as Russian, with top secret security clearance, In early 2014, the MSS targeted Hansen for recruitment and he began meeting with them regularly in China. During those meetings, the MSS intelligence officers described the type of information that would interest them. One of the most important taskings Hansen received was collecting  forensic software and sending it to the operatives in Beijing without first obtaining the license from the US Department of Commerce which constituted a crime. As Hansen described events, he partnered with two Chinese nationals, to whom he identified “Amy” and “Robert,” via an office he maintained for his company, H-11 in Beijing. Amy and Robert operated Beijing Hua Heng (Infosec) which partnered with H-11 to sell computer forensic products in their company. Robert informed Hansen that he maintained close connections to several contacts in Chinese intelligence. In November 2016, Amy instructed Hansen to purchase and send to her in China, Recon software from Sumuri LLC, a Delaware based firm. She specifically requested the Recon Mac OS X Forensics with Paladin 6 software, which contained cryptographic capability. Despite being aware of US laws forbidding the export, Hansen did so despite being aware of US laws forbidding the export. In December 2016, Arny instructed Hansen to purchase the Intella 100 software from Vound LLC, a US company that provided products related to forensic search, e-discovery, and information governance. He obediently bought it and had it shipped it to her in China in January 2017. Again, he did so, despite being aware of US laws forbidding the export.

Tasking Hansen to grab forensic software could surely have served a counterintelligence requirement. Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. Advanced forensic software could allow MSS counterintelligence officers to conduct in depth analysis of user files to collect evidence such as documents, pictures, internet history and more. MSS counterintelligence could use the software to monitor communications and collect information on dissidents, ethnic groups, suspected foreign intelligence operatives and informants, even foreign intelligence officers of some countries, visiting foreign officials, businessmen, and tourists alike. It could support the theft of intellectual property and trade secrets.

Counterintelligence may very well be the greatest manifestation of the paranoia business, but it, as all other elements of the intelligence industry, requires wisdom, reason, and logic to be performed well. A MSS counterintelligence officer was not supposed to be the same as his internal security service or law enforcement counterpart. Unlike such, displeasure and frustration over denials of intercepted foreign intelligence officers and agents in interrogations generally should not manifest in violence.

There is no reason for frustration over denials of intercepted intelligence officers, operatives, or informants to result in violence. If progress through interviews indicates that an investigator is on the right track, there will be an attempt to find another door inside to open and pass through in order to get deeper on matters. Such technique is honed and polished over the years. When MSS managers have determined the situation demands rough treatment, typically some sort of exigent circumstance, and when the decision will align with the thinking and plans of the Communist Party of China leadership, coercive measures are employed to include forms of torture. Expectedly, “good managers” will be ill at ease with that. Much to the grief of foreign intelligence officers, foreign agents, and Chinese citizens, it is that style of pursuit which has been honed and polished over the years by MSS counterintelligence officers.

Sensation seekers might believe that being involved in authentic espionage would be thrilling. However, there is plenty of real danger involved. Once the MSS officer is in the ground working in a foreign land, there is always the chance of arrest while carrying out one’s duties or expulsion of the officer persona non grata. From what has been observed, when US counterintelligence and law enforcement ensure that such interceptions of Chinese intelligence officers, operatives, and informants receive high profile reporting, to include conducting press conferences and widely disseminating press releases, it is akin to hanging out MSS’ dirty laundry for all to see.

MSS counterintelligence officers surely caution their counterparts in MSS foreign intelligence to keep their eyes and ears open. The MSS foreign intelligence officer in the field must be able to intuit when a situation is right and when it is wrong. Experienced hands will take counsel not from their fears, but from their intimations. They know when to seize up and walk away. Still, there would be a natural concern among counterintelligence officers everywhere that as a human habit, sometimes what is obvious is often immediately accepted as true. The result can be catastrophic. MSS took a big hit in October 2018, when Yan Jun Xu, a Chinese citizen and Deputy Division Director, Sixth Bureau of Jiangsu Province of the MSS, was arrested and charged with conspiring and attempting to commit economic espionage and steal trade secrets from multiple US aviation and aerospace companies. US counterintelligence officers were able to lure Xu, a successful MSS intelligence officer, to Belgium in April 2018 where he was arrested pursuant to a federal complaint, and then indicted by a federal grand jury in the Southern District of Ohio. Belgian authorities provided significant assistance with the arrest and extradition of Xu to the US. Among Xu’s tasks as a MSS foreign intelligence officer in the US was to obtain technical information, including trade secrets, from aviation and aerospace companies not only in the US but throughout Europe. Xu often cloaked the true nature of his employment, by representing that he was associated with Jiangsu Science & Technology Promotion Association. From December 2013 to October 2018, Xu worked, traveled, and communicated with individuals associated with or employed by MSS and a number of Chinese universities and institutions, particularly Nanjing University of Aeronautics and Astronautics. Xu also actively targeted specific companies in the US and overseas that were acknowledged to be leaders in the field of aviation and aerospace technology, design, and manufacturing. Within these aviation companies, Xu and other individuals, some of whom were already known to law enforcement, would spot individuals who they deemed to be “experts” in those aviation companies, and who could potentially be targeted and recruited to travel to China, manipulated under the belief that they were traveling to China merely for “an exchange” of ideas and to give a presentation at a university. Xu and others would pay the “experts” stipends and would arrange for and pay expenses associated with their travel to China. To achieve their objective of collecting specific aviation technology documents and information, Xu and others exchanged messages concerning the types of information that they desired, and actively discussed methods for obtaining the desired information. That effort would include the use of codes and series of letters in place of the technology being discussed and the name of the company targeted. The arrest of Xu, who handled both Ji Chaoqun and Weiyun Huang, (whose circumstances were discussed in “Part 1” of this essay) preceded their arrests.

Xudong Yao, also known as Yan Jun Xu ( above). MSS counterintelligence officers surely caution their MSS foreign intelligence counterparts to keep their eyes and ears open. The MSS foreign intelligence officer in the field must be able to intuit when a situation is right and when it is wrong. They must know when to seize up and when to walk away. Still, there would be a natural concern among counterintelligence officers everywhere that as a human habit, sometimes what is obvious is often immediately accepted as true. The result can be catastrophic. MSS took a big hit in October 2018, when Yan Jun Xu, a Chinese citizen and Deputy Division Director, Sixth Bureau of Jiangsu Province of the MSS, was arrested and charged with conspiring and attempting to commit economic espionage and steal trade secrets from multiple US aviation and aerospace companies. US counterintelligence officers were able to lure Xu, a successful MSS intelligence officer, to Belgium in April 2018 where he was arrested pursuant to a federal complaint, and then indicted by a federal grand jury in the Southern District of Ohio.

Doubtlessly, if MSS officers are caught they will be told what they can say if “pressure” is severe enough. The information would likely be designed as an active measure to help distort a foreign counterintelligence services understanding of MSS tactics, techniques, procedures, and methods. Given estimates by experts on the potential volume of their intelligence activities in the US, a casual observer might expect the impact of a loss here and there would likely be viewed as nominal with respect to the overall picture. However, intercepted MSS officers, who stumble due to poor tradecraft, a simple misstep, or for reasons unknown to MSS counterintelligence, may not recover beautifully if returned to China. To start, the MSS would not at all like having its officers identified in China, identified in the US, or even worse, see them apprehended by US counterintelligence services or law enforcement. Further, it would not appreciate having an entire operation or network in the US detected and effectively neutralized

For the MSS officer, Commandment 11, “Thou shall not get caught!”, applies. Being caught while on the beat will never be chalked up as a sword scratch or a badge of courage. Yet, the greatest problem would be the embarrassment that it would cause the MSS as an organization, the Chinese government, and the Communist Party of China. The intercepted officer would have to face the reality that he failed at his task. Facetious managers and colleagues would likely say he or she was not up to the job. If there was  some error in judgment, failure to do things by the book, or wilful dereliction for failing to attain proper authorization before acting, the size of the failure would grow exponentially. Doubtlessly, the officer would be held out as an example of how an MSS officer should not operate. Concerning the situation of the hypothetical errant MSS officer, Il a foutu la merde dans sa vie.

The manner in which the Communist Party of China might come down on the officer for the failure would likely depend upon the political temperature at the time in Beijing. One could use the Party’s response to the bad news of the coronavirus outbreak as a yardstick. There would be no way to conceal the matter from the Communist Party of China. Even if the attempt was made to do so, informants inside the organization would likely report the matter up to Party leaders, making them familiar with the case before the matter even moved through MSS channels and managers and senior executives there were read-in on everything. The Communist Party of China would be especially interested if it concerns the US. One could only imagine the reaction of Party leaders if they were to find out about the arrest or PNG of a MSS officer via the US news media before hearing from its own government.

Putting aside the reality that a vital MSS intelligence operation may have been disrupted or destroyed and putting aside the potential negative reaction by the Communist Party of China, one might consider that for MSS senior executives and managers at headquarters, the saving grace would be that if the US counterintelligence were doing so, it meant attempts recruit the officer and compel him or her to play the double-game against their former colleagues and bosses as a counterespionage operative for the US failed. To advance a step further on this point, MSS managers would also recognize that burning the MSS offficer would be a palliative step and the only “constructive” option left for US counterintelligence. Holding a captured MSS officer in prison instead of putting them out of the US, PNG, would almost ensure some type of retaliation against an US intelligence officer or merely a suspected officer would be taken in China. In effect, a de facto modus vivendi exists. As for the future of the MSS officer caught, by burning him or her with heavy news media coverage of his or her identification or arrest could possibly destroy the officer’s prospects for receiving another overseas posting or participating in future intelligence operations leaving them in a solitary despair. MSS can always hire and train another.

A considerable concern for any counterintelligence service regarding foreign intelligence officers and their operatives and informants functioning in foreign territory is the threat of betrayal. Indeed, intelligence organizations in general spend much time and energy hunting among their own ranks for foreign spies. Of course, concerns are always raised among Chinese citizens when anyone with whom they may have just met or were in contact for other reasons, suddenly showed what could be considered under the circumstances as an eccentric interest in them. They could imagine that such inquires could be a trick perpetrated by the security services to test their loyalty. That surely causes the most fear. Defections from the MSS do happen, but as aforementioned, they are somewhat rare. Nevertheless, it is guarded against as surely not all MSS officers are gun barrel straight. At least, this would be the most likely presumption of Chinese counterintelligence officers. Certainly, all intelligence services have their share of problems with errant officers. Some, such as MSS, likely have less problems than most. However, even the clean, loyal, and obedient will occasionally look over their shoulders because of that. Bent intelligence can serve any preconceptions, and it often does in many intelligence services; sometimes purposefully and wrongfully to destroy an innocent officer’s career.

MSS counterintelligence managers with practiced hands know the first step of a breakdown in a officer’s sense of duty to China and the Communist Revolution can take place as far back as when an individual is hired who might manifest reactions such as jealousy and envy over the success of others faithfully operating in the field and achieving many victories. The second step of that breakdown usually happens when those less-than qualified hires are placed in a position to monitor, audit, and evaluate the work of those in the field. Those inner rumblings are often more than just a matter of maturity or being uptight. They are character issues that should have been resolved long before those particular individuals met their MSS recruiters. Their varied emotional disorders subsequently became most apparent after they began working.

A satellite image of the imposing MSS Headquarters in Beijing (above). In the abstract, one might conceptualize that a foreign technology analysis office with specialized units likely exists within one of its analytical departments to perform that task. One might consider further how tasks are divided within it and how it logically manages the mass collection of information and data collected. The overall aim of the hypothetical advanced foreign technology assessment unit would be to enhance the analytic capability of the MSS to enable it to more effectively provide to the Communist Party of China, ministers, and MSS senior executives the highest quality intelligence on advanced technological developments in the US and in other advanced industrialized countries. For the obvious security reasons, the workplace of these supposed technology analysts would likely be situated In some prohibited place, if not within the depths of the massive Beijing Headquarters of the MSS, itself.

MSS Large Data Processing of Technologies Stolen from US Conceptualized

Facilius per partes in cognitionem todus adducimur. (We are more easily led part by part to an understanding of the whole.) With dozens of operatives moving about the US with their eyes wide open and ears pinned back attempting to obey instructions from MSS officers either back in China or on the ground in the US, a backlog of information collected would be expected. The volume might be seen as problematic by experts in the US. However, MSS senior executives and managers, much as the MPS and all the parallel PLA and Communist Party of China intelligence services and units and all of the iterations of Chinese intelligence services that came before them, would apply reason to find a way to handle bundles of reports from intelligence operatives and informants. It stands to reason that a division exists which is engaged in piecing together information and data stolen from the US to advance its own technologies. China would hardly vouchsafe such.

In the abstract, one might conceptualize that a foreign technology analysis office with specialized units likely exists within one of its analytical departments to perform that task. One might consider further how tasks are divided within it and how it logically manages the mass collection of information and data collected. The overall aim of the prospective advanced foreign technology assessment unit would be to enhance the analytic capability of the MSS to enable it to more effectively provide to the Communist Party of China, its minister and deputy ministers, and senior executives, the highest quality intelligence on advanced technological developments in the US and in other advanced industrialized countries. For the obvious security reasons, the workplace of these supposed technology analysts would likely be situated In some prohibited place, if not some inner sanctum of the massive Headquarters of the MSS in Beijing, itself. Visualize, in some edifice in China, several MSS analysts, all of whom are experts on US and other advanced industrialized countries’ military, scientific, medical or artificial intelligence technologies, engaged daily in an intelligence practice of uncovering the latest, most advanced, and most desired information of foreign technologies from collected intelligence. In an intelligence tradition from the earliest days of CDSA, they can be imagined mining through foreign sources in a time consuming process akin to sifting through dust, yet enjoying the hunt so to speak.

One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II in the United Kingdom, yet they are isolated from the conditions of the past. That art, as with many aspects of intelligence collection, has become electronic. The label analyst should be interpreted widely to include researchers who regularly use secret intelligence. Individuals drawn to and hired for such work would have an acumen for being able to work on what are essentially puzzles. Solving puzzles is actually a science dubbed enigmatology. The analysts turned “enigmatologists,” or visa-versa, would most likely be elated to keep their brains on edge. They would have little difficulty remaining occupied forever long it takes to put together pieces of information to create the picture of a new technology or new research and development project. When such a figurative puzzle is cracked, new ones would very likely be immediately placed before analysts.

Bletchley Park, a country house in Buckinghamshire, was bought by the Secret Intelligence Service (MI6) in 1938 as a site to which the Government Code & Cypher School and MI6 could be evacuated when war came. However, Bletchley Park’s great success was as a result of the mechanization of the decryption process keeping pace with the mechanization of encryption. Although the decryption of Enigma is the best known of Bletchley Park’s exploits, other successes, such as the decryption of Luftwaffe hand ciphers, and the development of Colossus, the world’s first computer which solved the enciphered German teleprinter, made a significant contribution to the Allied victory. One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II, yet they are isolated from the conditions of the past as that art, as with many aspects of intelligence collection, has become electronic.

While the supposition may sound a bit ordinary, perchance there would be some sort of analytical triage by the most experienced analyst, perhaps senior leaders and best experts from the analytical team might gather weekly or daily to perform that task. It would also give the supervisors a good sense of what might be coming down the pike for examination. The participating supervisors, themselves, would reflect countries from which the technologies would be stolen and would be proficient in the respective languages of the industrialized countries from which the reports, plans, schematics, charts, and other data would originate. The final sorting would be done by supervisors intimately familiar with at least one area of the technologies stolen. There may be information gathered on a new US technology or ongoing research and development project that is already in sufficient quality and quality to send up to higher levels of management to create additional collection requirements for MSS officers and operatives in the field to help complete the picture. Even if there is a relative paucity of information on a foreign technology, if it is a technology discovered that is so advanced that it would have the potential to be a game changer in terms of the development of Chinese technologies or might be of the utmost importance regarding China’s defense and national security, it would very likely be brought up to senior executives who would decide how to pursue it. Counterintelligence would also likely be involved to make certain that any miracles are not simply sophisticated material dangled as bait for some elaborate trap. The supervisors speculated upon here would also be the ones to deliver information in formal reports or as presentations and desk-level briefings to customers in government.

After they receive a batch of information, the emphasis of the analysts’ search through it will be to identify and consider new discoveries, as well as determine whether the information is simply interesting or can be given higher meaning. Much as case officers may run more than operative in the field, each analyst or team would likely work on, not many, but very likely more than one puzzle at a time. The foundation of the puzzle would most likely be formed by a pattern of information. Each bit of new information may be a possible missing piece. Each new piece gives one an idea of what the next piece might look like. In a mosaic, stone fragments are cut to for a particular image the artist has in mind, a preconception. With a puzzle, the image is created  with each new piece. There is something to learn every time the image is developed. Eventually the image figuratively begins looking back at the one working on the puzzle telling its story. Priority is likely given to those puzzles closest to solution or those that begin releasing information about some new exquisite US technology that MSS senior executives, and thereby the Communist Party of China wants to get its hands on. As a next logical step, the collection of pieces for the remaining parts of the puzzle by operations departments from Beijing or the provinces can be directed through collection requirements. Perhaps the same analyst or analytical team or a group of troubleshooting technological experts would take over the case at that point.

One exercise would be to find commonalities among reports on a US research and development project. The likely thinking in each unit would be that there is always something in what has been collected, it just needs to be fully twinkled out. Imaginably, instead of having too few clues, in some cases there would be too many. To pull out a particular strand from a mass of information requires a very clear sense of priority. Doing that would also serve a counterintelligence purpose. The analysts would likely be trained to know there are patterns in reporting. A new technology will rarely simply emanate from  a single source, with no other references to it and no communication about it.

When pieces of information might be missing, there would always be the possibility that the next batch of reports from the US might help to do that. If that telling piece of information is not in the next batch, it may be in the batch after that. There are no blind alleys. If a report says something is there then it is there. The analysts would be fully cognizant that a considerable effort is being made within the US to conceal secret projects. Success at their work is likely invigorating, and likely impel more strenuous efforts. No matter how slowly any puzzle would develop, there would unlikely be any case regulated to something akin to a cold case file. If any information exists on a technological project, MSS managers know that there is metaphorically something cooking in the US. With several civilian informants working inside and around technological development centers, the day might come at any time when pieces of puzzle take on greater meaning and the puzzle starts telling the analysts something considerable.

While the image that the puzzle presents may not yet be completely in focus, the most experienced, knowledgeable, and resourceful eyes, masters in the business of sorting these puzzles out will be put on the matter. Such a case would likely become a collaborative focus. After a while of that, the newly discovered technology would very likely come into focus and resources of operations would be directed to the effort to hunt down the remaining elements and get them to China. In some cases, the few stray pieces of the puzzle could be conceptualized and reproduced by technology experts in China. What one can invent, another can surely reproduce.

Students of Nanjing University of Aeronautics and Astronautics studying in the library (above). One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II, yet they are isolated from the conditions of the past as that art, as with many aspects of intelligence collection, have become electronic. Chinese colleges and universities graduate a near endless list of qualified candidates for every year. The Nanjing University of Aeronautics and Astronautics in particular is a happy hunting ground for MSS recruiters. Given in part to the availability of a highly qualified pool of potentials, Chinese intelligence services surely have the personnel capacity to handle the loads of stolen information coming in from the US and other advanced industrialized countries. The two female students at the bottom right of the photo are apparently taking a short break from all of their serious academic work with a little diversion.

There must be a balance in all of their analyses without a smidge of bias. In their analytical product, they would need to guard against apophenia, seeing patterns in unrelated things. Engaging in informal speculation would be appreciated, some US technologies would possibly seem so advanced as to be called exotic. However, assessing any to have a potential bordering on science fiction would face disapproval. No one would be allowed to attach importance to anything purely arbitrary. Latching on to something definitively trivial will be proven when nothing ever follows to assist in solving the matter.

Reports that the analysts received would unlikely solely focus on technologies although that information would have primacy. Reports that identify government agencies, offices, supporting specific cutting-edge research and development of technologies. Where those government agencies are, that is where the MSS will very likely be prowling. Names of experts from US government departments and agencies or from private organization experts that came up related to a particular technology may among other things help to understand the project’s importance. Reports on how information is kept secure would certainly be useful. Information on security officers associated with protecting a project may be important for operational purposes. It may become necessary to know who they are, what they are doing, what they are saying, and what their routines, interests, habits and health are, particularly if it is determined that the door should be left open to possibly conducting a covert collection effort against the office or facility for which he or she might be responsible.

Assumably, morale would be high in such a foreign technology assessment office given its victories. In terms of supervising performance and ensuring a quality work product, there would very likely be a nose to the grindstone, deadly serious, scholarly approach demanded of analysts in their work. One would unlikely hear much jolly chatter in the workplace. Imaginably, there would unlikely be any of the peculiar infernal squabbling in morning meetings and weekly reviews that has been dubbed part of a creative process within certain Western intelligence and counterintelligence services. It is unlikely that competitive urges, ego and ambition impell the work of the MSS enigmatologist. Again, as they are only human, there may be some elements of each that pushes each to be their best. While there is an urgency to the work, getting things right would be most important and to that extent accuracy would equate to speed. There would surely be one-to-one mentoring, with more experienced team colleagues who offer support, in addition to that offered by line managers. Nearly everyone appreciates acknowledgement for a job well-done and pat on the back from colleagues and managers, coaches and mentors. Respectful, motivated, and dedicated, younger members of teams usually want to make a good impression upon older, more experienced ones, and typically thrive on recognition, attention, guidance, approval, and praise from them. (Supervisors must reinforce good work, extinguish bad habits and that sort of thing.) If Beijing would even discuss the existence of such an analytical group, it undoubtedly has the world believing that the desire to do a good job for China and the Communist Revolution provides all of the impetus needed.

Unlike other analysts who might rotate between operational, analytical and managerial duties, analysts would essentially work in a professional closed shop. Successful analytical work of this kind would require unbroken contact with information on new technologies as it arrives to avoid gaps in specific knowledge and assessment capabilities that would naturally occur if the analysts most familiar with the technology were moved out and replaced with analysts from some other area such as foreign military operational analysis, counternarcotics, or organized crime. Technology assessment would be a high priority specialization and any advancement would take place within it.

Provincial and local departments and bureaus of the MSS often use cover names inside China such as “Shanghai Municipal Government Office number seven.” It could be the case for Shanghai State Security Bureau (SSSB) that Municipal Government Office number seven is actually the Shanghai State Municipal building (above). Two satellite dishes are often found on office building roofs of MSS departments and bureaus. (See the satellite dishes on the left and right sides of the municipal building roof. In a photo in Part 1 of this essay, notice two similar model satellite dishes atop the roof of the Wuhan Hubei National Security Office which is the home of the Ministry of State Security Bureau.) Going out on a rather slender thread, greatcharlie ventures to say the fact that two “MSS-style” satellite dishes sit atop Shanghai State Municipal building, makes it a candidate for being where SSSB resides or at least some shop of the active spy organization resides.

An Ugly Truth the MSS Surely Knows About the US Counterintelligence Services

MSS senior executives and managers have much with which they can be satisfied regarding their organization’s performance against the US. Certainly, their enthusiasm over the performance of their personnel has been ineffectual within the organization. MSS foreign intelligence officers, operatives and informants have amassed a record of considerable success in the US and continue to plow ahead. Some analysts of Chinese intelligence might say the extraordinary success of MSS was partly founded on luck. The organization was smart enough to ratchet up its operations at a time when US concerns over the capabilities and capacity of Chinese intelligence were astonishingly lax especially in person contacts. Employees at lower levels, drivers, housekeepers, managed to insinuate themselves into the offices and homes of US Senators, US Representatives, hotels, resorts, military bases, government departments and agencies, and important offices of major US industries. Needless to say, that is the kind of luck that tends to follow those who usually become pre-eminent in their field. However, MSS managers are comfortable enough to operate so boldly in the US not because they feel their officers, operatives, and informants are so superb. Its managers feel less threatened because, as aforementioned, it recognizes US counterintelligence services have allowed themselves to deteriorate to some degree in nearly all areas, but especially concerning personnel, over recent years.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.) US intelligence, counterintelligence, and law enforcement have all but admitted that they are somewhat baffled by what the MSS and its sister Chinese intelligence services are doing. They literally advertise their limitations. Surely, US counterintelligence knows all of this is a part of the reason why it is somewhat in the woods regarding Chinese intelligence operations in the US. They are happy that very few are aware as to why, too! There has been a never-ending rosy US news media narrative about US intelligence and counterintelligence services and law enforcement which has influenced the US public’s understanding of how well the counterintelligence job is being done. That new media narrative intensified immediately after the September 11, 2001 terrorist attack on the US. The US public’s impression of US counterintelligence work has also been shaped for decades by Hollywood via bedazzling images of near supermen and superwoman catching wretched enemy intelligence agents, terrorists, and international organized crime figures. Even greatcharlie must accept some responsibility for creating a certain image of US intelligence and counterintelligence services and law enforcement by typically referring to the “somber and astute” professionals among them.

True, the majority of officers within the civilian US counterintelligence services, energetically and earnestly do all they can to thwart and defeat the activities of foreign intelligence services operating in the US. Those proper US counterintelligence officers indeed have their eyes on the MSS and other Chinese intelligence services. Expectantly, the presence of such professionals in US counterintelligence should have been enough to cause concern and caution for the MSS as they ventured into the US. MSS officers should literally tremble as they approach, and as they begin to move about on the beat, they should be constantly and carefully looking over their shoulders. Unfortunately, in the larger world of US intelligence and counterintelligence there are other officers who could hardly be characterized as such.

Fate would have it that there are a number of US counterintelligence officers who do not perform in such a praise worthy way.  While the type of errant officer identified here may not be present in every office of a US counterintelligence organization. The errant officers described do not move around much as gremlins doing wrong at every turn, breaking every rule. Their numbers are still sufficient enough that they are noticeable to their adversaries as much as they are to their colleagues. What the MSS doubtlessly picks up about the errant officers that arguably presents much hope and perhaps even joy when MSS senior executives and managers in charge of US operations. MSS managers have very likely observed the errant officers thinking and behavior either rising to insanity or sinking to imbecility. They have likely heard all of their tales of woe. Most are distraught by the denial of overtime, reductions in allowances for expenses, and relatively modest salary. Some feel benefits such as medical and dental insurance are insufficient. Others are angered not only by those factors, but also by having to distribute significant payments to informants and multiple operatives greatly in excess of their salaries. Trouble really begins when a case or cases allow the errant officers access to funds for the payments to operatives and informants. As it is done under the honor system, the door is opened wide for embezzlement. (The details of the varied devilish artifices used to embezzle are too hefty to detail here. The decision to allow case officers of US intelligence and counterintelligence services access to such considerable amounts of taxpayer dollars in this day and age without the strictest forms of oversight is of questionable judgment.)

MSS managers surely have noticed that when engaged in investigations against their intelligence officers, operatives, and informants, such errant US counterintelligence officers are satisfied in performing poorly and being incompetent. Indeed, when it comes down to identifying, intercepting, neutralizing, and recruiting foreign intelligence officers and operatives, the errant officers are hardly game for the trudge. Typically, a history of rarely being able to get anything started in a recruitment will fill the performance records of their sort. Even when given an opportunity to bring in a foreign intelligence officer or operative, the whole case is usually muffed. It is the practice of most US counterintelligence services to give officers full control of their cases, with supervision from other special agents or case officers on a management track–often with less experience on the field than themselves. Having been given the authority from managers and those novice supervisors, the have no reservations about chasing down a false lead regardless of the fact that they have been read-in on all that indicates there is nothing at all to follow. Interestingly, money somehow never seems to be short for their cases. Bringing a case to resolution would not allow for the use of varied tricks to enrich themselves as the continued reconnaissance and surveillance of a target and use of informants without having any real counterintelligence goals. The operatives or informants in contact with the adversary are kept active enough and encouraged enough to hold their interest and to compel them to stay involved. In some cases, everything might abruptly stop if some change in the office, some feeling–call it intuition–causes the errant officers to be concerned. Most of the time, however, the errant officers become so comforted by the ease with which they managed to collect their ill-gotten gains, they become slow to notice any nuanced changes that may happen around them. Supervisors may push for results but they typically become accustomed to getting nothing from the errant officers. At best, they will push to shut down the case, but the damage will already have been done to the effort against the foreign intelligence service. In some rare exception, the errant officers will collect enough on an innocent citizen to secure an indictment. An offhand remark or joke made to a clandestine contact or false statements signed by the errant officers’ operatives tied to arbitrary evidence wrongfully cooked to take on higher meaning may be enough to prompt eager prosecutors to move against the innocent.

Bewildering to MSS managers but perhaps the most noticeable of the errant officers behaviors that immediately benefits not just the MSS, but all foreign intelligence services operating in the US, is the employment contractors who will bizarrely hire untutored surveillance operatives right off the street even for an intended clandestine operation that is supposed to be finely calibrated. In most foreign intelligence services, great care is placed in the selection of operatives for a task as important as surveillance. Due to the heavy reliance on the competence of observers, reports they produce, and even their immediate impressions. All of that information will impact data extrapolated and inferences made. Nevertheless, money hungry contractors to whom those services often outsource such work could apparently careless about such matters. If one were to put a good spin on the practice, the grand thought behind the practice would ostensibly be that placing more eyes, even nonprofessional, untrained eyes, on the target allows for better coverage of the targets activities, better. Yet, the real result is simply the accumulation of several observations, varied in accuracy and quality. False observation can often be provided by nonprofessionals in an ordinary case seeking to puff themselves up, as if to say: “Hey, look at me! I am a real spy!” Indeed, this lesser form of “spying” may bestow a certain dignity to the mixed bag engaged in it. However, the real magic behind the practice is the potential for dishonor that it creates. Since the hires are essentially transient, not all names on a list of impromptu operatives may be genuine. Errant officers can benefit themselves by collecting the recompense of  nonexistent operatives added to the list. Experienced counterintelligence hands are well-aware that repeated, considerable hiring for surveillance, especially in massive bundles for any case could be a beckoning initial indicia of someone trying “to give themselves a pension.” When that surveillance and investigation results in nothing, it is a red flag.

How MSS has likely benefited from this is obvious. MSS operatives would only need to put themselves in a position to be hired in any more formal process of becoming a surveillance operative for a contractor for US intelligence and counterintelligence services and law enforcement. As some will tend to seek a diverse pool of operatives, they will usually consider all applications with scant vetting in part to accelerate the hiring process but mostly to avoid the expense. After making certain they have presented themselves as qualified candidates, the MSS operative is very likely hired. If they can situate themselves in the vicinity of a diplomatic installation of the Chinese government or the proximity of a site in which MSS or another Chinese intelligence service might be operating, like a canary in a coal mine, a call or text from a US counterintelligence contractor request the operative participate in a surveillance nearby will notify the MSS that their people may be under observation. In addition, the MSS operatives can make a few extra dollars courtesy of the US taxpayer. (While it may strike one as daylight madness, one can rest assured that it is actually happening daily!)

What may be shocking and surprising to MSS managers are those occasions when errant officers, in an effort to manufacture a case, will submit knowingly false information to the Foreign Intelligence Surveillance Court (FISA Court) to secure warrants and authorizations for warrantless searches and surveillance against a wrongly targeted citizen. It happens more than the average US citizen could imagine. The bigger the lie that they tell about the innocent citizen, the more significant the case will be. That means greater resources will be alloted for it. In the process of obtaining FISA Court warrants and. authorizations, administrative personnel in the errant officers’ counterintelligence organization, particularly attorneys, who have the responsibility to oversee the correctness of applications to the court, have been known to simply rubber-stamp them. As for FISA Court judges, they tend to simply accept whatever is in the applications as valid.

A counterintelligence focus on the innocent US citizen will always be at the errant officers instigation. On one end of the chain are errant officers focused on enriching themselves with taxpayers dollars on the other end is some poor chap, knowing by God that he is innocent, who is nevertheless having his life turned upside down wrongfully. The errant officers will not hesitate to manufacture false information to submit to include tutoring so-called informants in preparing false statements for them. Sadly enough, as mentioned earlier, the errant officers can pick out informants who would be willing to prepare such statements and they will be handsomely paid. To paraphrase a recent remark by US Senator Charles Schumer of New York on the tactics, techniques, procedures, and methods of the US Intelligence Community, they can come at you six ways to Sunday. Indeed, under the incredible weight of the US intelligence and counterintelligence services and federal law enforcement, some of the innocent are unable to survive without being harmed psychologically and physically. To enlarge on the point of damage done by errant US counterintelligence officers who misused and abused power and the tools provided them to protect the US, there are more than a few cases that are well-known to those who have worked in the intelligence industry. Rest assured, MSS managers have kept track of US news media reporting and collected information about those cases. Among the high-profile cases is that of Wen Ho Lee.

Wen Ho Lee leaving a Washington, DC courthouse in 2000 (above). In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. Reportedly, the US Intelligence Community received information from an intelligence source revealing that China had obtained details of the W88, a US nuclear warhead. The FBI investigation into the case erroneously pointed them to Lee. Lee was arrested in December 1999 and held without bail for 278 days. The FBI later eventually determined that Lee could not plausibly have been the source of information on the W88 to China. Still, the FBI moved forward with its investigation of Lee. Lee was charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Lee would file and win a lawsuit against the US government and five news organizations for leaking information that violated his privacy.

Circumstances concerning Wen Ho Lee were complicated, but not so much as to evolve into an episode so tragic and regrettable. Boiled down, his life, liberty, his ability to go on quietly pursuing what made him happy as a US citizen was torn to shreds based on a rush to judgment and the wrongful use of the awesome powers provided to the US intelligence and counterintelligence services and law enforcement to protect the US public. In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. Reportedly, the US Intelligence Community received information from an intelligence source revealing that China had obtained details of the W88, a US nuclear warhead. Allegedly due to certain pieces of evidence, the FBI investigation into the case, Operation Kindred Spirit, pointed them to Lee. Lee was arrested in December 1999 and held without bail for 278 days. The FBI was made aware that Lee, a US citizen and University of California at Los Angeles (UCLA) scientist at the Los Alamos National Laboratory, travelled twice to China in the 1980s to meet with scientists. During a interview with the FBI, Lee admitted that he had been asked by them to supply information that would assist China in developing a nuclear missile force. On a polygraph test administered by the FBI, it was indicated that Lee was not always being truthful in his responses. An examination of his computer revealed that he had transferred classified documents to an unsecured network and in the process deleted the security classification in the material. Reportedly, the information was accessed 40 times on a computer at the UCLA student union by an unknown user.

As the investigation into his alleged espionage began, Lee was fired from his job at Los Alamos by UCLA on March 8, 1990, under pressure from the US Department of Energy, which oversees the laboratory. The news media was informed of his dismissal by an unknown source and the stories were widely reported. While his alleged espionage was being reported, the FBI had determined that Lee could not plausibly have been the source of information on the W88 to China. The normative hope, yet perhaps a bit optimistic one given the players involved, would be that once exculpatory information existed that should prove one’s innocence, a FBI investigation would be halted. Nevertheless, the FBI moved forward with its investigation of Lee. Although the original espionage charge was dropped by the FBI, Lee was still charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Later, Lee filed a lawsuit against the US government and five news organizations–the Washington Post, New York Times, Los Angeles Times, ABC NEWS, and the Associated Press–for leaking information that violated his privacy. In August 2004, a US District Court judge in held reporters from four of the news organizations in contempt for not revealing the source that identified Lee as a spy. The government would pay over $895,000 to cover Lee’s legal fees and taxes. The news organizations paid Lee $750,000.

From the ostensible professional side of what occurred, one might say FBI investigators may have measured the impact of what they were doing in terms how they looked before managers and whether their case at least had the appearance of being viable. They did not measure their impact in terms of the population of which he was part, Chinese-American professionals working in national security areas, many of whom were left fearful of being looked at or pursued whenever an espionage case had a China nexus. Indeed, Lee and his supporters have argued that he was unfairly singled out for investigation because he was Chinese-American. Wen Ho Lee was not the enemy but has been called a victim of the blind, unfettered power of a few men hiding behind the shadows who possessed a little brief authority. That bit of humanity that should exist in each human heart was in such insufficient quantity in the counterintelligence special agents handling his case. In his book Securing the State, David Omand, former United Kingdom intelligence and security coordinator, wrote security intelligence operations—such as counterterrorism and counterintelligence—require cooperation between security officials and civilian populations among whom threats wish to hide. In the case of Chinese intelligence, this includes ethnic Chinese émigré communities, which, at least in the US, are now suspicious of the FBI. The botched investigation of Wen Ho Lee, in Ormand’s view, appeared to be politically (or racially) motivated witch hints rather than the serious security investigations they were. To Chinese-Americans, these suspicions and resulting investigations are the natural result of an unwillingness to analyze Chinese intelligence more rigorously on the basis of evidence.

For the MSS, the Wen Ho Lee case undoubtedly provided considerable lessons and the possible makings for a countermeasure to thwart efforts by US counterintelligence against its foreign intelligence operations inside and outside of the US. MSS managers would know better than anyone that Wen Ho Lee was not functioning as an intelligence operative for their organization or any other Chinese intelligence service. Given that Lee’s visits to China, professional discussions with scientists, and conversations with MSS, which its officers furtively initiated and to which he did not respond to positively, apparently served as indicia that he was a Chinese operative, US counterintelligence services, in this case the FBI, made the decision to act aggressively toward him. Doubtlessly, repeated authorizations for searches and surveillance were secured from the FISA Court and the pressure placed on Lee was intense. MSS managers surely from a distance, and at times likely up close, monitored how US counterintelligence resources were poured into Lee’s case. Meanwhile, they would smile as MSS officers, operatives, and informants, on the ground in the US, perhaps in the very locations in which US counterintelligence officers were surveiling and investigating Lee, were functioning with seeming impunity. What shrewd MSS managers likely reasoned from the episode was that calling more Chinese-American scientists, engineers, academics, and other scholars to China for conversations with their counterparts, would allow for the creation of dozens of potential decoys, or, to use the parlance of the intelligence industry, unwitting “dangles” out of those visiting experts which US counterintelligence services perchance would chase around whenever true MSS officers, operatives, or informants stole highly-prized information and data from the US. The tactic would be relatively low cost, low risk, and US counterintelligence services would really do all the work to make the effort successful. There would likely also be the hope among MSS managers that US counterintelligence would even chase Chinese-Americans that the MSS had no contact with whatsoever. What is presented here is by no means an unwarranted extrapolation. The question that should really pique interest is whether the MSS had such a countermeasure in place long before Lee first visited China to speak with scientist counterparts. While one might expect they have been interviewed regarding such a possibility, defectors, whose own foreign intelligence activities were likely compartmentalized, would unlikely know about a secret Chinese counterintelligence program such as the one hypothesized.

Robert Mueller (above). Perhaps one of most disturbing abuses of power by US counterintelligence elements was the continued clandestine use of powers and tools designed to deal with terrorists and actual foreign intelligence operatives against candidate Donald Trump to prove that he and his campaign colluded with the Russian Federation. In what was hands down a sham investigation, there was a total breakdown of the rule of law. Facts were manipulated. There were deliberate efforts to defraud the FISA Court to secure warrants, authrizations for warrantless searches and surveillance, and near unlimited powers to use against US citizens. A host of other nefarious acts were committed system wide. One can hardly imagine that one morning a group of civilian US counterintelligence officers from the very top to the rank and file decided to take on the US President and give some new tactics a try. Every step taken against Trump’s campaign and administration was undoubtedly well-rehearsed in prior cases. A significant advancement of their cause occurred when former FBI Director, Robert Mueller was appointed Special Counsel to Investigate Russian Interference with the 2016 Presidential Election and Related Matters on May 17, 2017.

Perhaps one of most disturbing abuses of power by US counterintelligence elements was the continued clandestine use of powers and tools designed to deal with terrorists and actual foreign intelligence operatives against candidate Donald Trump for collusion with the Russian Federation and the subsequent investigation of the administration of US President Donald Trump. Investigative journalists and concerned Members of the US Congress have informed that the wrongful, ghastly spying was conducted under the name, “Operation Crossfire Hurricane.” In what was hands down a sham investigation, there was a total breakdown of the rule of law. Facts were manipulated. There were deliberate efforts to defraud the FISA Court to secure warrants, authorizations for warrantless searches and surveillance, and near unlimited powers to use against US citizens. A host of other nefarious acts were committed system wide. Incontrovertibly, the activities of US counterintelligence officers, themselves, ironically could have impacted the outcome of the 2016 US Presidential Election. One can hardly imagine that one morning a group of civilian US counterintelligence officers from the very top to the rank and file decide to take on the US President and give these tactics a try. Every step they took against Trump’s campaign and administration was undoubtedly well-rehearsed in a great number of prior counterintelligence cases. The conspirators were seemingly absolutely confident in the prospects for their success. A significant advancement of their cause occurred when former FBI Director, Robert Mueller was appointed Special Counsel to Investigate Russian Interference with the 2016 Presidential Election and Related Matters on May 17, 2017. Mueller’s office has issued more than 100 criminal counts against 32 people. Among those ensnared in the investigation was Michael Flynn, Trump’s former national security adviser. Flynn was coerced into a plea agreement requiring him to admit gulit to lying to the FBI about his contacts with the Russian Federation ambassador to the US.

As of this writing, much attention is being given to senior executives and managers involved in the illegal activity against both President-Elect Trump and then President Trump. However, the willingness of a number of line officers in US counterintelligence to commit wrongful acts, and failing to report malfeasance and illegal actions of their superiors leaves no doubt about the complicity of more line officers than at least publicly acknowledged on the matter. They operated against a trusting presidential candidate, and that candidate became president, and members of his administration. Hands down, the evidence points to an overarching culture within the US counterintelligence service that it’s members were above the law. It is always far easier for one to betray those who give one their trust. It was the impressive intuition and intimations of Trump over what was happening around him which provided the initial faint signal, largely dismissed by friend and foe alike, that something wrong was going on.

Tragically, concern over the harm caused to the innocent is a feeling senior executives, managers, and supervisors notoriously lack. Typically, when private citizens have been put in such dreadful situations as to be falsely accused or mistakenly identified, one would get the impression that in the minds of senior executives and managers of those organizations that only person who really has a problem is the one to whom all of the wrongful actions are being perpetrated against. Too often senior executives and managers seem in greater fear for the reputation of their organizations if real corruption is unmasked than fear failing their duty to support and defend the US Constitution, to uphold the rule of law, and protect the well-being of US citizens. Further, as long as their organization is considered a trusted, reliable government source, and few would accept the word of an innocent US citizen accused of espionage or worse over their organizations, they tend to behave as if the problem will take care of itself. Much damage has been done to US counterintelligence capabilities today as a result of their delinquency. (Given some of the publicly known facts of the counterintelligence operation against Trump, senior executives and managers of counterintelligence organizations involved actually pushed the case forward despite lacking an authentic legal cause for doing so. That lack of obedience to the law and procedure could lead one to believe they knew that the opportunity would be created for all types of wrongdoing as described to transpire in the field, but senior executives and managers showed little concern over that. The whole enterprise was scandalous. Nemo repente fuit turpissimus. (No one suddenly becomes bad.))

Michael Flynn (above). Among those ensnared in the investigation was Michael Flynn, Trump’s former national security adviser. Flynn was coerced into a plea agreement requiring him to admit guilt to lying to the FBI about his contacts with the Russian Federation ambassador to the US. Tragically, concern over the harm caused to the innocent is a feeling senior executives, managers, and supervisors notoriously lack. Typically, when private citizens have been put in such dreadful situations as to be falsely accused or mistakenly identified, one would get the impression that in the minds of senior executives and managers of those organizations that only person who really has a problem is the one to whom all of the wrongful actions are being perpetrated against. Too often senior executives and managers seem in greater fear for the reputation of their organizations if real corruption is unmasked than fear failing their duty to support and defend the US Constitution, to uphold the rule of law, and protect the well-being of US citizens.

MSS intelligence and counterintelligence officers have had ample opportunities over the years to get an even closer look at personnel and performance of US counterintelligence organizations. Certainly, in planning meetings, strategy and operational reviews, as well as in debriefings of MSS officers upon their return home, much time is spent collecting information that will allow for the construction of an outline of the psychological foundation of adversarial counterintelligence services and law enforcement organizations. However, one could imagine that information most prized is that acquired through passive collection by operatives and agents quietly placed where the counterintelligence officer could easily make the mistake of dismissing them. Surely, that elucidating information, most likely sent directly to Beijing from the US, from an intelligence perspective, would be among the most important collected. It could be counted among the bread and butter operations in the US, having undoubtedly been going on for years. Interestingly, few to none of the fellow case officers or special agents in the errant officers respective offices or organizations ever report them to superiors. MSS managers undoubtedly view that as supportive of the Communist Party of China line about the moral and ethical weaknesses of the US system, and evidence of the figurative cracks that will lead to its eventual collapse.

When MSS managers consider what makes these errant officers tick, collected information would undoubtedly support possible answers as varied as their behaviors. The mindset that makes engaging in corruption so comfortable that may perchance be the result of being exposed to the mindset of senior officers in their organizations who came of age the free-wielding era of War on Terror and wars in Iraq and Afghanistan in which the manual was often tossed aside by members of the US Intelligence Community. There was a go get ’em mentality in place in which procedures were ignored, wrongful short-cuts were taken, and countless rules were broken. Billions in taxpayer dollars remain unaccounted for. Authority that many legal experts still insist went far beyond what any Member of Congress would normally countenance under the US Constitution were granted under the USA Patriot Act. One might suppose that the exposure of recent generations of counterintelligence officers to such thinking has allowed such negative behavior to become inculcated among those in the field. The thirst to control the lives of others negatively becomes unquenchable. Perhaps the uneven thinking, and aberrant attitudes and behavior of these misplaced errant officers is stimulated by the unique responsibilities, authority, activities, and stressors of intelligence work. Stoicus noster, “Vitium,” inquit, “non est in rebus sed in animo.” (Our Stoic philosopher said, “Vice is not merely in one’s actions but in the mind itself.”)

The misfortune of having such misanthropes as the errant officers in what should be an elite organization is something with which MSS officers are somewhat familiar. Indeed, the corruption of those sworn to protect their nation, and in China’s particular case, those sworn to uphold the values and ideals of the Communist Movement, and obey the edicts of the Communist Party of China, is a deficiency that has been dealt with in China on occasion. by MSS, sometimes at the very top of the organization. In April 2015, Zhou Yongkang, a former member of the 17th Politburo Standing Committee and Secretary of the Central Political and Legal Affairs Commission (Zhengfawei) between 2007 and 2012, was formally charged in April with taking bribes, abuse of power and intentionally leaking state secrets. As Secretary of the Central Political and Legal Affairs Commission, Zhou oversaw China’s security apparatus and law enforcement institutions, with power stretching into courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs, to include the MSS. At the end of a closed door trial that began on May 2015 in the Tianjin No.1 Intermediate People’s Court, it was ruled that Zhou and his family had taken bribes totaling 129.7 million yuan (approximately $18,835, 317) from his close allies. The court declared that Zhou abused his power by requesting Jiang Jiemin, the former head of the State-owned Assets Supervision and Administration Commission and former chairman of the state-run China National Petroleum Corporation (CNPC), where Zhou was a top official for 10 years. Li Chuncheng, former Sichuan deputy party chief, directed more than 2.13 billion yuan of illegal gains to his son and other businessmen, causing a loss of 1.48 billion yuan to the Chinese economy. Zhou also provided Cao Yongzheng, who is a “qigong (ancient Chinese exercise and healing technique) master,” six classified documents, of which five were top secret. Since some evidence of his crimes involved state secrets, the trial was not open to the public. The maximum punishment for bribery is death; both the abuse of power and the state-secret charges each carry up to seven years in prison. However, the court stated that although Zhou had accepted a “huge” amount of bribes, but given the mitigating circumstances that he had confessed his crimes, pleaded guilty, and most of the bribes had been taken by his relatives, he had asked them to hand back the money, and all the money had been confiscated, he was given a “lenient” punishment. On the charge of abuse of power, he received seven years’ imprisonment. For the charge of leaking state secrets, he received four years’ imprisonment. Zhou, 74 at the time, was essentially sentenced to life imprisonment by the court. Further, Zhou was stripped of all political rights for life and all his personal assets were confiscated.

Former Secretary of the Central Political and Legal Affairs Commission, Zhou Yongkang, in court (above). The misfortune of having such misanthropes as the errant US counterintelligence officers in one ranks is something with which MSS officers are familiar. In April 2015, Zhou Yongkang, a former member of the 17th Politburo Standing Committee and Secretary of the Central Political and Legal Affairs Commission between 2007 and 2012, was formally charged in April with taking bribes, abuse of power and intentionally leaking state secrets. As Secretary of the Central Political and Legal Affairs Commission, Zhou oversaw China’s security apparatus and law enforcement institutions, with power stretching into courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs.

Returning to the matter of errant officers in US counterintelligence, make no mistake, however, the errant officers’ disregard of the counterintelligence mission are characteristics doubtlessly most favored among MSS senior executives, managers, and officers in the field. MSS would surely try to collect concrete information on them such as their education and employment experience, financial reports, family relations, friends, personal habits, tastes, and dislikes. MSS would very likely possess some of the most thorough studies prepared on the capabilities and capacity of US intelligence, counterintelligence, and law enforcement, and put enough faith in what they have amassed and know, given it has committed such enormous numbers of officers to the great intelligence game being played inside the US.

MSS managers, while still cautious, may have deduced that due to the presence of so many bad apples in the US counterintelligence services, they cannot pose any real threat to their operations. Any portion of the figurative noose US counterintelligence organizations might try to put around the neck of MSS officers, operatives, informants, or overall operations would surely be frayed because of the errant officers presence. To go an adage further, a chain is only as strong as its weakest link. Certainly, in planning meetings, strategy and operational reviews, as well as debriefings of MSS officers when they return home, time is spent attempting to outline the psychological foundation for US counterintelligence officers that opposed them and the nuance of tradecraft they observed being used against them. MSS would likely make assessments of the extent to which any of the errant officers encountered might allow for small gaps or gaping holes in the US defense and how they deplete morale. Perhaps they are even familiar with their names and postings. Assumably, they would want to be familiar with those among that sort of errant officer who have actually moved up to become managers.

MSS managers may determine that the errant officers display all the telltale signs of being misanthropes. There is a palpable bitterness of spirit in their hearts. They loathe their organizations. Everyday, they condescend in order to even sit with the other officers in their organization. They likely feel an aberrant sense of sacrifice. Professionalism, collegiality, gentleness seen in supervisors is viewed as a weakness. They look upon their adversaries with disdain, too! That sensibility would not be expressed with gymnasium locker room joviality, but rather a red hot mean spirit. They typically are unwilling to respect their adversaries capabilities. They do not try to understand their adversaries. They certainly never attempt to learn from their adversaries. In their offices, a MSS operative or informant might also passively hear them speak poorly of operatives and informants. One might ponder when seeking to insult, ridicule, humiliate, and bully, ever become required aspects of counterintelligence work. Officers of such stripes will typically speak far worse of subjects of investigations. Perhaps they spend so much effort doing down their adversaries, operatives, and informants in order to make up for their own lack of self-esteem.

Ralph Waldo Emerson has been misquoted as stating: “What lies behind us and what lies before us are tiny matters compared to what lies within us.” The correct provenance is Henry S. Haskins in his book, Meditations in Wall Street (William Morrow & Company, 1940). Nonetheless, the adage holds true. Since the errant counterintelligence officers have already proven themselves willing to go so far in the wrong direction for such things, imaginably the affections of a few could still change. Uncovering the nucleus of the wrongful behavior is not the goal, or should not be. The chief feature to be found is some aspect or aspects of the errant officers’ character that can be capitalized upon for MSS purposes. On this particular point, it could be imagined that MSS counterintelligence officers will never cease keeping their eyes open and ears perked up for opportunities. It would be a dereliction of their duty not to do so. From one perspective, it might be assumed that although they have recruited US counterintelligence officers, albeit paltry numbers, they would not bank on catching such breaks on some regular basis. They understand that a usual part of the errant officer’s line of thinking is to have more and to have something better, not to have something different somewhere else. On the other hand, the temptation of easily acquired wealth could be too difficult for some errant officers to resist. Semper avarus eget. (A greedy man is always in need.)

While there is no public evidence that would allow one to allege either engaged in the behavior ascribed to errant officers discussed here while they worked in their respective US intelligence services, the cases of both Kevin Mallory and Rob Hansen provide further support to the idea that US traitors will generally place their own financial gain over their country’s national security and well-being. Mallory’s case was outlined in “Part 1” of this essay. However, adding to what was already relayed from the US Department of Justice criminal complaint stating on May 5, 2017 is the fact that Mallory used a special phone that he received from his MSS handler. With it, he sent the message: “Your object is to gain information, and my object is to be paid for.” In the case of Ron Hansen, mentioned earlier here, prosecutors claim he was paid as much as $800,000 over several years.

Former MSS operative Ron Hansen (above). There is no public evidence that would allow one to allege he engaged in the behavior ascribed to errant officers discussed here when he worked in the Defense Intelligence Agency. However, the case of Rob Hansen, mentioned earlier here, provides further support for the idea that US traitors will generally place their own financial gain over their country’s national security and well-being. Prosecutors claim Hansen was paid as much as $800,000 over several years.

In the case of errant officers, MSS managers may deduce that the pursuit of money would certainly be a weakness to exploit, considering how secure most of them likely feel after being allowed for so long to pursue cunning schemes to acquire personal gain through the system wrongfully. A clever MSS manager could potentially devise a scheme to make them anxiously grab for more. MSS may even apply patience, and decide to approach the errant officer after retirement. In retirement, the money and gifts might have greater meaning for them. For MSS counterintelligence, recruitment of US intelligence and counterintelligence officers, active or retired, with access is always the matter at hand when specifically conducting research on a US counterintelligence officer. Bringing in a US counterintelligence officer is always a huge victory for the MSS and for China. Note that MSS would hardly be the only foreign intelligence service aware of problems in the US apparatus.  However, circumstances may be worse than leaders, senior executives, and managers in some US counterintelligence services might imagine or care about. Again, the caveat must be expressed that the ugly characteristics discussed cannot be attributed to all US counterintelligence officers in the field. However, the point is being made that they have likely been observed enough to convince decision makers in the MSS that officers deployed in the US may act boldly, ubiquitously, voraciously, and with greater intensity everyday in their efforts to collect all technologies China lacks as well as any other information demanded by their masters in Beijing.

The Desultory Pursuit of the MSS by US Counterintelligence

Quidquid dicendum est, libere dicem. (Whatever must be said, I shall say freely.) As noted earlier, the trickle of successes publicly announced are perhaps soothing to an unknowing public, creating the appearance that the US is pushing back on Chinese intelligence operations. However, everything that has been announced has hardly been enough to put the US on track to defeat, disrupt, the networks of the Chinese Intelligence services relative their size and strength in the US.  It would seem that senior executives in the US intelligence, counterintelligence services and law enforcement have not expended much time on pondering the unanswered question of why MSS has proceeded with such confidence in the US. When leaders of civilian US counterintelligence services and law enforcement go as far as to publicly admit lacking a knowledge of how severe an adversaries efforts and successful penetration has been, it almost seems as if they try to convince all that their adversaries were using some sort of witchcraft to accomplish all that they have. However, they are really only discussing symptoms of an illness that is making their organizations sickly and may eventually incapacitate them.

The preceding discussion on errant US counterintelligence officers does not depend upon any detailed inside story. While there will doubtlessly be endless knee-jerk reactions rebuking the expression of this reality, it is nevertheless a reality sufficiently known in the intelligence industry inside and outside the US. The US might have a better chance defeating MSS operations with Chaldean Numerology as long as enough errant counterintelligence officers are discussed here within the system. What has been happening so far concerning leaders, senior executives, and managers of US counterintelligence services is that they usually satisfy themselves by striking a happy medium between stellar work by those officers who are determined to do their jobs right and bring down adversaries’ intelligence operations in the US and the poor performance of others for reasons unknown. Indeed, while problems as those emphasized here concern day-to-day performance in the ranks, leaders, senior executives, and managers will more often look at the overall performance of officers in the organization statistically, by which everything likely evens out nicely.

Where there is some indication of problems being caused by errant officers, supervisors and managers will often compound the wrongdoing of errant officers not only by sitting on their hands on the matter, but by denying and covering it up. Such responses have had their impact. One might imagine colleagues, officers working the same shop, or close, at a workstation neighboring that of the errant officers, passively acquiring information about what they are doing, observing attitudes and behavior might become aware that unseemly and illegitimate activities are afoot in their cases. However, it is also hard to imagine them coming to supervisors or over their managers’ heads knowing how little is actually done to deal with such situations. There is also the potential threat of finding themselves being investigated for being too interested in the work of a fellow officer or in retaliation for trying to make the supervisors, the managers, the office and perhaps even the counterintelligence organization look bad. One might imagine that officers of other counterintelligence services, working the same area of operation, against the same target country, might occasionally get wind of something foul going on in a sister service in activities against an US adversary. However, if not an inquisitive officer’s supervisor, perchance managers would become dismissive or even angered at the news, and express the view that it is neither their organization’s job to point out deficiencies in, nor to investigate, sister organizations. With regard to innocent US citizens being targeted by errant officers, few to none of the fellow case officers or special agents in their respective offices or organizations, upon discovering what is transpiring, will make even the slightest effort to establish the wrongfully targeted citizen’s innocence. The climate is never really right in US counterintelligence organizations to report any wrongdoing. The miracle of the citizen’s rescue will need to come from an external source if that rescue comes at all.

One might imagine that local police departments in large cities in which counterintelligence activity may be taking place might come across some stories of aberrant federal activities given their ears are closer to ground listening to everything than anyone else. It may actually be the case that an innocent US citizen may go into the local police department to complain about odd surveillance activities or the harm of “dirty tricks” being played on them as part of the errant officers false counterintelligence effort. Typically, the local police officers, much as officers of sister counterintelligence organizations, will not desire to get involved, pointing to fact that it is not the responsibility of the local police department to point out deficiencies in, or investigate, federal counterintelligence organizations. In fact, those officers in local police departments, not so worldly wise that they would know to keep their distance from such wrongful activities, might find themselves sucked into them after some convincing by the errant officers. They would perhaps unwittingly make themselves co-conspirators and place their own careers in local law enforcement in jeopardy. Sed quis custodiet ipsos custodes? (But who will guard the guards?)

Each one of these typical and expected responses will with some certainty aid adversaries operating in the US more than one might imagine. The type of counterintelligence officer described here will be stopped by higher authority only if somehow someone shines a great light on their activity that might be seen by the news media or the US Congress. However, no one should count on that as a means to curb such wrongful, wasteful behavior.

The French Emperor Napoleon Bonaparte explained, “In war, three-quarters turns on personal character and relations; the balance of manpower and materials counts only for the remaining quarter.” One must recognize that in any organization, when elements such as good oversight, employee satisfaction, dedication, and motivation, comradeship, an overarching esprit de corps, and mentoring and encouragement from senior leaders who are present on the line, just to name a few, some employees may begin to fall out of step, not in the form of lateness and absenteeism, but drift away from rules and regulations, practices and procedures. Very often, that reality about employee performance can remain unknown to managers and senior executives of the organization. They may only know what is reported on paper and what little they may see. The choice of what to believe is often limited to the most convenient answer. Performance reports, even if read, may contain anything glaring depending on the nature of relationships between line employees and the supervisors; levels of performance may likely be evaluated as nominal generally. In some cases, levels of performance might even exceed expectations. (That was the case with a number of prominent US pharmaceutical companies recently.) After enough time passes, the organization’s policies on how employees are to perform their tasks, that have been crafted with due consideration of how to respond to a variety of seen and unforeseen contingencies, may be matter-of-factly ignored, supplanted by a collection of employee-styled practices that hardly reflect what managers and senior executives originally put in place, want, or should expect. When the organization’s situation looks good enough, and work is certainly getting done to some acceptable degree, a complacency can set in at the top and performance problems can continue to persist for an unimaginably long time until there is some sort of breakdown, perhaps catastrophic. The employee-styled approach, based on what looks good rather than what is good, may offer no answers, no solutions when a crisis ensues at that organization.

The honor system does not work so well in today’s world. Ambition and the need for immediate gratification turn one’s mind to taking short-cuts, bending the rules, to get what is desired quickly. In today’s intelligence industry, which exists in today’s world, too, the threat to the system is not simply disloyalty and defection, founded on corrupted thinking and moral ambiguity similar to that lately found in civilian businesses. There will be those case officers and special agents who, after a time in service, may not want to accept what they are given but take what they believe they deserve. Certainly, not all embody maturity and secure, friendly, unflappable authority as one might expect. Even if those few errant case officers and special agents are able feign the possession of such qualities by emulating their betters. Given enough time, they will find the way back down to their true “Animal House”-level, and disappoint to the fullest. If you take away their gas allowance, stipend for use of privately owned vehicles and other property they may take something else. If you cut reimbursement levels for meals with informants and operatives, they may take something else. If they are not allowed overtime for late night work as meetings with informants and operatives, they may skim off payments to informants and operatives for services rendered. (This particular wrongful practice, embezzlement, has been called “making a extra pension for oneself!”) Certainly, the human mind tends to struggle with the incomprehensible.  However, that should not be the case. Again as mentioned not all civilian US counterintelligence are the same. Others are in cracking form, and work diligently and professionally.

As it directly concerns relations between rank and file with senior executives and managers, much as a virus, those on the beat who begin to act on contemptuous feelings may soon find others to take down the same destructive path. The “us-them” mentality that can develop among those in the field toward managers and bureaucrats in the upper echelons makes the decision of errant, dishonorable officers and special agents to engage in and conceal malfeasance easier, more comfortable. Not to offer an excuse, but such insouciance toward right and wrong at the lower levels may actually be learned by errant officers in their respective organizations. It very likely became inculcated in their organizations perhaps because managers as a practice for years may have turned a blind eye to wrongdoings.

As witnessed during the years of the repugnant US counterintelligence attacks against Presidential Candidate and President-Elect Trump as well as during the attack against Wen Ho Lee, both aforementioned, a private citizen is typically falsely accused and made a subject for investigation with little real evidence except surmisal, animus, or worse bigotry. Management must keep an eye out for that sort of thing. Admonishment from managers and supervisors in both cases expectedly should have been to stick with the primary problem instead of rooting around at extraneous matters. Nothing was done. Apparently, nothing out of the ordinary was happening. Attendant to having a counterintelligence investigation levelled against them, the innocent citizen can become a target for dirty tricks by US counterintelligence organizations and their contractors as well. Further added to the citizen’s problems is the willingness of federal, state, and local counterparts working as a task force on other matters as counterterrorism will usually make their manpower and other resources available to support the efforts of the counterintelligence organization. Regarding the federal case against Carter Page, which was directly linked to the inarguably fraudulent investigation of Trump, it was revealed by investigative journalists and Members of the US Congress that US counterintelligence officers engaged in what is apparently a regular practice of dragging friendly foreign intelligence services and counterintelligence services into their wrongful investigations. Under cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and  inside the US. (Many foreign intelligence services of other countries, particularly medium to small sized organizations actually love being brought into US intelligence operations of any kind. It gives them the opportunity to have a place at the table with the US, there will usually be important lessons learned, supposedly good relationships with US counterparts will be enhanced or created, and most of all, there will be financial benefits courtesy of the US taxpayer.) Once a single individual’s freedom is trodden on, everyone’s freedom is lost! When all of this wrongdoing occurs, every employee’s work in a US counterintelligence organization has less value, meaning, purpose. The organization ceases being a force for good and simply becomes a pit of evil.

Carter Page (above). In the federal case against Carter Page that was directly linked to the inarguably fraudulent investigation of Trump, it was revealed by investigative journalists and Members of the US Congress that US counterintelligence officers engaged in what is apparently a regular practice of dragging friendly foreign intelligence services and counterintelligence services into their wrongful investigations. Under cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and inside the US!

When leaders are delinquent in cracking down on such “malfeasance,” or actual criminality, the dishonorable act as if dishonor is sanctioned. The errant officers engaged in odious behavior would only feel protected by the belief that no one wants to find out whether they are doing their jobs right, and no one will know as long as they keep their activities concealed. When a Procrustean bed of standards and practices exists, deviation from the correct path is essentially assured. Sadly, much damage has been done to US counterintelligence capabilities today as a result of the delinquency of many senior executives and managers over the years. As a result of these ugly situations, counterintelligence organizations have suffered, too, albeit not remotely to the degree of the innocent citizen.

Virtus est vitium fugere, et sapienta prima stultitia caruisse. (To flee vice is the beginning of virtue, and the beginning of wisdom is to have gotten rid of folly.) It is essential that senior executives and managers ensure that all of their line officers are performing their duties correctly at all times and the system is working optimally. They must travel to field offices of their organizations and find out what is really going on. That does not mean going to the offices of the organization to skylark, taking a cursory glance at everything, asking prosaic questions, merely accepting glowing reports of how great every is and being satisfied. That sort of desultory examination would serve no purpose. Instead, with whatever powers they may possess, they must engage in gumshoe detective work to see what they can see. Usually, where there is smoke, there is fire. Embers can serve as evidence of some activity hastily halted or What leaders and senior executives cannot see or confirm with their own eyes during such tours of their respective organization’s field offices, they must use all concrete indicia to conceptualize what may be happening. When everything is right, everything will be gun barrel straight. To be successful in an intelligence or counterintelligence service, a leader must know a lot about humanity. The leader must especially know a lot about human relationships. The leaders have got to know “how people tick.” There are said to be certain secrets and knowledge of human existence, human circumstance. Whatever knowledge a leader of such an organization might possess, full use of it must be made, too, along the lines of excellence. Visits “downstairs” by leaders should not be allowed to devolve into self-serving investigations into their own popularity among line officers and administrative personnel.

As a suggestion, leaders might look through files of officers in search of exorbitant numbers of payouts, massive distributions of gifts, and relatively excessive expenditures on contractors surveillance activities for cases that ended up being marked failed and closed. The errant officers often provide a cloak of legitimacy for unsuspecting eyes is the establishment of cooperative arrangements between their organization and counterintelligence elements of sister organizations to pursue their cases. The fact that money would be coming in from an additional source and that there were managers of other organizations who saw value in the case, would usually be enough to confirm for errant officers’ managers that the decisions, activities, and expenditures by them were viable. Another place for auditors to look in the errant officers files would be code names for both the subjects of investigations as well as informants and surveillance operatives. With the intent of being discreet and not providing a tutorial, suffice it to say that often there will be multiple code names used for one informant or operative. Payments secured for the multiple code names from finance offices may be deposited in multiple personal bank accounts.

Ad mores natura damnatas fixa et mutori nescia. (Human nature ever reverts to its depraved courses, fixed and immutable.) During the Cold War, it was the case in the US Intelligence Community that a highly suspicious senior CIA official, James Jesus Angleton, reigned as the figurative high priest of counterintelligence. He conducted vigorous and plentiful internal investigations against case officers, defectors, and informants, creating a frightful degree of apprehension and insecurity within the rank and file of intelligence and counterintelligence services. This is certainly not a call for a return to those days.

Many members of US intelligence and counterintelligence services and law enforcement would very likely be touchy if they came across the meditations of greatcharlie presented here. However, far more than anything else, those feelings would be due to an emotional response. A manifestation of the thinking that has prevented those organizations from finding what is wrong and being satisfied with the 1870 attitude similar to that of the Supreme Command of the French Imperial Army on the eve of the Franco-Prussian War of debrouillez-vous (“We’ll muddle through somehow”). Those leaders of those organizations are too comfortable living a superficial existence, underestimating their own destiny, dignity, and nature. Ideally, they would be able to put their pride in their pockets and properly see it all as an opportunity to make use of an examination from outside the box as presented by this essay to make real, positive change to greatly improve their capabilities.

Taking simple steps as those mentioned here will do more than anything else to help close the distance between US counterintelligence and the MSS to allow for the leveling of more successful and decisive blows against their networks and operations. Given half the chance, US counterintelligence would perform far better. Given the unforgivable, illegal treatment and great harm civilian US intelligence and counterintelligence services have caused Trump, one would reasonably think that they would attempt to do as much as possible, perform well beyond expectations in the right way, to make amends for their sins. One should not be able to presume comfortably that such thinking is a degree of humanity that may be lacking within the heads and hearts of leaders of the respective organizations. Plus novisti quid faciendum sit. (You have learned more what has to be done.)

The Way Forward

Rapiamus, amici, occasionem de die. (Friends, let us seize the opportunity from (of) the day.) As stated earlier, the fact that the Chinese government initiated all of the ongoing difficulties cannot be credibly argued against. However, very sadly, Beijing so far has not demonstrated any interest in acting voraciously concerning the present matter of the coronavirus. Surely, the two countries are not at a point yet when the dark waters of despair have overwhelmed their leaders. When diplomats from both sides meet, they must approach each other with a certain buoyancy and hope. In the face of that the US, as the true dominant power in the world must maintain its poise. There remains a plethora of bilateral and some multilateral issues of great importance between the US and China that are seemingly distanced enough from all that is happening in the forefront and are in the process of being resolved. There are the issues of: trade, intermediate nuclear weapons, North Korea denuclearization, the border dispute with India, Hong Kong, Taiwan, international terrorism, transnational organized crime, counternarcotics policy, and space. Of course, there are adverse matters that may arise related to the coronavirus that cannot be ignored. The US must not react to them. It must always act in a measured way using effective means, at a time and place of its choosing. For the US Intelligence Community, the political warfare effort tied to the coronavirus being pressed on the US from the Chinese intelligence services may hold primacy on the agenda given the diplomatic and political importance given to it. However, for it, defeating and displacing the networks and operations of Chinese intelligence services in the US, as permanently as possible, is job one.

When unexpected and unfamiliar things are explained the romantic sense of mystery stirred in readers about their nature can be smothered. The world is not always as one would have it. What is required is seeing beyond appearances to what is truth. No one is making a mountain out of a molehill here. Leaders, senior executives of US counterintelligence services might really want to take a deeper look, perform their own empirical studies of the actions of their respective organizations, to discover how other organizations with which they should be cooperating, such as military ones, and how adversaries of the US, likely see their organization. Perhaps the combined sense of sadness, anguish, betrayal, and anger might coalesce to prompt questions about what is really going on in the rank and file.

Reading federal indictments, criminal complaints, and judgments of those caught engaging in espionage for MSS over the past decade, one develops a picture of US counterintelligence having some success intercepting those who had already delivered a considerable amount of classified information concerning US national security equities, projects, strategies, operations, and policies, US tactics, techniques, procedures, and methods and US defenses against foreign intelligence penetration, and of course, cutting-edge technologies had been put in MSS officers’ hands. One can discern US counterintelligence has had great difficulty in devising ways to deter, disrupt, and destroy the intelligence efforts of MSS and other Chinese intelligence services before any secret government information or intellectual property of private firms and academic institutions that is the product of intense and gifted research and development work is lost. What should really be happening is MSS recruitment efforts should be leading over and over to traps. Information to which very costly, devious maneuvers might capture should prove to be cooked and valueless. MSS networks should be regularly penetrated by US counterintelligence, they should be rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. These tacks have been successfully performed to defeat the efforts of foreign intelligence services operating in the US going as far back as World War II.

Perchance the notion of setting out to attain such goals may seem pie in the sky, even Quixotic to those in US counterintelligence who may albeit be tired and uninspired, but such can be accomplished. Such things have been accomplished in the past against other foreign intelligence services under a similar set of circumstances. Smart people are known for being able to find answers to very difficult problems. An immediate thought is that new ideas for achieving such goals might be acquired from new types of sources. A reality about any system is that dogma exists, it can color the thinking of members of an organization, and it can insinuate itself into analysis. Additionally, supervisors in the analytical departments, knowingly and occasionally unknowingly because it would only be human, may place limitations on what directions, albeit even reasonable and logical ones, that analyses can move along. New thinkers may rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Outside the box thinking would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. Well-worn thinking would still have its place in other simpler issues. Hiring individuals for such out of the box assistance should be done with delicacy. There should be a certain exactness about the selection process. Those sought should be already known and possess the ability to present what may be unorthodox innovative, forward-looking perspectives. Hiring eccentric, whimsical, and outlandish thinkers would be unhelpful and undesirable. The projects on which the individuals would work on would be very compartmentalized and limited in scope and duration. The worst possible outcome would be to create some dreadful security problems. (Not that anyone would ask, but alas, greatcharlie’s editor is now a bit too long in the tooth to provide such outside the box assistance.) The actions of the MSS and other Chinese intelligence services, stealing away cutting-edge technologies and research and development, if left unchecked, could cause the US to face a difficult and reduced future. It is not just a scare story, designed to terrify US citizens. That is reality. The choice is to allow a set of unfortunate circumstances against US interests to slowly take shape or act now and begin to shape events in a manner that will ensure the US will retain its place as the world’s leader as time goes on. Deus hæc fortasse benigna reducet in sedem vice. (Perhaps God by some gracious change, will restore things to their proper place.)

China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1)

The Headquarters of the Ministry of State Security (above). China’s primary civilian intelligence service engaged in the political warfare struggle against the US is the Ministry of State Security (MSS). Yet, while fully involved in that work, MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. It has also robustly enhanced another mission of grabbing intellectual property and an array of cutting-edge technologies from the US. This essay provides a few insights from outside the box on the MSS, the tactics, techniques, procedures, and methods, it believes, help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US.

There was a time not so long ago when discussion in US foreign policy circles concerning China centered on issues such as trade, Hong Kong, Taiwan, the South China Sea, North Korean denuclearization, and human rights. Now the primary focus of discussion is the coronavirus. China is where the virus originated and was surely ineptly handled, setting the stage for the current pandemic. How China has responded to the crisis turned pandemic has been a source of curiosity and absolute outrage globally. Despite preening about its own advances in science and medicine, China proved not to be up to the task of handling the outbreak that most experts agree more than likely began disastrously in a Wuhan laboratory. It is difficult to fully comprehend what on Earth went on in the minds of China’s leadership upon learning about their country’s coronavirus epidemic. Shutting down cities and restricting travel was among the means to control the spread among their own citizens but China’s government was quite derelict in ensuring the virus would not break out around the rest of the world. Worse, the Communist Party of China and the National Party Congress were unapologetic and frightfully defensive concerning all discussion of China’s role in what was happening. China very quickly became exercised with the US over the matter. They became particularly warm toward US President Donald Trump. The words of official spokespeople were certainly not seasoned in grace. Although it has found itself in an unpleasant, contentious relationship with the US as a result of its own doing, Beijing has nevertheless effectively doubled-down on the behavior that exacerbated the situation. China’s government spokespeople will most likely continue to assail the global media with waves of distortions. At the same time around the world, the number of people infected by the coronavirus continues to increase, the death toll rises, and the financial loss is being calculated in the trillions. Hopefully, People’s Republic of China President Xi Jinping is well-aware of what is transpiring and has set some type of guidance on just how far this whole cabaret put on by Beijing should go. Numquam enim temeritas cum sapienta commiscetur. (For rashness is never mixed together with wisdom.)

The figurative hammer of the foreign and national security policy apparatus swung by the arm of the Communist Party of China against the US is China’s intelligence services. They are the ones on the front lines of the political warfare struggle. Among those intelligence services, the primary element engaged is the Ministry of State Security (MSS). The Ministry of State Security is the embodiment of the logic that created the Chinese system’s intimidating, authoritarian order and for years has choreographed events to accomplish the Communist Party’s purposes. To that extent, the Communist Party of China has entrusted the defense of “their creation,” the modern Communist Chinese state, to this complex government organization. China has only offered soupçons about the MSS, and even less than that lately. Unless one is engaged in diplomatic, intelligence, defense, military, or law enforcement work, MSS is an elements of the Chinese government with which most outsiders when engaged in their normal business related to China, whether inside the country, in a country near by, or even at home, will have contact, but will often be completely unaware. The ostensible purpose and task of MSS is to defend China against external as well as internal threats. By performing its mission of collecting vital information about China’s friends, allies, competitors and adversaries MSS gives the leadership of the Communist Party of China time to make decisions and space to take action. To that extent, the MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. However, it has also robustly enhanced another mission of collecting intellectual property and an array of cutting-edge technologies from the US. The Communist Party of China is surely counting upon it to successfully take on China’s adversaries in a large way with a small footprint. Interestingly though, there has been far greater discernment worldwide of MSS political warfare activities than Beijing might have imagined. The immediate implication of that has been the infliction of considerable damage to China’s reputation as a world leader. Veritas nimis saepe laborat; exstinguitur numquam. (The truth too often labors (is too often hard pressed); it is never extinguished.)

This essay does not focus on the political warfare effort by MSS, the nuts and bolts of which are somewhat straight forward, and compressed into summary form in the March 31, 2020 greatcharlie post entitled, “Commentary: Beijing’s Failed Political Warfare Effort Against US: A Manifestation of Its Denial Over Igniting the Coronavirus Pandemic”. It focuses on what the Ministry of State Security (MSS) is and what it does, day-to-day, for China. It is presented in two sections. This section, “Part 1,” provides greatcharlie’s insights from outside the box on the MSS and the tactics, techniques, procedures, and methods it believes both help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US. That discussion is buttressed by a few celebrated and trusted sources. “Part 2” continues that discussion and, without an ax to grind, greatcharlie calls attention to how, over recent years, a number of less-familiar, self-inflicted wounds have hindered the prosecution of a successful campaign by US counterintelligence services against the MSS as well as other Chinese intelligence services. The extent to which those same issues concerning US counterintelligence services have impacted the Trump administration is also touched upon. Without pretension, greatcharlie states that there is no reason for it to believe policymakers and decisionmakers in the White House and among US foreign affairs, defense, and intelligence organizations, would have a professional interest in its meditations on MSS intelligence operations in the US. However, it is greatcharlie’s hope that if given some attention, perhaps in some small way it might assist those who work on matters of gravity in this province improve their approach to defeating and displacing the MSS networks and operations as well as those of its sister organizations in the US. Bonus adiuvate, conservate popular Romanum. (Help the good (men) save (metaphorically in this case) the Roman people.)

People’s Republic of China Chairman Mao Zedong (left) and Kang Sheng (right). After the defeat of Imperial Japanese forces in China and prior to 1949, the Communust Party of China’s main intelligence institution was the Central Department of Socialism Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces, CDSA became one among a full array of government intelligence organizations that were created to supplement Party-based intelligence services. CDSA would draw information from foreign news agencies and open sources. It was hardly a very rewarding business.

Chinese Intelligence Under the Communist Party: The Beginning

The foundation of the Chinese intelligence services was laid during the revolutionary period in which the Communist Party of China sought to establish its rule. In the early 1930s, two intelligence services existed. One was centered in Shanghai and the Communist Party, the other was based in the Chinese Communist government that existed in Shaanxi where Mao Zedong established his base after the Long March. The later intelligence service proved to be the stronger of the two. By the late 1930s, it was replaced by a newly created Social Affairs Department (SAD) within the Communist Party. Within the years of struggle against Imperial Japanese forces in China, there was the Yan’an Rectification, from 1942 to 1944, in which Mao consolidated his paramount role in the Communist Party of China. Yan’an was also the part of the ten year period in which: Mao established his premier role in the Party; the Party’s Constitution, endorsing Marxist-Leninism and Maoist thought as its guiding ideologies, was adopted (Mao’s formal  deviation from the Soviet line and his determination to adapt Communism to Chinese conditions); and, the postwar Civil war between the Communists and the Kuomintang. Prior to 1949, the Communist Party of China’s main intelligence institution was the Central Department of Social Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces, CDSA became one among a full array of government intelligence organizations were created to supplement Party-based intelligence services. CDSA would draw information from foreign news agencies and open sources. It was hardly a very rewarding business.

The Ministry of Public Security was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. CDSA fell into the hands of Li Kenong, a deputy chief of staff to People’s Liberation Army (PLA) chief of staff Chou Enlai and a vice minister for foreign affairs. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. However, as time passed, it was also officially given jurisdiction over counter subversion, counterintelligence, and conducting espionage in Macau, Hong Kong, and Taiwan. Overseas during the 1950s, most Chinese diplomatic missions accommodated the MPS with an Investigation and Research Office for intelligence collection staffed by CDSA personnel, with analysis performed by the Eighth Bureau, publicly known in 1978 as the China Institutes of Contemporary International Relations. In 1953, CDSA became the Central Investigation Department (CID). In China, the MPS presence was nearly ubiquitous, as it kept a watchful eye on China’s population. It was energetically engaged in monitoring Chinese who returned from abroad. To cope with what it determined to be errant citizens, MPS ran labor reform camps. MPS personnel were known for behaving harshly among its own citizens. That behavior was said to be reflective of the violent mentality of its initial leader, Kang. Despite his alleged romance with Mao’s wife, Kang was far from a charming man. Rather, he was known for being an absolute brute. He would move on to become a member of the Communist Party of China Political Bureau, and Li Kenong moved up to take command there. In 1962, the decision was made to move Ministry of Public Security counterespionage functions over to the CID.

The 1960s were a volatile time for Chinese intelligence services as with all military institutions in China. Li Kenong died in 1962 and in 1966 he was succeeded by Luo Quinchang, who had been adopted by Kang in 1958 and ushered into the MPS. However, the MPS became involved in the power struggles that embroiled the Communist Party during the Cultural Revolution. Mao, feeling his power base was threatened mainly as a result of his failed Great Leap Forward, implemented the “Four Cleans Movement,” with the objective of purifying politics, economics, ideas, and organization of reactionaries, led by a one time ally, Luo Quinchang of MPS. His staff files were seized and mined for candidates for criticism and banishment to the lao jiao prison system.

Kang Sheng (above). The Ministry of Public Security (MPS) was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. As time passed, it was also officially given jurisdiction over counter subversion, counterintelligence, and conducting espionage in Macau, Hong Kong, and Taiwan. MPS personnel were known for behaving harshly among its own citizens. That behavior was said to be reflective of the mentality of Kang, who was known for being an absolute brute.

Most of the leadership of the CID was sent to the countryside for reeducation and the organization, itself, was abolished for a time. Its activities and assets were absorbed by the Second Department of the PLA’s general staff taking over its duties. The Second Department oversaw human intelligence collection to include military attachés at Chinese embassies overseas clandestine collection agents sent to other countries to collect military information, and the analysis of overt sources of information. Mao turned to Kang to ensure that his ideological and security directives were implemented. Kang, Mao’s wife Jiang, Wang Hongwen, Yao Wenyuan, Zhang Chunqiao, dubbed the “Gang of Four,” worked together in a campaign to renew China’s revolutionary spirit. With the assistance of the Red Guards, a mass student led paramilitary movement mobilized and guided by Mao from 1996 to 1967, the Gang of Four set out to destroy the “Four Olds” of society: old customs, old culture, old habits, old ideas. The Red Guards were particularly disruptive. Apparent moral confusion caused the base student army to rise and nearly wreck China by attacking senior Communist Party leaders such as Deng Xiaoping and by conducting mass executions. There were reports that the Red Guards cadres had engaged in cannibalism, eating students. They destroyed approximately 66 percent of China’s famous temples, shrines, and heritage sites. These included nearly 7,000 priceless works of art in the Temple of Confucius alone. The Red Guards would face resistance in major cities. Often the PLA was forced to violently put down their destructive attacks. The organization having fully flown off the rails, Mao instructed leaders of the Red Guards to end their movement.

Meanwhile, Kang had returned to the intelligence service from on high to assume responsibility for the CID cadres that remained left in limbo. Eventually, a new organization, the Central Case Examination Group, composed of CID cadres under Kang was created. That organization was instrumental in the removal of Deng Xiaoping from power. The CID was reestablished in 1971 following the death of Lin Biao and then again became entangled in another power struggle as Hua Kuo-feng and Deng Xiaoping vied for control of the party. By then, Kang had receded into the distance, viewed as too connected to the untidiness of the Cultural Revolution.

Following Mao’s death in 1976, the new leadership under Hua Guofeng initially tried to return to the pre-Cultural Revolution years and strengthen the CID. When Hua Kuo-feng and Wang Dongxing assumed power in 1977, they tried to enlarge the CID and expand the Communist Party of China intelligence work as part of their more general effort to consolidate their leadership positions. However, their hopes and dreams met their fate. Deng Xiaoping, having steadily ascended within the leadership ranks of the Communist Party of China, was uncertain of CID loyalties and his opinion of it was unfavorable. Circumstances indicated that he should order the shut down of all Investigation Offices in Chinese embassies. Although it remained part of the Chinese intelligence services, the CID was officially downgraded. According to Anne-Marie Brady in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the impact of the CID’s downgrade was softened by the fact that its intelligence efforts  were being paralleled and to some degree occasionally outmatched by the extraordinarily secret International Liaison Department of the Communist Party of China, which became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies worldwide.

The emblem of the Ministry of State Security (above). In 1983, there was considerable frustration in the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to the new Ministry of State Security (MSS). Known as the Guojia Anquanbu or Guoanbu, the MSS was stood up in July 1983 to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus.

The Inception of the Ministry of State Security

The story of the Ministry of State Security (MSS) began thoroughly in July 1983. That year, there was considerable frustration in the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to the MSS. Known as the Guojia Anquanbu or Guoanbu, the MSS was stood up to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus. When the reorganization of the MPS was completed in 1983, it was temporarily left with only traditional police functions. Nevertheless, the change turned out to be quite positive as both organizations were allowed a new beginning so to speak. MSS represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers. It eventually bring new dimensions to China’s foreign intelligence scheme. The creation of MSS freed MPS to revamp existing capabilities and explore and adapt a new as well as more technological set of cards to play in the domestic intelligence game so to speak. It represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers.

At its nascent stage, the ranks of the MSS were filled with longtime MPS who transferred over to the office. MSS provincial branches were often staffed predominantly with PLA and government retirees. Despite the declaration of its raison d’être as a foreign intelligence organization, the MSS was initially asked to do what its rank and file knew how to do best, which was to perform as police. For that reason, the most important task that it was given after its inception, focusing on students in both China and abroad after the Tiananmen Square protests, was a natural fit. Tiananmen Square, in addition to being frightfully embarrassing to the Communist Party of China leaders, caused them to remain greatly concerned over a possible follow on move by students. That concern was thoroughly evinced when Chinese authorities announced that some 200 Chinese had been accused of spying for the Soviet Union. One might say that the counterintelligence purpose of the assignment made giving it to the MSS plausible. However, MPS had the domestic counterintelligence mission covered. Redundantly taking on the assignment concerning the student–surely MPS was on it–was a turn in a wrong direction. The MSS would eventually develop into an authentic foreign intelligence service, but it would take time. It would be an evolutionary process.

An ocean of student protesters in Tiananmen Square in May 1989 (above). At its nascent stage, the ranks of the MSS were filled with longtime MPS who transferred over to the office. MSS provincial branches were often staffed with People’s Liberation Army and government retirees. Despite the declaration of its raison d’être as a foreign intelligence organization, the MSS was initially asked to do what its rank and file knew how to do best, which was police work. For that reason, the most important task that it was given after its inception, focusing on students in both China and abroad after the Tiananmen Square protests, was a natural fit. The protests, in addition to being frightfully embarrassing to the Communist Party of China leaders, caused them great concern regarding a possible follow-on move by students.

As aforementioned, a paucity of quality information exists publicly from the Chinese government about the present-day MSS in primary or secondary sources. No official Chinese government website exists for the intelligence organization. There have been no press releases distributed or press conferences held by the organization’s public relations department. Access to information from the organization is essentially nonexistent. No significant writings have been published  by security scholars in China on the MSS. Precious few defections from MSS have occurred, so little has been provided from an insider’s view. What is best known generally about MSS in the US has been superbly relayed in I.G. Smith’s and Nigel West’s celebrated Historical Dictionary of Chinese Intelligence (Rowman & Littlefield, 2012).

The MSS headquarters is located in Beijing in a large compound in Xiyuan, on Eastern Chiang’an Avenue, close to Tiananmen Square. Within the security perimeter is snowing apartment block, Qian Men, where many of the MSS staff and their families live. The MSS is a civilian intelligence service and operates independently from the People’s Liberation Army General Staff Second and Third Departments, which also conduct military intelligence and counterintelligence operations. Although it has a central headquarters, the MSS actually was not built up as a centralized organization. It is composed of national, provincial, and local branches much as the MPS from which it sprang. Even the initial CDSA and later CID units of the MPS operated domestically under a decentralized and autonomous structure throughout China that was supported by the Communist Party of China. Their structure somewhat resembles that of the erstwhile regional and Soviet republic KGB bureaus. The provincial, and local branches receive directives from headquarters in Beijing and are financed by National Security Special Funds. Yet, only to the extent that provincial and local branches receive “administrative expenses,” could they be considered accountable to headquarters. They are largely autonomous in reality, reportedly acting as essential adjuncts to the local administration. The formal chief of the MSS holds the title Minister of State Security. As of this writing, the minister is Chen Wenqing. However, from the national level to the local levels, the MSS and its subordinate departments and bureaus report to a system of leading small groups, coordinating offices, and commissions to guide security work while lessening the risk of politicization on behalf of Communist Party of China leaders. Initially, the most important of these was the Political-Legal Commission (Zhongyang Guoja Anquan Weiyuanhui). The Political-Legal Commission was chaired by a Politburo member at the Central level with the title Secretary, who serves essentially as China’s security czar. There are Deputy Party Secretaries at the lower levels. The lower-level commissions oversee all state security, public security, prisons, and procuratorate (judicial) elements for their levels. Currently, there is a Secretary of the Central Political and Legal Affairs Commission (Zhengfawei) who oversees China’s security apparatus and law enforcement institutions, also with power reaching into the courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs  Xi announced the creation of the Central State Security Commission (CSSC) in the Third Plenary Session of the Eighteenth Party Congress in November 2013. The CSSC held its first meeting on April 15, 2014. The purpose of this new commission was twofold. First, it was intended to balance internal political power created by the expansion of the security services and their capabilities in the 2000s. Second, the commission orient’s the MSS and other security forces toward planning and preempting threats to the party-state. At lower levels, provinces, counties, and municipalities have state security leading small groups (Guoja Anquan Lingdao Xiaozu). The political-legal Commissions and State Security leading small groups overlap in personnel but not perfectly. They combine with defense mobilizations committees and 610 offices to create a kind of system of systems that oversees local security and intelligence work. Headquarters is surely kept apprised of what the provincial and local branches are doing. Each level reports to the next MSS level up and the Political-Legal Committee at that level. This florid arrangement of horizontal and vertical relationships often creates bureaucratic competition that encourages pushing decisions upward while hiding information from elements of equal protocol rank.

Intellect, will, and hard earned experience drove MSS leaders forward as they molded the MSS into a truly effective intelligence organization. What compelled the domestic focus of its initial work is further apparent in that process. The first two ministers, Ling Yun and Jia Chunwang, faced the challenge of turning a small Ministry with only a handful of outlying provincial departments into a nationwide security apparatus. The expansion occurred in four waves. In the first wave during MSS’ inaugural year, the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai were created. A second wave appeared shortly thereafter between 1985 and 1988, including Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang. The third wave from 1990 to 1995 completed the expansion of the Ministry across at the provincial levels, bringing in Anguilla, Hunan, Qinghai, and Sichuan provinces. The fourth wave the provincial-level departments exoanded vertically, taking over local public security bureaus or established subordinate municipal or County bureaus. The MSS policy of expanding representative offices in most major towns and cities was reversed in 1997. Nevertheless, when MSS minister Jia left in 1998 for the MPS, the MSS was a nationwide organization at every level. Presently, the MSS’ thirty-one major provincial and municipal sub-elements. Interestingly, as MSS moved through each growth spurt, it did not ignite efforts to rename the organization, to divide it into pieces and parcel out some of its departments among other Chinese intelligence services, or to disband it altogether in the way CDSA and MPS suffered in the two previous decades. There seemed to be an understanding system wide that the need existed for a solid civilian foreign intelligence as well as counterintelligence capability.

The Wuhan Hubei National Security Office in China, home of the provincial Ministry of State Security Bureau (above). The expansion of MSS provincial departments occurred in four waves.  In the first wave, during MSS’ inaugural year, the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai were created. A second wave appeared shortly thereafter between 1985 and 1988, creating the Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang bureaus. The third wave from 1990 to 1995 completed the expansion of the Ministry across at the provincial levels, bringing in Anguilla, Hunan, Qinghai, and Sichuan provinces. The fourth wave the provincial-level departments expanded vertically, taking over local public security bureaus or established subordinate municipal or County bureaus. Presently, the MSS has thirty-one major provincial and municipal sub-elements.

As relayed previously, MSS was initially staffed with personnel drawn largely from the MPS. Many local MPS officers transitioned overnight from being police to MSS officers. The MSS foreign intelligence capability was built up when intelligence cadres from the Communist Party of China were brought into its ranks. The new MSS was also funded in part by the MPS. The fact that MSS, in a similar way to MPS, established provincial offices, which operated under cover names, such as “Unit 8475,” has been completely uncloaked and was made fairly well-known courtesy of the Historical Dictionary of Chinese Intelligence. To help MSS take on its mission, MPS passed some networks to the new organization. Yet, with some uncertainty that existed as to the political nature of MSS, MPS was reportedly reluctant to make such transfers. Weariness and disappointment was also apparently felt among some of the old MPS professionals who opted to move to the MSS. While there were far greater opportunities for foreign travel, the financial side-benefits of working closely with industry were no longer available to them.

Employment on the MSS staff continues to hold considerable social status and is generally thought of as a desirable career. MSS intelligence officers are usually recruited before or during their university education, and a large proportion are graduates of the China Institutes of Contemporary International Relations (CICIR), the Beijing Institute of International Relations, the Jiangnan Social University, or the Zhejiang Police College. Those requiring technical skills usually attend the Beijing Electronic Specialist School. These establishments provide training for MSS recruits, who usually come from families with MSS links or otherwise are influential and beneficiaries of guanxi. Nevertheless, however well connected the candidates are, they will have to be dedicated and disciplined although not yet necessarily Party members. Guanxi is often exercised to facilitate entry into the MSS.

Promotions aee endorsed at both the bureau and headquarters levels. Senior branch positions require the approval of the local administration, although, in practice, the will of headquarters usually goes unchallenged. The quality of performance during the information war over the coronavirus pandemic will also likely play a considerable part in future promotion. Interestingly, although thoroughly part of the MSS, branch personnel are regarded as employees of the local government. More than half the MSS staff recruitment takes place in the region’s where the officers will be posted for the breath of their careers and where they have family links. Those family links are quite important. This structure enables the MSS to fulfill the increasingly large responsibility of ensuring social stability, considered a significant operational priority. There is no equivalent to this system in the West. Training takes place in the branches. There are no centralized, formal training academies, and new personnel are expected to learn their profession on the job by reading old and current operational files, by working with mentors, and attending occasional lecturers and conferences. Expectedly in the Communist country, during training, a heavy emphasis is placed on political indoctrination, and although probably less than 15 percent of MSS staff are women, they tend to be almost entirely Communist Party of China members. Internal transfers, and secondments are routine and occur mainly from the law and political departments of local government. There a tacit understanding that one could find a home in the MSS with all of the care and comfort imaginable during and after active service.

Mao (left) and Soviet Premier Joseph Stalin (right). Immediately following Mao Zedong’s Communist forces defeat of General Chang Kai-shek’s Kuomintang Nationalist forces, China and the Soviet Union stood as the two prominent Communist countries. Soviet Premier Joseph Stalin saw the victory in terms of Soviet interests, however Mao, saw the Communist Revolution in China as an achievement of the Chinese people. Despite reservations, Mao welcomed assistance from Moscow in the form of physical aid but experts and advisers. Soviet intelligence officers assisted the burgeoning Chinese intelligence service with the intention of creating a capable, parallel organization in a “brother” Socialist country, with hope of exploiting it to the greatest degree possible. However, cooperation that was established between Chinese and Soviet intelligence services ended with the split between Chinese and Soviet leaders.

Residual Impact of Soviet Intelligence Upon Chinese Intelligence?

Naturally, the once significant impact and influence of the Soviet intelligence service on Chinese intelligence has faded more and more with the coming of each new generation into the system. Yet, fragments from that past past still remain. Immediately following Mao Zedong’s Communist forces defeat of General Chang Kai-shek’s Kuomintang Nationalist forces, China and the Soviet Union stood as the two prominent Communist countries. Soviet Premier Joseph Stalin saw the victory in terms of Soviet interests, however Mao, saw the Communist Revolution in China as an achievement of the Chinese people, and to that extent was only interested in formulating the best path to Socialism for China. Mao had held reservations about overlaying China with the Soviet model, but nonetheless welcomed assistance from Moscow in the form of physical aid but experts and advisers. Nevertheless, an agreement was established between Mao and Stalin to have a Soviet advisory mission providing physical aid and significant guidance and advice on nearly all aspects of government. Concerning intelligence, Chinese and Soviet services liaised significantly and comfortably. Soviet advisers used their own service as a model to structure the organization, staffing, training, intelligence operations, and resources of Chinese intelligence services. In the end, Chinese intelligence services mirrored those of the Soviets. It became an effective tool for China’s security. What happened with the Chinese also happened with intelligence services of Eastern Bloc and other Communist governments’ intelligence services in the late 1950s. However, also much as in the Eastern Bloc, Soviet intelligence officers assisted the burgeoning Chinese intelligence service with the intention of creating a capable, parallel organization in a “brother” Socialist country that Soviet intelligence could exploit to the greatest degree possible.

Consequently, for decades after World War II, the Chinese intelligence service, even without Soviet direction, evinced some organizational and operational aspects similar to those of the Soviet intelligence services of the past. To that extent, the KGB has remained a fully useful yardstick from which one could measure, understand, and conceptualize the structure and functions of the Chinese intelligence services as they evolved. Interestingly, the period in which Chinese intelligence services received advice and closely liaised the Soviet counterparts was also a period of evolution of Soviet intelligence. As soon as one intelligence organization was opened for business in the Soviet Union, it was replaced by another with added responsibilities. Those organizations included: Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs) or NKVD; 1938-1946, Narodnyi Komissariat Gosudarstvennoe Bezopasnosti (People’s Commissariat for State Security) and Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs) or NKGB-NKVD, placing police and security functions under one chief; and, 1946-1953, Ministerstvo Vnuirennikh Del (Ministry for Internal Affairs) and Ministerstvh Gosudarstvennoe Bezopasnosti (Ministry for State Security) or MVD-MGB. Eventually, in 1954, all of the non-military security functions were organized in what was dubbed the Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or the KGB. It was under odd circumstances that Soviet intelligence services would identify themselves as models for those of other countries to follow. Interestingly enough, there was a lesson for the Chinese to take away from that period of the growing pains felt by Soviet intelligence services. In effect, the evolution of the Chinese intelligence services was inevitable if it was to meet the evolving needs of the leadership in a changing world. Without wanting to declare or insinuate some causality, or proffering that there was some curious act of imitation, it must be noted that Chinese intelligence services, following the years of close contacts with the Soviet counterparts, went through a similar period of near continuous organizational and name change.

Cooperation that was established between Chinese intelligence services and Soviet intelligence services could not survive the split between Chinese and Soviet leaders. The cause was gaping differences in outlook. Mao’s perception of the right relationship between the Soviet and Chinese Revolutions was influenced by his profound identification with the Chinese national tradition, which led him to reject conceptions and political lines not sufficiently suited to the mentality of the Chinese people and to their originality and creativity. Such were the sensibilities behind the “Great Leap Forward.” Not even quiet liaison through a virtual cross border masonry between field officers of the two intelligence services would have been allowed.  

Unlike its sister civilian intelligence service, the MPS, the MSS generally appears to have adhered to the non-politicization  of the service. MSS senior executives have evinced an acumen for being clever with politics. Occasionally, they have not been pristine in avoiding any mix up between their true task and purpose and extraneous political matters. Indeed, MSS elements, particularly at local levels, often have provided protection services for the business dealings of Communist Party of China officials or their well-connected friends. The purges of Beijing Party secretary Chen Xitong in 1995 and Shanghai Party secretary Chen Liangyu in 2006 were understood to have involved the ministry. Following the fall of Bo Xilai and Zhou Yongkang, the Beijing State Security Bureau chief Fang Ke and Vice Minister Qiu Jin were ousted in rather widespread purges as a consequence of their use of MSS resources to support certain leaders in their political tussles.

How MSS Is Organized

In terms of operations and functional (administrative) duties, a common understanding has been that MSS is divided into bureaus, each assigned to a division with a broad directive and each bureau is given a specific task. On a Weibo account, reportedly associated with the MSS, a suitable outline of the first 11 bureaus was posted in November 2016. A description of that organizational structure of the MSS is easy enough to find online. The bureaus on that list, along with an additional six bureaus, was discovered on the common yet only moderately reliable source, the online encyclopedia, Wikipedia: Confidential Communication Division: Responsible for the management and administration of confidential communications; International Intelligence Division: Responsible for strategic international intelligence collection; Political and Economic Intelligence Division: Responsible for gathering political, economic, and scientific intelligence from various countries; Taiwan, Hong Kong, and Macau Division: Responsible for intelligence work in Taiwan, Hong Kong, and Macau; Intelligence Analysis Division: Responsible for analysing and reporting on intelligence and collecting guidance on how to handle intelligence matters; Operational Guidance Division: Responsible for directing and supervising the activities of provincial level MSS offices; Counterintelligence Division: Responsible for gathering counterintelligence information; Counterintelligence Division: Responsible for monitoring, investigating, and potentially detaining foreigners suspected of counterintelligence activities. This Bureau is reported to primarily cover and investigate diplomats, businessmen, and reporters; Internal Security and Anti-Reconnaissance Division: Responsible for protecting the MSS from infiltration by foreign entities by monitoring domestic reactionary organizations and foreign institutions; External Security and Anti-Reconnaissance Division: Responsible for monitoring students and institutions abroad in order to investigate international anti-communist activities; Information and Auditing Division: Responsible for the collection and management of intelligence materials; Social Research Division: Responsible for conducting public opinion polling and surveying the population; Science and Technology Investigative Division: Responsible for managing science and technology projects and conducting research and development; Science and Technology Investigative Division: Responsible for inspecting mail and telecommunications; Comprehensive Intelligence Analysis Division: Responsible for the analysis and interpretation of intelligence materials; Imaging Intelligence Division: Responsible for collecting and interpreting images of political, economic, and military targets in various countries through both traditional practices and through incorporation of satellite imagery technologies; and, Enterprises Division: Responsible for the operation and management of MSS owned front companies, enterprises, and other institutions. (Additionally, In 2009, the MSS was reported by a former official to have a Counterterrorism Bureau.)

Since leaving the Central Intelligence Agency (CIA) where he was a highly-regarding analyst on China, Peter Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Among a number of issues, Mattis expressed a view compatible with greatcharlie’s here in a 2012 article, “The Analytic Challenge of Understanding Chinese Intelligence Services” Studies in Intelligence Vol. 56, No. 3 (September 2012) 47, that “Protecting the integrity of US intelligence and policy processes is an important task for the US Intelligence Community, but clear understanding of Chinese intelligence serves more than the CI [counterintelligence] mission. At the core, analysis of Beijing’s intelligence institutions is about trying to understand systematically how the Chinese government uses information to inform its policy formulation, guidance to diplomats and security officials, and the execution of its policies.” Along with a former military intelligence officer and diplomat, Matthew Brazil, Mattis published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant. In covering the web of Chinese intelligence services that engage in intelligence operations, Mattis and Brazil present a great deal about the super secret MSS which one can be sure is cutting edge stuff. For many analysts in defense, foreign affairs, and intelligence worldwide, it presents nothing less than a treasure trove and should find a permanent place in syllabi in college and university courses worldwide for years to come. (Regular reference is made to Mattis’ writings in this essay.)

Mattis and Brazil share the view that MSS headquarters is organized into numbered bureaus. They further explain that it is spread across at least four compounds in Beijing. However, in their assessment, they believe MSS is organized a bit differently than in the outline of its departments aforementioned. They state that at the present, the MSS is believed to possess at least eighteen bureaus. Unlike the People’s Liberation Army  (PLA) where military unit cover designators offer a way to track units, MSS elements, they explain, are not so readily identified. In Mattis’ and Brazil’s own words, “The following designations are ones in which we possess a modicum of confidence”: First Bureau: “secret line” operations by MSS officers not under covers associated with Chinese government organizations; Second Bureau: “open line” operations by MSS officers using diplomatic, journalistic, or other government-related covers; Third Bureau: unknown; Fourth Bureau: Taiwan, Hong Kong, and Macau Bureau; Fifth Bureau: Report Analysis and Dissemination Bureau; Sixth Bureau: unknown; Seventh Bureau: Counterespionage Intelligence Bureau, gathers information and develops intelligence on hostile intelligence services inside and outside of China; Eighth Bureau: Counterespionage Investigation,  runs investigations to detect and apprehend foreign spies in China; Ninth Bureau: Internal Protection and Reconnaissance bureau, supervises and monitors foreign entities and reactionary organizations in China to prevent espionage; Tenth Bureau: Foreign Security and Reconnaissance Bureau, manages Chinese student organizations and other entities overseas and investigates activities of reactionary organizations abroad; Eleventh Bureau: China Institutes of Contemporary International Relations,  performs open source research, translation, and analysis. It’s analysts also meet regularly with foreign delegations and spend time abroad as visiting fellows; Twelfth Bureau: Social Affairs or Social Investigation Bureau, handles MSS contributions to the United front work system; Thirteenth Bureau: Network Security and Exploitation (also known as the China Information Technology Evaluations Center (Zhongguo Xinxi Anquan Ceping Zhongxin) may manage the research and development of other investigative equipment; Fourteenth Bureau: Technical Reconnaissance Bureau conducts mail inspection and telecommunications inspection and control; Fifteenth Bureau: Taiwan operations linked to the broader Taiwan Affairs work system. It’s public face in the Institute of Taiwan Studies at the China Academy of Social Sciences; Sixteenth Bureau: unknown; Seventeenth Bureau: unknown; and, Eighteenth Bureau: US Operations Bureau for conducting and managing clandestine intelligence operations against the US.

Chairman Deng Xiaoping (above). Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Chinese industry needed to retain a competitive edge. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government. They receive intelligence collected by Chinese intelligence services. They undertake commercial espionage for their own benefit as well.

Intelligence Targets of Today’s MSS

Having created the space and acquiring the flexibility over the past few decades to allow the service to evolve into the elite, very capable intelligence service the Communist Party of China originally wanted it to be, it would seem MSS senior executives and managers have now figuratively declared “game on!” to China’s competitors and adversaries. The mission, as originally intended, has not changed much since 1983. Overall, it is now defined as collecting solid intelligence from the inner workings and the very top of foreign military, diplomatic, political, economic, financial, scientific, educational, media, communications, and social institutions. That is primarily what Beijing wants and that is what MSS is chasing after. Its tactics, techniques, procedures and methods are surely more refined. By conventional wisdom, one would proffer that as a priority, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. Infiltration of these operations by an adversary as China would certainly have far-reaching implications for US national security. Although the PLA would most interested in US military equities in its region and elsewhere in and around Asia, the MSS would expectedly support that work by collecting what it could on the instruments that the US uses to make conventional war and nuclear war. The intelligence threat China has posed to US national security further extends overseas, as China’s foreign intelligence service seeks to infiltrate the systems of US allies and partners. This particular aspect is seen as potentially having grave implications for US alliance stability and the security of US national defense information. Lately, the chief feature of the intelligence war between the US and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its victims.

Deng Xiaoping and the Emphasis on Economic Espionage

Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. The Communist Party of China’s aim was to raise the country’s gross domestic product by 7.5% annually for the next five years. In order to achieve such rapid economic growth, However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Further, the increased demand for raw materials such as oil and iron ore, and new environmental and labor laws led to cost increases, making manufacturing in China more expensive which caused some factories to close. China sought to diversify its economy, for example, through the manufacture of better made high end products. However, that diversification of the economy required the Chinese to increase their knowledge of design and manufacturing processes. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government, and receive intelligence collected by Chinese intelligence services. Those firms have also proved to be capable of engaging in commercial espionage themselves.

During the administration of US President Barack Obama, economic espionage by Chinese intelligence gained real traction. Startled US government officials began to sound the alarm particularly over the destructive impact of Chinese commercial espionage upon US national security. Intrusions by Chinese actors into US companies and other commercial institutions harm both the individual companies and the overall US economy, to the benefit of China. Indeed, in July 2015, Bill Evanina, who was the National Counterintelligence Executive in the Office of the Director of National Intelligence, and remains in that position as of this writing, stated point blank, “Economic security is national security.” Nevertheless, the vociferous statements of those tasked with China’s operations had no real effect on the Obama administration’s course and Chinese intelligence activities steadily intensified. The leadership of the Communist Party of China has not concealed the fact that they recognize the link between economic and national security, and its commercial and national security espionage efforts function in tandem to exploit it.

US Attorney General William Barr (above). The present US Attorney General William Barr is both troubled and angered by China’s espionage efforts against the US and he intended to defeat those efforts. Barr insists China is working to supplant the US as the leader in technology in all areas, by literally stealing away the future of the US. He explains that to accomplish that, China has continuously sought, through a variety of clandestine ways, to grab whatever about US technologies,  developmental practices, and manufacturing practices. Barr wants the US business community to accept these realities and become part of the answer. In making deals with China, US businesses are often selling out their own long-term viability of us companies sold out for short term gain. As dangerous, China has been able to cultivate relationships with their employees and recruit them for spying.

US Attorney General William Barr, in a June 21, 2020 interview on FOX NEWS “Sunday Morning Futures,” proffered that the US for decades has been a leader in technology. China would like to overcome US dominance in the field. To that end, China has been stealing all us technologies developmental practices, manufacturing practices. Barr stated: “The way I look at is, this is a fundamental challenge to the United States. Since the late 19th century, our opportunity and our growth, our prosperity as a country has come from our technological leadership. We have been the technological leader of the world. In the last decade or so, China has been putting on a great push to supplant us, explicitly. They want to be the leader in all the future technologies that are going to dominate the economy. And so what’s at stake is the economic opportunity of our children and our grandchildren, whether we can continue to be the technological leader of the world. The Chinese have embarked on a very aggressive program during this time of stealing and cheating in order to overtake us. They have stolen our intellectual property. When they steal our secrets about future technology, they’re stealing the future of the American people.”

Barr left no doubt that China was quite some distance from competing fairly. He insisted that it was the intention of the Trump administration to put a halt to China’s very open efforts at robbery. Barr explained: “The Chinese efforts run the gamut from more traditional espionage of recruiting people to work for them, explicitly, to cultivating relationships that they are then able to use. And the people frequently are not completely attuned to the fact that they are being used as essentially stooges for the Chinese. So, it runs the gamut of things. And, sometimes, some of these programs, high-sounding programs, are used to the advantage of the Chinese.” Barr expressed concern over how educational programs have been used by Chinese intelligence services to penetrate US academic institutions and take away the knowledge, training, and research offered for use in China’s efforts to overwhelm the competitive edge the US possesses. Barr explained: “We are clearly cracking down on researchers and others that are sent over here to get involved in our key technological programs. And, by the way, this is not just weapons systems. This is agriculture. This is medicine. This is robotics. This is artificial intelligence and so forth. It’s the whole gamut of important technologies going forward.”

Dimensions of MSS Intelligence Collection

In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three more apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Assuredly, the illicit procurement of specific technology by MSS is executed through the use of Chinese front companies. It is a relatively soft approach to intelligence collection, but it has had a devastating impact. According to Mattis in his 2012 article, “The Analytic Challenge of Understanding Chinese Intelligence Services” cited earlier here, FBI analysts reported that over 3,200 such companies had been quietly set up as fronts for intelligence collection purposes. Other relative short-cuts in espionage included tasking scholars, and scientists to purchase information before they travelled to countries that possessed targeted technologies. MSS has also encouraged Chinese firms to buy up entire companies that already possessed the desired technology.

With regard to the cyber attack, it is perhaps the most prolific type of attack against industry in the US, EU, and within other advanced industrialized countries. This dimension of Chinese intelligence collection is perhaps the most aggressive, and hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running human agents. It is a full-fledged dimension of China’s intelligence campaign strategy. If human intelligence were the only focus, constraints on manpower resources would always be a big problem to overcome. Cyber collection complements all other forms of penetration and collection very well.

By far, the most complex and risky dimension of MSS intelligence collection are its human intelligence operations. Least challenging are MSS operations in China. No resource constraints hinder the MSS in terms of both manpower to use against foreigners there. The efforts of foreign counterintelligence services typically face great limitations in terms of ways and resources to stem Chinese efforts against their foreign intelligence colleagues on the ground. The close proximity of other countries in the Far East would appear to make operating in these countries easier, too! Difficulties begin when tries to take a bite out of more advanced industrialized countries in the region. Japan, for example, has historically been a difficult country for Chinese intelligence services to operate within. Against Japanese targets, attempts to cultivate operatives and informants still occur, but a greater reliance is surely placed on technical collection by MSS. Outside of its region, in target rich US, EU Member States, and other advanced industrialized countries, even the Russian Federation, Chinese intelligence services as a whole initially some difficulty figuring out how to go about approaching a target using officers. They would also naturally be concerned over facing considerably stiffer resistance from more adept counterintelligence services such as those of Japan. Interestingly, as time went on, they managed to find a number of sweet spots from which, and methods with which, they could conduct human intelligence collection operations with some degree of success. Lately, it seems to have been easy enough for Chinese intelligence services to establish networks of operatives and informants, and reportedly even sleeper agents, in the US, placing them in locations from which they could do considerable harm.

Collection through Front Companies and Operatives

As mentioned, a very quiet approach to intelligence collection is ubiquitous and pernicious form of inteloigence collection operations in the US. Most US citizen can look direct at the activities of what appear to be benign companies and not observe or discern that it is firm of foreign attack against their country. With little threat of being discovered, Chinese front companies set up where they can best acquire companies, technologies, brain power in the form of students, and even intelligence operatives and informants. Some US firms that have unwittingly linked themselves to seemingly innocuous, but actually nefarious institutions in China, business, academic, scholarly, or otherwise, that are tied to the government, particularly the Chinese intelligence services, may often have Chinese intelligence operatives working out of them, thus providing a convenient cover for their activities. In July 2019, a federal grand jury in Chicago indicted Weiyun “Kelly” Huang, a Chinese citizen, on fraud charges, charging her with providing fake employment verifications. A grand jury indicted her two companies, Findream and Sinocontech, on charges of conspiracy to commit visa fraud. The two companies incorporated by Huang did not exist, except on paper. Federal authorities allege the Findream and Sinocontech were front companies used to provide false employment verification for Chinese students, convincing immigration officials that they were here legally. Huang made use of a website based in China, chineselookingforjob.com, and the China-based “WeChat” platform, as well as Job Hunters of North America, to recruit for her companies. Court records explain that over 2,600 Chinese students declared themselves as employees for either Findream or Sinocontech from September 2013 to April 2019. In a bungling oversight Huang claimed to have employed so many young people that according to a 2017 US Immigration and Customs Enforcement list, Findream and Sincocontech ranked among the top US-based companies that hired students under the federal Optional Practical Training program. Findream ranked number 10, just behind Facebook. Sinocontech ranked number 25, just behind Bank of America. Surely, that served to call some attention from US counterintelligence services to its activities. Tragically, on LinkedIn, it is indicated that great numbers of graduates from schools from around the country wrote in their online biographies that they were employed by either Findream or Sinocontech as data analysts, web developers, consultants and software engineers. Huang compiled approximately $2 million from the alleged fraud scheme. Prosecutors state that the citizen of the Communist China indulged herself lavishly in Neiman Marcus, Louis Vuitton, Prada, Chanel, Hermes, and other luxury retail stores.

In a September 2018 criminal complaint from the US Department of Justice, Ji Chaoqun, a Chinese citizen, was charged with one count of knowingly acting as an agent of a foreign power, China. While Ji was still in school in China, an intelligence officer from the Jiangsu State Security Department, a provincial bureau of the MSS, approached him at a recruitment fair. They recruited Ji and tasked him with gathering biographical information on eight naturalized, ethinc-Chinese, US citizens after he arrived in Chicago to begin his studies. Reportedly, Chinese intelligence wanted to recruit those individuals, most of whom “worked in or were recently retired from a career in the science and technology industry, including several individuals specializing in aerospace fields.” Ji performed the task of collecting the information. After graduating with a master’s degree in electrical engineering from the Illinois Institute of Technology in 2015, he remained in the US through a temporary work program known as Optional Practical Training. That program allows international students to stay for up to two extra years if they have earned degrees related to science, technology engineering and mathematics. After Ji graduated with a master’s degree in electrical engineering in 2015, he remained in the US through a temporary work program known as Optional Practical Training. The program allows international students to stay for up to two extra years if they have earned degrees related to science, technology engineering and mathematics. Ji stated that he was employeed as a software engineer for a company called Findream LLC. According to court records, Ji’s responsibilities included writing “well designed, testable, efficient code by using best software development practices.” Although Findream was advertised as a startup technology company based in Mountain View, California, the company did not exist, except on paper. In April and May of 2018, the FBI made clandestine contact with Ji via an undercover agent. During the May meeting, Ji revealed that he was first approached by the MSS. In October 2017, email and MSS messages exchanged between the MSS officer and Ji were uncovered by the FBI.

Technical Intelligence Collection and Cyber Attacks

MSS technical collection can include the use of high-tech tools covering phone calls and all forms of messaging to relatively low level actions against electronic equipment such as mobile phones and computer networks. While technical intelligence collection, cyber attacks by Chinese intelligence services upon targets in the US, have been deplorable, the skill displayed and their list of accomplishments has been impressive. What have essentially been standard targets of cyber attacks from Chinese intelligence services in recent years have been those levelled against US national security decision makers and government organizations, particularly during the Obama administration. The objective of that targeting has been to access any classified information they might possess. Through that information, MSS would surely hope to develop insight into highly sensitive US national security decision making processes. Several instances of such cyber attacks have been made public, among them: in 2010, China reportedly attempted to infiltrate the email accounts of top US national security officials, including then Chairman of the Joint Chiefs of Staff Admiral Mike Mullen and then Chief of Naval Operations Admiral Gary Roughead; in July 2015, the US Office of Personnel Management announced that hackers had extracted personnel records of roughly 22 million US citizens. The hackers were reportedly affiliated with the MSS. Some of the stolen files contained detailed personal information of federal workers and contractors who have applied for security clearances. Among the information extracted were the fingerprints of 5.6 million people, some of which could be used to identify undercover US government agents or to create duplicates of biometric data to obtain access to classified areas; and, in May 2016, the then Director of National Intelligence James Clapper stated there was indicia supporting a concern that foreign actors had targeted the 2016 US Presidential Campaigns with cyber operations. Those foreign actors plausibly included Chinese intelligence services, as well as actors in the Russian Federation and other countries. During the 2008 US Presidential Election, evidence existed that indicated China infiltrated information systems of the campaigns of then Senator Barack Obama and Senator John McCain. The experience gained and the lessons learned by MSS in those cyber operations primarily against national security and political targets during the Obama administration allowed for a rapid development of the organization’s cyber warfare capabilities and capacity. Rather than figuratively apply the law of lex talionis and a bit more to knock MSS back on its heels, defensive actions and push back by the Obama administration was so slow and so frightfully slight that the MSS was allowed the space and the time to even ratchet up its cyber game. An indictment unsealed in October 2018 revealed that US was made aware of at least a portion of MSS directed cyber operations aimed at swallowing up technologies researched and developed by firms in the US and other advanced industrialized countries.

In October 2018, the US Department of Justice unsealed charges leveled on 10 Chinese nationals, alleging a persistent campaign by Chinese intelligence officers and their recruits to steal aerospace technology from companies in the US and France. In a thoroughly complex operation, from January 2010 to May 2015 a provincial bureau of the MSS, the Jiangsu Province Ministry of State Security (‘JSSD”), headquartered in Nanjing, China, conspired to steal sensitive commercial technological, aviation, and aerospace data by hacking into computers in the US and other advanced industrialized countries. According the indictment, MSS officers managing the operation included Zha Rong, a Division Director in the JSSD, Chai Meng, a JSSD Section Chief, and other MSS officers who were not named. Both Zha and Chai supervised and directed human intelligence and activities by one or more members of the conspiracy aimed at hacking into the computers of targeted firms that were used in and affecting interstate and foreign commerce and communications, and steal information, to includie intellectual property and confidential business data, and to use these companies’ computers to facilitate further computer intrusions into other companies.

As for their computer savvy MSS operatives, Zhang Zhang-Gui, a computer hacker who operated at the direction of the JSSD, tested spear phishing messages and established and maintained infrastructure used in multiple intrusions. Zhang also coordinated hacking activities and shared infrastructure with Liu Chunliang, a fellow computer hacker who operated at the direction of the JSSD, and coordinated the activities of other computer hackers and malware developers, including Gao Hong Kun, Ma Zhiqi, and an identified unindicted co-conspirator (‘UCC-1″). Among his activities, Liu established, maintained and paid for infrastructure used in multiple intrusions, deployed malware, and engaged in domain hijacking in connection with the intrusion of a San Diego-based technology company. The hacker Gao Hong, who operated at the direction of Liu and was an associate of Zhang, engaged in the computer intrusions into Capstone Turblne, a Los Angeles-based gas turbine manufacturer and an Arizona-based aerospace company. Ma Zhiqi, also mentioned, a computer hacker who operated at the direction of LIU, was a personal acquaintance of Liu and UCC-1 as well. Zhuang Xtaowei, a computer hacker and malware developer, who also operated at the direction of Liu, managed malware on an Oregon-based aerospace supplier’s systems and stole the firm’s data from no earlier than September 26, 2014, through May 1, 2015. On February 19, 2013, one or more members of the conspiracy hacked into a second French aerospace company’s server affiliated with Liu, using credentials Liu had provided to Ma on December 14, 20L2. Gu Gen, the Information Technology Infrastructure and Security Manager at the French aerospace manufacturer with an office in Suzhou initially mentioned, provided information to JSSD concerning the firm’s internal investigation into the computer intrusions carried out by members of the conspiracy while under the direction of an identified JSSD intelligence officer. Tjan Xi, an employee of the same French firm who also worked in its Suzhou office as a product manager, unlawfully installed Sakula malware on a computer of the firm at the behest of the same unidentified JSSD Intelligence Officer.

In July 2020, the US Justice Department indicted two Chinese nationals, Li Xiaoyu and Dong Jiazhi (above), for participating in a decade-long cyber espionage campaign that targeted US defense contractors, COVID researchers and hundreds of other victims worldwide. Experience gained and the lessons learned by the MSS in those cyber operations primarily against national security and political targets during the Obama administration allowed for a rapid development of the organization’s cyber warfare capabilities and capacity. Rather than figuratively apply the law of lex talionis and a bit more to knock MSS back on its heels, defensive actions and push back by the Obama administration was so slow and so frightfully slight that the MSS was allowed the space and the time to even ratchet up its cyber game.

In July 2020, the US Justice Department indicted two Chinese nationals, Li Xiaoyu and Dong Jiazhi, for participating in a decade-long cyber espionage campaign that targeted US defense contractors, COVID researchers and hundreds of other victims worldwide, stealing terabytes of weapons designs, pharmaceutical research, software source code, and personal data from targets that included dissidents and Chinese opposition figures. The 27-page indictment alleges that both Li and Dong were contractors for the Guangdong State Security Department of the MSS. Prosecutors also allege that the MSS, prosecutors said, supplied the hackers with information into critical software vulnerabilities to penetrate targets and collect intelligence. The indictment mostly did not name any companies or individual targets, but The indictment indicated that as early as January 2020, the hackers sought to steal highly-valued COVID-19 vaccine research from a Massachusetts biotech firm. Officials said the probe was triggered when the hackers broke into a network belonging to the Hanford Site, a decommissioned US nuclear complex in eastern Washington state, in 2015. US Attorney William Hyslop in public statement on July 21, 2020 emphasized that there were “hundreds and hundreds of victims in the United States and worldwide.” Indeed, their victims were also located in Australia, Belgium, Germany, Japan, Lithuania, Netherlands, South Korea, Spain, Sweden and the United Kingdom. The MSS has been known to utilize contractors for its cyber espionage operations. Clearly, MSS is not adverse to putting its faith in the young hackers to compromise security and deeply penetrate US systems to steal untold amounts of information. Integrating contractors in its cyber espionage operations allows the MSS access a much desired wider pool of talent. Under China’s National Security Security Law, they obligated to serve the needs of the government of course with some remuneration, a point which will explained later in this essay. To some degree, it provides some plausible deniability of the hackers work against some countries, but as demonstrated by this case it provides MSS a limited shield from US capabilities. Li and Dong both studied computer application technologies at the University of Electronic Science and Technology of China, in Chengdu. As a modus operandi, Dong would research victims and find potential methods of remotely breaking into computer systems. Li would then compromise the networks and steal the information. The truth is rarely pure and never simple in the intelligence arena, so it remains uclear whether US counterintelligence, following the indentification of these hackers and their activities, has managed to neutralize them and set up satisfactory defenses to prevent further Interference by MSS hackers. Oddly enough, there was some benefit gained by Beijing, perchance unknowningly by the Communist Party of China. To the extent that the hackers are young and ingenious, they are somewhat relatable to contemporaries and even younger people fascinated by Internet technology inside and outside of China. Presumably, Li and Dong still reside safely in China.

MSS Human Intelligence Collection

As human intelligence collection in the field is perhaps the most complex dimension of MSS operations, it is presented here in greater detail than those aforementioned. It has been generally understood in the West for some time that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections (guanxi) and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use.

In August 2020, Alexander Yuk Ching Ma (above), a 15-year veteran of the CIA and a former Chinese linguist in the FBI’s Honolulu Field Office, was charged with violating US espionage laws. It has been generally understood in the West for some time that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of technology and data. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use.

In August 2020, Alexander Yuk Ching Ma, a 15-year veteran of the CIA and a former Chinese linguist in the FBI’s Honolulu Field Office, was charged with violating US espionage laws. According to court documents, twelve years after he retired from the CIA in 1989, Ma met with at least five MSS officers in a Hong Kong hotel room, where he “disclosed a substantial amount of highly classified national defense information,” including facts about the CIA’s internal organization, methods for communicating covertly, and the identities of CIA officers and human assets. After providing that information to MSS officers in March 2001, Ma and a relative that assisted him, also worked for the CIA, were paid $50,000. Prosecutors were not full aware of how much Ma was paid the MSS following the initial payment. They are aware, however, that Ma returned from one trip to China with $20,000 and a new set of golf clubs. In an effort to gain access additional sensitive information, Ma secured a position in 2004 as a contract Chinese linguist for the FBI. He used his new position and security clearance to copy or photograph classified documents related to guided missile and weapons systems and other US secrets and passed the information to his Chinese intelligence handlers. In 2006, Ma arranged for his wife to travel to Shanghai to meet with his MSS contacts and pass a laptop to them. (Interestingly, Mao’s wife was not named in the criminal complaint.) The FBI eventually saw Ma straight and according to court documents, special agents intercepted Ma using an undercover FBI employee posing an MSS officer conducting an audit of his case. The undercover operative also claimed to be tasked with looking “into how Ma had been treated, including the amount he had been compensated.” In a clandestine video recording a of a meeting with the FBI undercover operative, Ma is seen counting $2,000 in cash the operative gave his supposedly to acknowledge his work on behalf of China. Ma, who was born in Hong Kong, is recorded saying that he “wanted ‘the motherland’ to succeed” and admitted that he provided classified information to the MSS and that he continued to work with some of the same intelligence officers who were at the 2001 meeting. Prosecutors stated that the relative of Ma, who assisted him, is now 85-years-old and suffers from “an advanced an debilitating cognitive disease.” Given that mitigating circumstance, he was not charged.

In February 2019, Zhao Qianli, a 20-year-old Chinese national, pleaded guilty in court for taking photos of the US Naval Air Station Key West in Florida. He received a sentence of one year in prison. Zhao came to the US as an exchange student, however, the record of his activities indicates that the young operative was not in the US to just brush up his English. When Zhao was actually arrested in September 2018, investigators discovered photos and videos of government buildings and an antenna field on his digital camera and smartphone. Eyewitnesses saw Zhao ignore a sign clearly indicating the area was restricted and walk directly toward the antenna field and take photos. Although Zhao had actually studied in a summer exchange program that ended in September 2018, his is visa had already expired when he was arrested. In his defense, Zhao alleged that he was just a tourist who got lost. By successfully denying that he was engaging in espionage, Zhao avoided being expelled from the US, persona non grata, but that did not prevent his prosecution for taking photos in a prohibited place. Court documents indicate none of the photos and videos found on his cell phone and digital cameras were of any tourist attraction sites in Key West. Reportedly, Zhao was in touch with Chinese intelligence officers inside the US before he took photographs at the base. During his interrogation, Zhao told the FBI that he was the son of a high-ranking Chinese military officer and that his mother worked for the Chinese government. The fact that the young spy was tasked to take photographs at an extremely high security location with the great risk of being detained perhaps meant that there was a certain urgency to collect the information. (With so many internal political squabbles remaining largely unknown, it seems odd that the young man would be sent on a near Kamikaze mission into the figurative dragon’s lair, knowing that there was better chance than not that he would be caught, very likely causing some embarrassment for his father and mother.)

In February 2019, Zhao Qianli, a 20-year-old Chinese national, pleaded guilty in court for taking photos of the US Naval Air Station Key West in Florida. He received a sentence of one year in prison. Zhao came to the US as an exchange student. Travellers businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections (guanxi) and the potential threat of alienation from the homeland. Particularly with regard to students, Chinese intelligence agencies often use the “flying swallow” plan, whereby overseas Chinese students who serve as spies work with a single contact in China—just as swallows pick up only one piece of mud at a time to build their nests. The students do not have their personal files inside China’s intelligence system, so if they are caught, there is little information to be revealed.

As this approach has resulted in a reasonable degree of success, and MSS officers could continue to capitalize on a cultural and language affinity, a preconception had actually developed in the minds of interested parties in the US that the MSS would continue to take that course. Support could also found for that view looking at the success of MSS in Taiwan, with its ethnic Chinese population. Most recently, in May 2020, Taiwanese authorities detained Major General Hsieh Chia-kang, and a retired colonel, Hsin Peng-sheng, for allegedly passing classified defense information to China. Hsieh once served as the deputy commander of the Matsu Defense Command and had overseen the Air Defense Command when apprehended. He reportedly had access to the specifications for the US-made Patriot missiles as well as the Taiwanese Tien-kung III and Hsiung-feng 2E cruise missiles. Reported, Chinese intelligence officers recruited Hsieh’s comrade  Hsin with all of stops out while he was in China, leading a Taiwanese tour group. Hsin, a former colleague, allegedly first approached Hsieh about working for Chinese intelligence. According to the prosecutors, Hsieh traveled to Malaysia and Thailand to meet his handlers. The indications and implications of Hsieh’s pattern of travel are that he may have been working for Chinese intelligence since 2009 or 2010. In addition to collecting and passing classified materials, both Hsieh and Hsin agreed to assist Chinese intelligence in spotting and recruiting other sources.

In March 2010, Wang Hung-ju, who was arrested because of his connections to an espionage case. Wang was a former official in the Special Service Command Center in the National Security Bureau, and served for a short period as the bodyguard for Taiwanese Vice President Annette Lu before retiring in 2003. The Taiwanese press repeatedly reported that Wang was uncovered as part of the investigation of a Taiwanese businessman, Ho Chih-chiang. MSS intelligence officers, plausibly from the MSS bureau in Tianjin, recruited Ho in 2007 and used him to approach Taiwanese intelligence officials. Ho’s handlers instructed and empowered him to offer money and other inducements to recruit serving officials. Supposedly, Ho was in contact with Wang, which led to his travelling to China where he was recruited by the Tianjin State Security Bureau. Wang reportedly attempted to recruit two friends into his intelligence network, including an officer in the Military Police Command. While the shift to recruiting a broad base of foreign recruits in China was an important step in the evolution of Chinese intelligence, the process still had its limitations. Nearly all foreign-born operatives were recruited within China, rather than their home countries or elsewhere.

Retired Taiwanese Major General Hsieh Chia-kang (center) MSS officers continue to capitalize on a cultural and language affinity in the recruitment of ethnic Chinese worldwide. Most recently, in May 2020, Taiwanese authorities detained Major General Hsieh Chia-kang, and a retired colonel, Hsin Peng-sheng, for allegedly passing classified defense information to China. Hsieh once served as the deputy commander of the Matsu Defense Command and had overseen the Air Defense Command when apprehended. He reportedly had access to the specifications for the US-made Patriot missiles as well as the Taiwanese Tien-kung III and Hsiung-feng 2E cruise missiles.

However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method. One can better estimate how active and well MSS officers and operatives are performing by who has been recently caught among their recruits and what they have been discovered doing.

In April 2020, Candace Claiborne, a former US Department of State employee, pleaded guilty to conspiracy to defraud the US. The criminal complaint against her alleges that Claiborne, having served in a number of posts overseas including China and having held a top-secret security clearance, failed to report contacts with suspected intelligence officers from a bureau of the MSS. Claiborne’s MSS handler used the cover of operating an import-export company with a spa and restaurant on the side. The MSS tasked with collecting and passing information on US economy policy deliberations and internal State Department reactions to talks with China. They more specifically told Clairborne that her reporting on US economic policy was “useful but it is also on the Internet. What they are looking for is what they cannot find on the Internet.” In accord with her instructions, prosecutors claim Claiborne provided copies of State Department documents and analysis. In return, Claiborne and a co-conspirator received “tens of thousands of dollars in gifts and benefits,” including New Year’s gifts, international travel and vacations, fashion-school tuition, rent, and cash payments.

In May 2019, Kevin Mallory was charged under the Espionage Act with selling US secrets to China and convicted by a jury last spring. In May 2020, sentenced to 20 years in prison; his lawyers plan to appeal the conviction. Mallory’s troubles began in 2017 when his consulting business was failing and he was struggling financially. In early 2017, prosecutors said, he received a message on LinkedIn, where he had more than 500 connections. It had come from a Chinese recruiter with whom Mallory had five mutual connections. That recruiter, Michael Yang, according to the LinkedIn message, worked for a think tank in China, the Shanghai Academy of Social Sciences and was interested in Mallory’s foreign-policy expertise. Mallory was deployed to China for part of his career and was fluent Mandarin. The message led to a phone call which led to Mallory boarding a plane for Shanghai to meet Yang. Mallory would later tell the FBI he suspected that Yang was not a think-tank employee, but a Chinese intelligence officer, which apparently was okay by him. Yang was an MSS intelligence officer. Mallory’s visit to China initiated an espionage relationship with the MSS by which he received $25,000 over two months in exchange for handing over government secrets. Reportedly, the FBI eventually caught him with a digital memory card containing eight secret and top-secret documents that held details of a still-classified spying operation.

Kevin Mallory (above). Mallory was charged in May 2019 under the Espionage Act with selling US secrets to China. In targeting ethnic-Chinese for recruitment, MSS found itself simply working on the margins. The method was too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. In early 2017, prosecutors said,  Mallory received a message on Linkedin from a Chinese recruiter, who allegedly worked for the Shanghai Academy of Social Sciences and was interested in Mallory’s foreign-policy expertise. He was actually an MSS intelligence officer. Other communications led to Mallory’s visit to China and the creation of an espionage relationship with MSS. When the FBI eventually caught him, he possessed a digital memory card containing eight secret and top-secret documents with details of a still-classified spying operation.

In the wild kingdom, ambush predation, a behavior displayed by MSS officers in the instances just presented, works well instinctively for many animals, but it requires possessing an innate patience. The prey must enter a well-set trap of some kind. The haul of victories will be determined by how target rich the environment in which the trap set is with the prey the predator wants. Increasing the number of those targets would mean becoming proactive, going out a hunting that desired prey down. Thus, in the third and most recent step in the evolution of Chinese intelligence, MSS officers have become willing to recruit agents while abroad. The risk was greater, but the potential fruits would be greater, too! According to Mattis, the new approach was first identified by Sweden in 2008, when its intelligence services and law enforcement determined Chinese intelligence officers operating out of the Embassy of the People’s Republic of China in Stockholm, had recruited a Uyghur émigré to spy on fellow émigrés inside as well as outside of Europe. German intelligence and counterintelligence services identified a second instance in 2009, alleging the existence of a spy ring controlled by a Chinese intelligence officer operating out of the Consulate of the People’s Republic of China in Munich.

Once determined to go after even a broader pool, MSS naturally thought strongly about collecting intelligence with might and main throughout the US. A smattering of examples MSS operations a decade later uncovered by US intelligence and counterintelligence services and law enforcement provides an ample sense of that. Fast forward three years and one will discover how successful Chinese human intelligence penetration has been at some of the finest academic institutions in the US: in January 2020, the chair of Harvard’s Department of Chemistry and Chemical Biology, Charles Lieber, was alleged to have violated federal law by failing to disclose his involvement in China’s Thousand Talents Plan to Harvard administrators, who allegedly then passed along false information to the federal government. Lieber was reportedly paid more than $1 million by China in exchange for agreeing to publish articles, organize international conferences and apply for patents on behalf of a Chinese university; in December 2019, a Chinese Harvard-affiliated cancer researcher was caught with 21 vials of cells stolen from a laboratory at a Boston hospital; in August 2019, a Chinese professor conducting sensitive research at the University of Kansas was indicted on charges he cloaked his links to a university in China; and, in June 2019, a Chinese scholar at the University of California, Los Angeles was convicted of shipping banned missile technology to China. The National Counterintelligence Executive, Evanina, has explained, “A lot of our ideas, technology, research, innovation is incubated on those university campuses.” He further stated, “That’s where the science and technology originates–and that’s why it’s the most prime place to steal.” However, MSS does not limit itself to seeking big things from big places such as Harvard. Desired information on national security matters can be found just about anywhere in the US. Consider, in April 2016, a Florida woman was charged by the US Department of Justice, in an 18-count indictment for conspiracy to illegally export systems, components, and documents on un-manned underwater vehicles, remotely operated vehicles, and autonomous underwater vehicles to China.

Selecting Prospective Recruits

Visits to China by foreigners may be viewed by Ministry of Tourism as opportunity to display China’s cultural richness and advancements in all areas. The MSS would only characterize those visits by foreigners as intrusions into China. The foreigner, to them and their sister intelligence, counterintelligence and law enforcement organizations, will always represent a potential threat. MSS could only imagine exploiting the situation by seeing opportunities to recruit new operatives. Commonly acknowledged among experts in this province is that domestically, the MSS exercises responsibility for the surveillance and recruitment of foreign businessmen, researchers, and officials visiting from abroad. The MSS Investigation Department surveillance of dissidents and foreign journalists is often quite obvious. It is supported by more clandestine measures taken by state ministries, academic institutions, and the military industrial complex. The various Chinese intelligence services can identify foreigners of interest in China through a number of means such as trade fairs, exhibitions, and business visas. Once identified, an intelligence officer using a cover may try to develop a friendship or business friendship often using lavish hospitality and flattery. The Chinese intelligence services have also been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. Sometimes efforts will be made via social media to spot potential recruits. A variety of ploys will be used to get to the target to travel to China where the meat and potatoes of the recruitment process will get underway.

In the current environment, US citizens especially will be closely investigated by a provincial MSS office. That kind of investigation would not be conducted with a view to recruit immediately. For the MSS, it was important to construct a psychological profile of a person, his political orientation, his attitude towards his home country and towards the country he was visiting for some reason. What is very clear about the recruitment of foreign operatives and informants by the MSS in China is that rigor is used in the selection process. The ostenibly way MSS to determine whether a foreign official should be targeted would be to investigate whether they ticked certain boxes through evaluating their actions and other information available. Among those boxes were likely the following examples: standing and influence within his organization, access to required information; standing and influence own people given position; standing and influence among specific people given position and access to decision making process and required information; and, the ability to provide secure access to information for MSS officers.

The likes and dislikes of the target and observed particular appetites of the target that may have left the door open to manipulation by seduction or blackmail are vigorously investogated. If a file secreted from the target organization can be collected by MSS agents in a position to grab it. It would be copied or stolen and included in the target’s file. A background that included an exceptional interest in China, left-leaning sympathies, and even affiliation with Socialist or Communist groups would make the target even more attractive for MSS to recruit for China’s case and the Communist Revolution. Particularly useless are observations and “insights” that merely verify generalizations, derivative, or even bigoted preconceived ideas about the target. After accumulating a sizable amount of material using plain observation, clandestine contacts and conversations, and use of a suite of technical tools for audio- and video-surveillance of the places of residence, all the information is analyzed and conclusions are reached on it. A decision is then made about transforming the investigation into a recruitment. The MSS officer who attempts the recruitment in China will exploit whatever has been collected about the target. Information acquired while the recruitment is underway will also be made available to the officer and his manager. The MSS officer will appeal to the target’s discretion. Ideally, the target wil be led to voluntarily agree to work for MSS. However, under exigent circumstances, compromising materials might be used, however, in this day and age it is hard to determine what behavior is recorded would qualify as compromising–”Goodness knows, anything goes!.”

The same rigorous selection process of operatives and informants would be used overseas as in China. By the time of their recruitment of a target, MSS would be fully aware of their recruits’ particulars. Productive operatives are a true sign of a successful recruitment. Sometimes, the prospective recruit will be asked to travel to another country where MSS officers will more formally bring in the target and introduce him or her to the world of espionage. Additionally as in China, the objective of an overseas recruitment may not always be collection. The goal can also be to educate a foreigner, conveying a favorable image of China and how it represents the best future for the world.

Within the Chinese intelligence services, the belief is that foreigners lack the strength of connection, patriotism, that Chinese have for their country is dogma. With ethnic Chinese émigrés, the belief is that the strength of their connection to China can be exploited. For decades the line emanating from Beijing has been that the people of the West for that matter are rich, sick, and filthy. With specific regard to the US, world’s chief superppwer, a guiding idea in China’s geopolitical and geostrategic struggle with it has been that the US is terminal empire. The belief that the US is collapsing from within flourishes despite the country’s decades long record of economic success and steady ascent. In current times, Beijing’s line has become nuanced to express the view that the US is spiraling downward under the weight of racism endemic to all institutions and neo-fascism. To that extent, the liberal democracy is suffocating on its own self-aggrandizement. China sees its quest for dominance over the US further aided by the fact that the US citizen, in the face of an ever encroaching China, would prefer to enjoy an easy life, a lazy existence, and would hardly be concerned with providing any resistence. So far, MSS has been able to add one successful recruitment after another to its tally.

The Minister of State Security, Chen Wenqing (above). The male MSS officer deployed from Beijing Headquarters or a provincial bureau who one might encounter in the US will not appear as a run of the mill joe. He or she will be well-spoken, well-mannered, well-minded, well-built, well-dressed, well-groomed, and well-knowledged, certainly leaving a target well-impressed. Their comportment resembles that of the MSS Minister Chen Wenqing, seen above. All of that is done to have an added impact among targets that they are dealing with someone special, becoming part of something special, and doing something special. However, shrewd MSS managers are aware that taking a “one size fits all” approach to doling out assignments to recruit and run agents in the field would be self-defeating. Managers, when resources are available will consider which officer on the team would best be able to recruit the target and complete the task at hand. While one target may respond well to the gun barrel straight male MSS officer with a commanding presence, another target may be assessed to be likely more responsive to a female officer with a lighter touch.

Some Specifics on How It Is Done: The MSS Officer on the Beat in the US

Based on information gleaned from defectors, MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. Having stated that, it is also very likely that far greater numbers of MSS officers as well as officers from the PLA and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. More often than not, they operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial.

Possunt quia posse videntur. (They are able because they appear able.) The MSS officer deployed from Beijing Headquarters or a provincial bureau who one might encounter in the US will not appear as a run of the mill joe. He or she will be well-spoken, well-mannered, well-minded, well-built, well-dressed, well-groomed, and well-knowledged, certainly leaving a target well-impressed. All of that is done to have an added impact among targets that they are dealing with someone special, becoming part of something special, and doing something special. MSS is results oriented, and that is always foremost in the minds of good managers. Actions taken will never be perfunctory, and situations should not be forced. In the field, operating against an opponent, nothing can be thought of as too trivial to disregard. After being read-in on reports, must let nothing escape a manager’s consideration. Every target for recruitment is unique, requiring some nuance. Thus, shrewd managers in MSS are aware that taking a “one size fits all” approach to doling out assignments to recruit and run agents in the field would be self-defeating and counterintuitive. Managers, when resources are available will consider which officer on the team would best be able to recruit the target and complete the task at hand. While one target may respond well to the gun barrel straight male MSS officer with a commanding presence, another target may be assessed to be likely more responsive to a female officer with a lighter touch. That might make the target more comfortable and easier to handle once the collection process begins. This is not any reference to sexual enticement or manipulation. Rather, the touch of a female officer may prove more effective. For some operatives, the female officer may be able to effectively take a “motherly approach,” comforting them and making them more responsive. Having stated that about female officers, in some cases, it may be discovered after the initial approach that a woman may prove to be, for a variety of reasons, too intimidating for a target and make the interaction difficult and likely unsuccessful. The target may simply hold a bias against women, and perhaps may find working for a woman disagreeable. Such are the realities of human interactions.

Among scientists, technicians and engineers, it may be the case that the target would be best approached by a more compatible, “bookwormish,” reserved and understanding officer, who can connect with the target not only on a professional level, being able to discuss technical details of information sought and the work in which the target may be engaged, but on a social level, perhaps having many of the same interests as the target. In every case though, the main pitch to the target would include something along the lines that Just as humanity has no nation, science has no nation. The line that would soon follow is how China would be the dominant power and be the country to lead humanity to excellence and so on.

As mentioned earlier, possessing a diverse team of male and female officers for operations is not likely to be the case for most MSS managers operating under either official cover or non-official cover. For this reason, it has become necessary for MSS to seek to the cooperation of scientists, technicians and engineers from other government branches or civilian enterprises who would be directed to attend lectures, conferences, conventions trade shows and the like, and make contact with targets and establish an interaction that could lead to passing the target of to an MSS officer or actually engaging in the tradecraft necessary to recruit the target and manage the target’s activities, use tradecraft to collect information procured and provide requirements collection and solutions to problems.

For an intelligence officer recruiting agents, speech is everything. Word choices must build confidence, create trust, console, assure, inspire, and comfort. To create compliant agents, the right word choice must be made every time. Some submission of operatives and informants to the words of the officer must take place, causing the operatives and informants to put aside what they may know or imagine and accept the new knowledge the officer puts before them. While of course in reality, all operatives and informants are being manipulated and corrupted by their foreign intelligence officer handlers, a relationship akin to a teacher and student or mentor and mentee is established in optimal cases. As in those sort of relationships, the operative or informant becomes the responsibility of the officer. Further, as in such relationships, it should be the hope of the officer that the operative or informant perfirms superbly and exceeds all expectations.

The less certain the recruit is about the objective truth, the more likely the individual will be drawn to a false reality. Many who are successfully recruited ultimately would believe that their actions were humanitarian contributions to peace. It is very unlikely that the operative will ever know the degree to which that furtive bit of information he or she is stealing will support any nefarious plans the officer and his country may have cooked up for the US or another country. That is always thrown into the bargain. The MSS officer’s relationship with the operative is only professional. Friendship is established due to necessity. All appearances will be false. Intriguingly, the intellects of the majority of recruits are unable to confound insincerity. Targets of MSS recruitment indeed often fail to realize that if it were not for the officer’s need to collect information from, or pass the Communist Party of China-line to, the operative, the officer would hardly have anything to do with anyone of such character that they would willingly betray their own homeland. The only reality for the recruit is that they are being molded, groomed to do nothing more than committing treason at the behest of a hostile intelligence service of a foreign country. It is all certainly not some childish parlor game. Quid est turplus quam ab aliquo illcieli? (What can be more shameful than to be deceived by someone?)

In a number of cases in the US in which economic espionage has occurred identified as having a Chinese nexus, indications were that nontraditional actors have been used in Chinese intelligence operations for quite some time. Just how many nontraditional actors are in a position and willing to serve the interests of the Chinese intelligence services could only be known based on intercepted information, informants working for US intelligence and counterintelligence and after they may be activated to collect information or materials. A conversation on the margins of a professional gathering that begins with innocuous banter. There could be a clandestine contact, an email or letter, sent to the target requesting to discuss a matter in the target’s field to assist with the writing of an article or book, to assist with academic or other scholarly research, or to discuss a grant or prize from an overseas nongovernmental organization of some type. The next contact, if any, might include leading comments or questions on technical matters or one’s work, might appear odd. That would be an almost sure sign that the inquisitive interlocutor, if not simply socially inept, was probing. If the target had even the slightest awareness of the efforts of Chinese intelligence services to recruit spies, it is at that point the individual should realize that he ir she is in a bad situatupion and break that contact immediately. If the MSS officer notices that the target realizes his or her the questions were compelled by more than a thirst for knowledge and does not run, the officer knows he may have hooked his fish.

As part of their tradecraft, MSS officers would prefer hole-in-corner meetings with prospective recruits in small, quiet locations such as cozy, dimly lit establishments, conversing over coffee or tea, perhaps a dash of brandy or even a bite to eat. It would be far better site for a furtive discussion than some crowded establishment or a spot nearby some busy thoroughfare. Other sites usually selected are hotel rooms, gardens, and parks. The MSS will also want to have an unobstructed view of passersby and other patrons to at least determine whether observable surveillance activity is being directed upon the meeting. The MSS officer will want to eliminate as many distractions as possible as he or she will want to focus wholly of communicating with the prospective recruit and have reciprocate with the same level of attention. The officer will want to analyze the individual close-up and personal and every response to his or her remarks. If a full-on recruitment effort is not made right away, everything will be done to establish a close association for the moment with the target. The figurative “contracted specialist,” will engage in similar activities, and much as the MSS officer, would also try to become a close associate of the prospective recruit. Much as an intelligence officer would be, the contracted agent would doubtlessly be placed under the close supervision of an MSS manager most likely operating under non-official cover, but potentially under officer cover. If a prospective “contracted specialist” left no doubt in the minds of MSS officer that he or she would be unable to perform the more hands-on job of recruiting operatives and informants, they might be called into service to “spot” experts at professional gatherings or even at their workplaces who MSS desires or to collect information from available databases and files there.

The Tianjin State Security Bureau (above). The thirty-one major provincial and municipal sub-elements of the MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations, taking into account that they perform mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus are now essentially small-sized foreign intelligence services. They are given considerable leeway to pursue sources. In Mattis’ view, that independence accounts for variation across the MSS in terms of the quality of individual intelligence officers and operations.

Overseas Espionage by the Provincial Bureaus: A Dimension within the Human Intelligence Dimension

It is important point out that although the bureaucratic center of gravity may reside in its Beijing headquarters, in a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations, taking into account that they perform mostly surveillance and domestic intelligence work. These provincial state security departments and municipal state security bureaus are now essentially small-sized foreign intelligence services. They are given considerable leeway to pursue sources. In Mattis’ view, that independence accounts for variation across the MSS in terms of the quality of individual intelligence officers and operations. He further explains that unless specific units are referenced, reality will contradict general assessments. The indication and implication of this is that defeating MSS efforts in the US will require a broad-based strategy that accounts for the scale of the intelligence organization and compartmentation.

The Shanghai State Security Bureau (SSSB) has surfaced in several US espionage cases. The record its uncloaked operations leaves no doubt that SSSB is constantly looking for opportunities to collect foreign intelligence. It was actually SSSB intelligence officers that approached Clairborne and requested that she provide information on US economy policy deliberations and internal State Department reactions to talks with China. It was SSSB that recruited Mallory. It was SSSB that approached a freelance journalist focused on Asian affairs received SSSB requests for short, interview-based papers related to US policy in Burma, US contacts with North Korea, and US talks with Cambodia related to the South China Sea. Away from the US, in a case involving South Korean diplomats in Shanghai, a Chinese woman, in exchange for sex, requested and received telephone and contact information for senior South Korean government officials. Beyond government documents, the woman also used her influence to help Chinese citizens acquire expedited visa approvals to South Korea. SSSB reportedly blackmailed a Japanese code clerk working in the Japanese Consulate in Shanghai in 2003 and 2004 over his relationship with a prostitute. Allegedly, the illicit relationship began at a karaoke parlor that may have been owned by the SSSB and that catered to Japanese diplomats and businesspeople. Once the code clerk in the grips of the SSSB, its intelligence officers demanded background information on Japanese diplomats posted to the consulate and the schedule for diplomatic pouches going back to Tokyo. Counterintelligence plays a key role in SSSB efforts, too! When the SSSB blackmailed the Japanese code clerk, the organization reportedly asked him to name all of the Chinese contacts of the Japanese consulate in Shanghai.

Other evidence available indicates the SSSB is responsive to the global needs of the MSS and China’s central decision makers. A job announcement errantly circulated publicly around Shanghai universities in 2015, encouraged students who spoke English, Japanese, German, French, Russian, Taiwanese, or the languages of China’s recognized minorities to apply to the SSSB. Mattis proffers that the request for those specific language skills are suggestive of foreign-intelligence targets, counterintelligence coverage of foreigners inside China, and domestic intelligence work for monitoring the party-state’s internal enemies. The job announcement also emphasized that skills in information security, computer software programming and telecommunications as being desirable. In its recruitment efforts, SSSB benefits from a local pool that includes some of the best universities in China, including Fudan and Shanghai Jiao Tong. Shanghai’s universities, think tanks, businesses, and modern infrastructure draw a large, high-quality pool of foreigners from which the SSSB can recruit operatives. Shanghai Jiaotong University, one of China’s most prestigious universities, has been linked to military thefts in cyberspace, leaving open the possibility that such students also might seek work with state security. Admittedly, the job announcement did not describe whether such skills were required in technical support or operational positions. A recently-passed intelligence law prescribes “[combining] open work and secret work” in intelligence operations. Thus, SSSB capabilities very likely exceed human-intelligence operations to include computer network operations.

As the Historical Dictionary of Chinese Intelligence revealed it to be the pattern within the provincial departments  and municipal bureaus, the SSSB leadership appears to come from within the bureau or at least the MSS. The current bureau director is Dong Weimin, who has run the organization since 2015. Unlike the Beijing State Security Bureau’s leadership, service in the SSSB unlikely provides for upward mobility to other parts of the MSS. The directors of the Beijing State Security Bureau regularly move into the MSS party committee and become vice ministers. The most notable among these are Qiu Jin and Ma Jian. The only example of an SSSB director promoted upward in recent memory seemingly is Cai Xumin. He led the SSSB from 2000 to 2004, when he was promoted to MSS vice minister. Cai would return to Shanghai to serve as the city’s deputy procurator in late 2006.

Away from the economic espionage and technology theft in particular, MSS officers regularly have operatives engage in something akin to a Hollywood depictions of “secret agent spying” by taking photographs of restricted areas, gaining entry into restricted areas, and collecting documents, materials, and other property from a restricted area. Those types of activities are perhaps more commonplace that most ordinary citizens might believe. It is only after an MSS officer is captured, or officer of another Chinese foreign intelligence service such as the Second Department of the PLA, that they are made aware that such activity is taking place. Greater awareness that is occurring is the only chance of thwarting suspicious activity when it occurs. When Chinese nationals engaged in such activity are occasionally captured, usually found in their possession is a cache of surveillance equipment. There is typically so much that it evinces the agent believed, with a high degree of confidence that he or she would be able to act without relative impunity in or around a targeted restricted area. It may also very well have been the precedence of previous success spying on the site that helped fashion that notion. Despite the regularity of such activity, the use of MSS officers to recruit agents to do the dirty work of spying has been a fruitful approach.

MSS Informants: Motivations

Attendant to any discussion of the use of actual research scientists across the spectrum of advanced technologies as operatives, as surrogates for MSS officers in the field, would be the discussion of civilian informants and responsibilities of Chinese citizens under China’s National Security law. In the West there usually would be a variety of motivations for citizens to more than likely violate their own Constitution to engage in surveillance and higher levels of activity on behalf of US intelligence and counterintelligence services and law enforcement. Against a foreigner, they might see it as a Patriotic duty. To surveil another citizen might cause pangs of dismay anxiety for there would be the real possibility of violating the 1st Amendment and Fourth Amendment rights of a fellow citizen under the US Constitution. Sadly the motivations of money ideology, conspiracy, and excitement, as well as a healthy dose of indifference will often cure any anxieties or nervousness about another citizens Constitutional rights. Different from Western democracies, however, for the Chinese citizen, such motivations do not factor in such a decision to come to call of their country’s intelligence services. The law requires them to do so. If any motivations at all could be said to factor in a Chinese citizen’s decision to obey the direction of the intelligence service, expectedly the Communist Party of China would list faith and adherence to the ideals of the Communist Revolution, the Communist Party of China, patriotism, the homeland. Supposedly, revolutionary zeal drives the heart of China as one beating heart so to speak.

The National Security Law of the People’s Republic of China, as adopted at the 15th session of the Standing Committee of the Twelfth National People’s Congress declares under Article 9 that in maintenance of national security, priority shall be given to prevention, equal attention shall be paid to temporary and permanent solutions, specialized tasks shall be combined with reliance on the masses, the functions of specialized authorities and other relevant authorities in maintaining national security shall be maximized, and citizens and organizations shall be extensively mobilized to prevent, frustrate, and legally punish any conduct that compromises national security. Article 11 decrees that there will be no tolerance shown for the failure to meet one’s obligation to maintain national security. The article states: “All citizens of the People’s Republic of China, state authorities, armed forces, political parties, people’s groups, enterprises, public institutions, and other social organizations shall have the responsibility and obligation to maintain national security.” Authorities in China understand that extraordinary powers are entrusted in the hands of many, such as MSS officers, who work on national security matters. Contractors, and even informants, who might work on their behalf are placed under the same scrutiny. Those who have attempted to cross the Chinese government have faced stiff reprisals. The shadow of sudden death can hang over the head of any individual arrested for such betrayal. As stated under Article 13: “Whoever as an employee of a state authority abuses power, neglects duty, practices favoritism, or makes falsification in national security work or any activity involving national security shall be held liable in accordance with the law.” The article further declares: “Any individual or organization that fails to fulfill the obligation of maintaining national security or conducts any activity compromising national security in violation of this Law or any relevant law shall be held liable in accordance with the law.” The furtive work of Chinese citizens at home and abroad under the direction of the MSS does not need to be without guerdon. As explained under Article 12: “The state shall commend and reward individuals and organizations that have made prominent contributions to maintaining national security.”

On MSS Informants Overseas

The immediate impression created when one learns that China regularly makes full use of Chinese nationals to support the intelligence collection process is the mind boggling prospect of a multitude of adults from China’s population, which according to the World Population Review as of this writing is put at nearly 1,439,239,000. While there may very well be several Chinese national informants moving around Western countries on a given day, that number is certainly not in the millions. Certainly, not every adult in China will be directly asked to be an informant overseas. Seasoned members of the service have decades of experience approaching young Chinese travelers. Usually prospective informants are approached just before travelling overseas for busuness or tourism or early in their overseas education or career. The younger the informant more time they might have in place and more likely they might be responsive to an MSS officer’s entreaties to take on the job. It is not a matter of taking anyone who comes along. MSS officers are looking for a safe pair of hands; those with cool heads, who can comfortably kick around foreign parts. They must be the very soul of discretion and not easily rattled.

Glenn Duffie Shriver (above). Often in the recruitment of US operatives, as well as those of other countries, prospective targets will be approached who may not at the present time have much by way of an access but potentially could establish that access in time. The recruitment is conducted quietly and low-key to successfully avoid raising suspicion or pose concerns to anyone. The relationship between the MSS officer or contractor and the recruit, seemingly having no importance, will evolve gradually on a schedule set by observant, diligent, and patient MSS managers. A number of cases that conform to this type of recruitment have been made public. In a notable one, Glenn Duffie Shriver after graduating college decided to live in China after a short period of study there from 2002–2003. MSS officers convinced him to assist their efforts in the US for pay. Shriver reportedly received more than $70,000 from the Chinese intelligence to apply to the US Foreign Service and the CIA’s National Clandestine Service. In October 2010, pleaded guilty to conspiring to provide US national defense information to the MSS.

Recruiting Spies for the Long-Run: MSS Style

Often in the recruitment of US operatives, as well as those of other countries, prospective targets will be approached who may not at the present time have much by way of an access but potentially could establish that access in time. This was also a method that Soviet intelligence was famous for. To that extent, the recruitment process is conducted quietly and low-key to successfully avoid raising suspicion or pose concerns to anyone. The relationship between the MSS officer or contractor and the recruit, seemingly having no importance, will evolve gradually on a schedule set by observant, diligent, and patient MSS managers. As for the recruit, the motivation is typically emotional, somewhat ideological. For example, from the moment of contact with the MSS, they may sense that they are able to shape the fate of the world through their furtive activities. If the recruitment takes long enough, the target will even be passed on to another officer for development. When the recruit “matures” to the point of getting into position in a business, think tank, government organization, academic institution, or some other targeted location, the MSS officer handling the individual will begin full-fledged tasking. All forms of espionage and active measures will get under way full throttle. All in all, the speed differential with other forms of recruitment is not as critical as the depth of penetration by the recruit. What MSS gets from the effort is a highly prepared mole buried deep within the US foreign and national security policy apparatus.

A number of cases that conform to this type of recruitment have made public. In a notable one, in October 2010, Glenn Duffie Shriver pleaded guilty to conspiring to provide US national defense information to SSSB intelligence officer. Shriver, a recent US college graduate decided to live in China after a short period of study there from 2002–2003. Apparently finding Shriver to be a viable target, Chinese intelligence officers successfully pitched him the idea of assisting their efforts in the US for pay. Shriver reportedly received more than $70,000 from the Chinese intelligence to apply to the US Foreign Service and the CIA’s National Clandestine Service. If he managed to be hired by either, he would have been obligated to communicate classified US national defense information to their organization. The apparent intent of the SSSB’s was to collect a stream of reporting on US foreign policy. It was seemingly inconsequential that only some of a portion of it would have been directly related to Asia and particularly China.

Honey Traps

As noted in the discussion on the overseas intelligence operations of MSS provincial bureaus, Chinese human Intelligence officers have also been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. Indeed, a bog-standard method of snagging traveling businessmen is the honeytrap. As defined more specifically in Henry S. A. Becket, The Dictionary of Espionage: Spookspeak into English (Stein & Day, 1986), a honey trap is a method of sexual entrapment for intelligence purposes, usually to put a target [such as Kalugin] into a compromising position so that he or she can be blackmailed. The approach would be made once MSS intelligence or counterintelligence managers believed enough had collected enough about the target and the target’s activities, that they understood how the foreign national thought, and whether he would respond favorably to an effort to make that sort of clandestine contact with him, the approach is made by a selected female or make operative.

According to Kalugin in First Directorate, to further the KGB’s mission, he loosed those alluring qualities his personal appearance and attributes and those of other handsome males and females as weapons very effectively against Western officials and especially secretaries working in key offices in the US foreign and national security policy apparatus when he believed something considerable could be gained by doing so. If lucky, the target may already have become in contact with a woman from a house of elegant pleasure, and the recruitment of the prostitute is what is required. However, there are cases in which the prostitute may not have the background to engage the target in a way that is best for the MSS to establish appropriate level of contact to move forward toward effectual recruitment.

Prospective MSS intelligence officers?: Freshmen of Nanjing Campus of China Communications University in military training in 2015 (above). The MSS has been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. It is a bog-standard method known as the honeytrap. While prostitutes and “contractors” are often used for this purpose, female officers may be put in a position to take on a honey trap role. Insisting that female officers surrender themselves to act as lures for potential targets for recruitment is surely not in line with that goal. MSS officers, particularly to young female officers, have been forced to choose whether to engage in such behavior to support the MSS mission. The question is posed, “Which comes first, love of self and honor or love of country and dedication to the Communist Revolution?”

The true humanist by the Marxist definition, seeks to understand human nature with the notion that all can be brought into an ideal Communist World. Insisting that female officers surrender themselves to act as lures for potential targets for recruitnent is surely not in line with that goal. Nevertheless, when MSS officers, particularly to young female officers, are forced to choose whether to engage in such behavior to support the MSS mission, the question is posed, “Which comes first, love of self and honor or love of country and dedication to the Communist Revolution?” The female officer would certainly need to consider what her family would say and what her community would say about her taking on such an assignment. The final answer would be founded on the officer’s own self-respect, dignity, self-worth, conscience. In a system where the desires of the individual must be subordinated to the needs of the state, the only answer is to give primacy to love of country and support the Communist Revolution. That being the case, for the majority of female officers, engaging such work would still be simply outside the realm of possibility. Ad turpia virum bonum nulla spies invitat. (No expectation can allure a good man to the commission of evil.)

Discussion will be extended in Part 2, to be published later

Commentary: China’s Coronavirus Tack Includes More Abrupt Officials and Political Warfare; Its Diplomatic Tool Must Endure the Consequences

Communist Party of China Headquarters (above). The Communist Party of China’s line on the coronavirus pandemic has been thoroughly questioned in the West, especially in the US. Beijing’s finger wagging in response has not resulted in some grand conversion of anyone in the US or anyone in the world to China’s point of view. If Beijing stays on its current course, activities in support of the Party-line will surely intensify. Political warfare units and officers overseas of the Chinese intelligence services possess the know-how to propagate the Party-line and are being relied upon. A quiet sense of resentment has likely risen among Ministry of Foreign Affairs diplomats and professionals who seem to be increasingly tasked with making right turns on the truth and have watched as their legitimate work, to promote China’s policy interests, is regularly supplanted by intelligence efforts.

From the moment the coronavirus outbreak began, the People’s Republic of China was not able to overcome and resolve all challenges that beset it. Facing that reality appears to have shaken the psychological foundations of China’s Communist Movement to its core. Under the somewhat mechanical guiding principles of the Communist Movement reinvented by Chairman Mao Zedong insist that China must be forever driving upward and making progress. All efforts should be directed at pushing China to meet its destiny of taking a dominant position in the world. If China did not reach the top, it would remain a sheep not a shepherd. The volumes of collected concepts and quotes could not offer answers for Beijing to quickly and effectively contain the coronavirus, Having failed to meet the needs of its people, Beijing then failed to prevent a coronavirus outbreak worldwide which it must have come to term with by now. Thereby, any sense of failure has likely been intensified. Yet, Beijing has refused to give up the ghost and has continued to extol the virtues of its medical, scientific, and advanced technological capabilities. The identity of the Party is dependent on a certain worldview concerning the Communist Movement, the teachings of Mao, China’s greatness, and China’s world dominance in the future. When that worldview was threatened, the Party would only hold even more tightly to it and potentially double-down on that line of thinking. That possibility of doubling-down most likely led to the decision by Beijing to contain the virus in China as robustly as possible and contain any information just how bad the situation was. Certain medical approaches were approved and taken. Concern over what might have happened outside China was not given equal importance. and few real steps, if any, were taken that related to a concern over an outbreak. No alternative ideas concerning an almost certain outbreak from the discerning and wise in Beijing–academics, scientific scholars, any with relevant expertise–were investigated or allowed any light. Controversies were to be avoided. Those few who said anything contrary to the Communist Party of China line were effectively silenced.

Indisputably, the Communist Party of China’s line on the coronavirus pandemic clashes with the truth. It has been questioned in the West, especially in the US. Although finger wagging at the US in response may seem morally invigorating, it has not resulted in some grand conversion of anyone in the US or anyone in the world to China’s point of view. It certainly has not improved relations with the US. In China, the Communist Party of China, the National Party Congress, and the State Council of China are the immediate sources of all the daily needs of the Chinese people, that certainly would include information. The government would like to convince the Chinese people that international affairs, it says what it has to say, does what it has to do, to lay up a future of world dominance for China. Given this, perchance Beijing has continued this course because it believes the rebuke of the US has served to assure the Chinese public that there is no ambiguity in what the Communist Party of China has determined are the facts. Beijing may believe it is helping Chinese citizens live their lives fully and clear because they are provided “the truth.” By now, though, a good number of Chinese citizens are aware that one cannot know with certainty what is real from what one hears from the government.

In hac re ratio habenda est ut montio acerbitate. (Reason should be held to (applied) in this matter so that the admonition may be without harshness.) While greatcharlie would prefer to avoid being seen as providing advice to Beijing–which in reality would most likely have no interest in its meditations on the matter. Nonetheless, one might say out of academic interest, greatcharlie has sought to conceptualize what Beijing could have done on the world stage when the coronavirus epidemic began in China and offers some thoughts on what it could still do today to recurvate better present itself as “a leader” on the world stage. Related to that, greatcharlie also takes a brief look in the abstract at why any immediate change in the attitudes and behavior may not occur so quickly as its diplomatic tool, the People’s Republic of China Ministry of Foreign Affairs (MFA), has been going through a type of transition contrary to its purpose of building better relations with other countries.

As a net result of its ongoing tack concerning the coronavirus pandemic, Beijing has thoroughly encased itself in the dreadful mistakes it made by unintendedly, yet repeatedly, shining light on what it did not do right and by its continuous attempts to muscle its way out a disastrous situation with words and actions cobbled together inconsistently in an unsuitable emergency public relations campaign. It would seem that in undertaking its current course, not one appropriate contingency has been considered.

If one were to allow Beijing a bit of latitude, purely out of academic interest, its response to the Western, particularly the US, may be the sense that Chinese leaders might have seared into their psyches over decades about Western perceptions of China. That sense might be informed by utterances of identifiable relics of bigotry from a bygone era to the effect that China is nothing for the West to worry about and the Chinese lack the intellectual power and scientific and technological know-how to ever match US capabilities. That was the case when former US Vice President Joe Biden stated: “I mean, you know, they’re nice folks, folks. But guess what? They’re not competition for us.” To that extent, Chinese leaders view their country a being wronged for too long and they endeavor to right that wrong. (Interestingly, in the administration of US President Barack Obama from which political leaders who have made such statements mostly emerge, a laissez faire attitude resulted in policies on China lost in the wilderness that failed to genuinely protect or promote US interests. The delinquency and lethargy of previous administrations also allowed for the steady progress of China versus US power and further advances in technology.)

Certainly, the moment for immediate action has passed. However, a better course than the one taken, to be brief, would have been to accept the reality of their situation, listening to those in their own country who presented the truth about the virus, and fully acknowledging all of the different developments as they happened, the good, the bad, and the ugly. Most important would have been to be the very party that sounded the global alarm, proactively suggesting constructive precautions to all countries, interacting closely with those leading industrial powers which could have a real impact in stemming the problem worldwide while there was still at least a modicum of time for all countries to act, not just China. Beijing could have worked strenuously with international organizations to include the UN Security Council, fully alerting them that the threat that global pandemic may be in the making. Within those institutions, practical and promising forward-looking recommendations to forge a synergistic international response could have been formulated and promoted by China. The flurry of positive action, that would most noticeably include Beijing’s humble recognition of its errors, would have been an astonishing, powerful display of international leadership by Beijing, albeit over a crisis it caused. The fact that something akin to this approach was not undertaken, and perhaps not even considered, has been a sticking point for Trump.

If it so chose at this stage, Beijing could still direct energy and resources at pecking away at the shell in which they trapped themselves much as a chick breaking out an egg. Nuanced approaches requiring positive action by all relevant bureaucracies across the government to create a positive image and firm, favorable picture that a sanguine China is taking all affirmative steps possible should need to be developed. They would need to be finessed, reshaped continuously, to maximize impact upon viable opportunities to break out its self-inflicted shell the country’s earlier missteps. It would also require more humble cooperation with the rest of the world, not reckless antagonistic verbiage that has so far only triggered the never previously considered process of genuinely isolating China from the international community, international trade and political economy, that is slowly gaining momentum. Rather than experiment with anything new, thoughtful, and inspired, Beijing simply turned to the derivative tactics of locking down and concealing less-desirable and outright unpleasant developments. Disappointingly, the leadership of China appears to lack the reflexes, sensibilities, and sadly, the sophistication, to turn toward the more advanced notions required for positive cooperation. Perhaps, brooding leaders of the Communist Party of China have managed to convince themselves that the main front in all of this is a battle of wits between East and West, in which two disparate political and economic systems compete for dominance.

If no erosion of its current positions occurs, and Beijing stays on its current course, one can expect activities in support of them to intensify. Seemingly, the quondam Cold War era, in which such thinking held prominence is apparently not dead, at least not in the foreign affairs parlors of the Communist Party of China, as well as the Chinese intelligence services, particularly the Ministry of State Security (MSS), and to an extent, departments of the People’s Liberation Army (PLA) and intelligence elements of the Communist Party of China. The MSS, a civilian intelligence agency, comparable to some degree to the US Central Intelligence Agency (CIA), is the embodiment of the logic that created the Chinese system’s intimidating, authoritarian order. Since 1983, it has choreographed events to accomplish the Communist Party’s purposes worldwide. With regard to China’s coronavirus crisis, MSS possesses the know-how through specially trained personnel in political warfare units and officers overseas who could engage in active measures, propagating the line of the Communist Party of China. So far, the apparent political warfare attack against the US, has not been the smashing success leaders of the Communist Party of China were hoping for. However, its effects are doubtlessly being felt throughout the foreign and national security policy apparatus of the Chinese government. With regard to the MFA, large swathes of activities concerning China’s foreign relations with other countries have been taken out of the hands of the diplomats and other professionals at the MFA and put in the hands of the intelligence services.

Materiam superabat opus. (The workmanship excelled the materials.) In the offices of the MFA, there is very likely a very quiet sense of resentment among professionals having chosen to represent China and promote its policy interests worldwide only to have their legitimate activities regularly superseded and supplanted by the machinations of the Chinese intelligence services at the behest of Communist Party of China. After decades of proudly engaging in complex, meaningful diplomatic work, mostly behind the scenes, with the goal of having China respected and reckoned as a power that can have a significant impact in international affairs by the international community, it is surely difficult for MFA diplomats and other professionals to watch as China, instead of further establishing its place among dominant powers, is now earning a reputation as an international pariah.

The purpose of diplomacy should be to prevent war. Bilateral and multilateral contacts with other countries, statements, press releases, and other messaging should not have the aim of antagonizing and raising the ire of leaders and other decisionmakers in foreign capitals. MFA diplomats and professionals would surely prefer to avoid a tit-for-tat situation with the US in which one act of retribution would lead to another from China. With every new act, the chance that a serious outbreak of violence increases.

As mentioned, MFA is ostensibly the primary government agency with a portfolio of implementing the foreign policy and managing diplomatic affairs of China, however the ministry now finds its diplomatic efforts with the US being increasingly supplanted by MSS efforts to conduct active measures such having journalist, academics, and other policy scholars promote the Communist Party of China’s hardline and by intensifying its efforts to steal a wide variety of technologies from US companies and universities. More recently, that nefarious work has included efforts to steal the fruits of money, time, and research into therapies and vaccines for the coronavirus. MFA diplomats may find themselves more and more dragged into MSS operations and those of other Chinese intelligence services as their efforts intensify. In a recent incident, it was discovered that a biology researcher at the University of California-Davis lied about her ties to the PLA. After being interviewed by the Federal Bureau of Investigation, she sought refuge in China’s San Francisco consulate. While it has not been definitively established that she was engaged in intelligence work in the US, there is a high probability she was. The PLA would not knowingly deploy an officer to the US without tasking her with some intelligence function. MFA is a consumer of information from cloak and dagger work, and it’s diplomats would prefer not to be sacked into the business of obtaining it.

One might suppose that it was already enough for MFA diplomats to tolerate a policy generally understood to be in effect that has MSS personnel assigned to China’s embassies and other permanent diplomatic missions overseas for up to six years, with a few remaining in post for 10 years if required. Reportedly, in the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. When the accommodations to the MSS aforementioned are added to this, it most assuredly piles on to a heap of discontent that has been long standing.

To enlarge on the point of how MFA is intriguingly being utilized in the larger more belligerent approach of China toward the US, recall how early into the coronavirus crisis, the world witnessed the Department of Information of the MFA using a far sharper tone. As time moved on, it seemingly devolved into being simply a direct mouthpiece for the Communist Party of China, providing some cover for the Party’s own offices. What was being declared about the US has been far from plausible, and apparently manifested anxieties, fears, over outcomes of grave errors made within China. Press briefings amplified those statements online with a bit more vigor. Spokespersons propagating the stronger line were abrupt in what is the approved Party fashion. Indeed, all MFA officials comported themselves publicly with an astringency which some regime critics would say uncloaked the true nature of the regime. Disinformation was also being spread from MFA sources through posts on Twitter. Those who are following this matter closely will hardly forget the shocking and incredulous tweet from Zhao Lijian, the Director of the Information Department of China’s Ministry of Foreign Affairs in which he tried to direct blame at US for the coronavirus epidemic in China. From @zlj517 on March 12, 2000, at 10:37 AM, Zhao wrote: “2 CDC was caught on the spot. When did patient zero begin in US? How many people are infected? What are the names of the hospitals? It might be US army who brought the epidemic to Wuhan. Be transparent! Make public your data! US owe us an explanation!”

The hallowed diplomatic doctrine of the MFA has been moderation in all things. Calmness and authority must be shown not only in diplomacy but in all circumstances. The more recent assertive approach has pulled MFA officials from their more traditional conservative, stolid posture. Reportedly, the transition in approach is due to something called “Wolf-Warrior diplomacy.” The name derives from high grossing, action films, “Wolf Warrior” and “Wolf Warrior II,” that feature Chinese special operations forces in battle against China’s adversaries. While the films present a false reality, the nationalistic ideas and ideals they  promote apparently cross-polinated with thinking of China’s leadership on real foreign and national security issues.

Res ipsa repperi facilitate nihil esse homini melius neque clementia. (I have learned by experience that nothing is more advantageous to a person than courtesy and compassion.) With good reason, somber and astute foreign policy analysts worldwide have found it difficult to believe that MFA diplomats and professionals are pleased to adhere to a policy that is named after and centered upon a banal amusement. There is some indication that the Wolf Warrior diplomacy is not novel, but rather has been in effect for a decade. However, the requirement that MFA diplomats and even officials of other government ministries take on a “fighting spirit” has really been something insisted upon by Chinese President Xi Jinping. Wolf Warrior diplomacy is all seen is a response by Beijing to highly biased perceptions of China presented especially in Western media. Recall, that notion was touched upon earlier here. Biases heard from overseas by China are often perceived not only as ideological but racist. There is also a prevalent perception in China that as the country has become more powerful on the world stage, other countries increasingly sense that it poses a threat to their respective interests.

The official position on the impact of Wolf Warrior diplomacy on Chinese diplomats and professionals is that it has raised their morale and encouraged a more assertive style. Yet more plausibly, MFA diplomats and professionals feel Wolf Warrior diplomacy is a load of bollocks, and they could mercilessly dissect the shortcomings of that diplomacy and anything produced under it. Intriguingly, expressions of traditional Chinese diplomacy and professionalism have been heard here and there. Comments of that nature made by the People’s Republic of China Ambassador to the US Cui Tiankai about the anti-US declarations from Beijing were highlighted in greatcharlie’s March 31, 2020 post entitled, “Commentary: Beijing’s Failed Political Warfare Effort Against US: A Manifestation of Its Denial Over Igniting the Coronavirus Pandemic”. Reportedly, Cui told the HBO news program “Axios on HBO” that he stands by his belief that it’s “crazy” to spread rumors about the coronavirus originating from a military laboratory in the US. Cui even called this exact conspiracy theory “crazy” more than a month ago on the CBS News program, “Face the Nation.” well before the spokesperson for the Chinese Ministry of Foreign Affairs first began publicly promoting the conspiracy. However, despite such coruscating flashes of what could be called true MFA sensibilities, strong disagreements felt by diplomats and professionals are generally left at the door of their office buildings. At best a very cautious demarche should be attempted in house by the most secure diplomats in the face of decisions and policies of the leadership in an authoritarian, and arguably totalitarian, Communist state. That demarche should never be looked upon by outside observers as a fuite du courage, as much as a pragmatic, existential necessity.

Perchance, more MFA diplomats and professionals disagree with Communist Party of China line policies than one could imagine. No one hoping for the best for China would want to see good thinking officials engage in some une enterprise désespérée that could result in having them brutally weeded out of the system. At least for the time being, nothing that could relatively “bring down the house” should be uttered. Having been directed to promote policies based on the attributes of a fictitious character from an action film, MFA diplomats and professionals have done so without question both overseas and at home. The Ancient Greek philosopher Aristotle stated: “It is the mark of an educated man to be able to entertain a thought without accepting it.”

At one time, the MFA had a clear cut choice between being a mediator and an enforcer of China’s foreign policy. Its diplomats displayed a certain style and nuance as they made offers and discussed the proposals to resolve issues with other countries. Wolf Warrior requires a hardline stand every time. Insights will not advance efforts, dogma will. In following, as time passes, the MFA will likely be forced to make half turns away from the truth, ensuring that it is never on the correct side of issues. As the MFA is used more and more as a tool to proclaim the aggressive message of the Communist Party of China, it places into question whether the ministry will even keep its main job of making peaceful entreaties with foreign governments. While diplomats might meet with the foreign diplomatic counterparts, there would be superficiality to those contacts. It would be diplomacy after a fashion, albeit in an unsatisfactory way. The work of MFA diplomats, as it once was, would be finished. Maliuolum solacii genus est turba miserorum. (A crowd of fellow suffers is miserable kind of comfort.)

The fact that the Chinese government initiated the ongoing coronavirus disaster cannot be credibly truthfully argued against. Sadly, Beijing so far has not demonstrated any interest in acting appropriately concerning the present matter of the coronavirus. It will most likely attempt to continue to assail the global media with waves of distortions. Nevertheless, despite that having transpired, it is not too late to turn the situation around. China can put the present time to good use. The US, as the true dominant power in the world must maintain its poise. It must not react. It must act in a measured way using effective means, at a time and place of its choosing. Despite all the dissatisfaction and disappointment felt toward China, the US must interact as amiably as possible. Surely, the two countries are not at a point yet when the dark waters of despair have overwhelmed their leaders. When diplomats from both sides meet, they must approach each other with a certain buoyancy and hope. Consilio melius contendere atque vincere possumus quam ira. (We can compete and prevail better through wisdom than through anger.)

Response to a Reader’s Comment and Challenge Concerning Our Book Review of Oleg Kalugin’s First Directorate

A young KGB Lieutenant (later KGB Major General) Oleg Kalugin (center left) with his Soviet cohorts at Columbia University in 1958. For decades, foreign intelligence services have sent young officers and operatives to US colleges and universities to: prepare them to operate in the US; gain useful positions and ascend within diplomatic, intelligence, military, scientific, engineering, high-tech, business, and media organizations; or, return home to make good use of knowledge acquired. During Kalugin’s time at Columbia and years working undercover in the US, FBI counterintelligence kept a close eye on him. There were even several attempts at establishing clandestine contact with Kalugin, but the results were abysmal.

After publishing the April 30, 2020 post entitled, “Book Review: Oleg Kalugin, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994)”, the fascinating memoir of Soviet super spy, former KGB Major General Oleg Danilovich Kalugin, greatcharlie received a number of comments about it almost immediately. The quondam Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, was responsible for Soviet internal security, foreign intelligence, and counterintelligence during the greater part of the Cold War era.What readers think about greatcharlie’s posts matter to its editor, and all comments are given due consideration. Among the first comments received was one admonishing greatcharlie for its criticism of 1950s and 1960s Ffederal Bureau of Investigation (FBI) counterintelligence efforts to reel in the book’s author through the use of honey traps. The comment, limited to two sentences, included the phrase, “Many can criticize, but few can do better,” and attached to it was an erroneous Latin translation of that sentence, “Acta non verba.” The well-accepted translation of that well-known phrase, said to be the last words of Roman Emperor Caesar Augustus, is “Action, not words.” Although the word “action” is part of the phrase, the emphasis is not on one’s capability or capacity to act. The accepted interpretation of the phrase is one’s behavior should match one’s words. If the author had done a little homework, perchance the error would have been detected. Father George Ruther, S.T.D., defines a sense of humor as essentially “a balanced mind’s perception of imbalance. Unbalanced people laugh at what is not funny. Fanatics, by definition, are a little off kilter, and so they have no sense of humor.” If the intent of the reader’s comment was to be waggish, greatcharlie must admit that it has had difficulty understanding how it might be amusing. The addition of the erroneously translated Latin quote was presumably an attempt to mock, perhaps even ridicule, greatcharlie’s penchant for including Latin quotes within its essays. Seemingly, the intent of the comment’s author was not just to be plaintive, but downright negative. It was a far cry from the rather jolly messages greatcharlie usually receives from its readers.

Under normal circumstances, greatcharlie would hardly imagine its meditations on Soviet intelligence would garner interest among professionals to such a degree that any would exert time and energy into fashioning a rebuttal of this sort. Yet, it could be imagined by greatcharlie that some in the US intelligence industry or law enforcement, to include their contractors, would become a bit defensive over its analysis of Kalugin’s discussion of how the FBI counterintelligence operated against him. By the manner in which the foregoing comment was “condensed” to only two sentences strictly by the book, and other indications, the implications are that some young intelligence, counterintelligence, or federal law enforcement officer, or perhaps one wearing two of the three hats, is the comment’s most likely author. If one were to presume that the learned, insightful, forward leaning posterity of the special agents of prior decades would examine the mishandling of Kalugin’s case with a discerning professional eye, and find lessons to learn from it, one would be mistaken. Informed by experience, greatcharlie is aware that it is a predilection among not all young special agents, but some thrusting, bumptious neophytes, who in reality may be uncertain of the world around them and frightfully eager to prove something to their cohorts and to themselves, to feel compelled to seize upon an opportunity to respond defensively to anything critical of their organization without authorization. There is no need to postulate on a candidate organization in which the comment’s author very likely resides. Ascribing fault to that degree would seem a bit much for greatcharlie. It is enough to spotlight, out of mere academic interest, the many curious aspects of the comment.

The aim of greatcharlie in writing a review of Kalugin’s First Directorate was not to hurt anyone’s feelings, but rather, to present a book that provides a good framework for understanding what Russian Federation intelligence services are doing right now. To that extent, First Directorate better enables readers to peer into the future, with all of its mysteries, to better conceptualize what those intelligence services might do under the present leadership in Moscow. Most of all, the book provides a good look into the art that moved the mind of one of the most capable spymasters of the 20th century. As a practice, greatcharlie only reviews books that it enjoys and believes its readers will enjoy and will not review a book it did not find satisfying. A good book not only can edify, but allows for relaxation and refreshment, a connection to something personal or even an escape from the daily routine. By presenting what it feels are goods books, greatcharlie hopes it is helping to create such positive moments for its readers. Such was clearly not the reaction of the author of the comment to greatcharlie at issue. What intrigued greatcharlie most about the comment was the implication that proposing a more efficacious way to draw in Kalugin through clandestine contact would be too difficult if not impossible to do. What greatcharlie has set out to accomplish here, confessedly with a bit of dry humor, is meant to be instructive by demonstrating that is not the case. The Roman Emperor and Stoic philosopher, Marcus Aurelius Antoninus Augustus, was quoted as saying: “Because your own strength is unequal to the task, do not assume that it is beyond the powers of man; but if anything is within the powers and province of man, believe that it is within your own compass also.”

To recapitulate the segment of the book review at issue, it was noted that FBI counterintelligence, Kalugin’s main opponent in the field in the US during the Cold War, engaged in near endless attempts to intercept him and perhaps neutralize and recruit him, came in the form of clandestine contacts. Those attempts confirmed that he had actually been under surveillance as the FBI would only have undertaken such an effort if counterintelligence managers believed that had collected enough about him and his activities that they were convinced he was a Soviet intelligence officer, that they understood how Kalugin thought, and that he would respond favorably to an effort to make clandestine contact with him. The method used by FBI counterintelligence to reach Kalugin was the employment of women as honey traps. As defined in The Dictionary of Espionage, a honey trap is a method of sexual entrapment for intelligence purposes, usually to put a target–such as Kalugin–into a compromising position so that he or she can be blackmailed. Perhaps it would be enough to say Kalugin displayed restraint and elegance in the face of advances by the female FBI counterintelligence operatives. As mentioned in the April 30, 2020 post, he displayed a sensibility akin to what the French call “bof” (whatever) to it all.

Surely, Kalugin was neither ignorant of, nor surprised by, such attempts. Perchance, he just never considered getting involved with such nonsense  or pondered having anything to do with such women while on the beat. His resistance to such abysmal efforts at manipulation might also simply be chalked up by some to Kalugin’s self-discipline, his Apollonian nature. In the field, Kalugin was always dedicated to his country, the Communist Movement, and his mission. He was laser focused on his responsibilities as a KGB officer to spot potential recruits, collect information, even passively, and report observations, engage in active measures, and not fall prey to the women used against him. Still, Kalugin’s response should not be underestimated, it spoke much about his character. There would likely be more than a few trained intelligence officers, and certainly ordinary individuals, who would have succumbed to their pressure.

The reality that Kalugin when on the beat in the US was an attractive, intelligent, charming, debonair, and thoroughly married KGB officer under 40-years-old should not be ignored. If greatcharlie’s understanding of humanity is correct, on first impression, one would hardly get the idea that Kalugin would ever be so desperate for female companionship. One could imagine that meeting attractive women anywhere by no means would have been a problem for him. If anything, Kalugin would be the type to act, not react, in an amorous situation, and would not be drawn in by any enticements. Interestingly enough, he seemed to have been made curious about what would cause the women involved to willingly dispose of their virtue, as it was the late 1950s and early 1960s, and such behavior by women was generally frowned upon in the society. His discussion of the entire matter from that perspective demonstrated that he has quite an attractive wit.

Repeatedly attempting to ensnare Kalugin with their sensual masquerades, which was the case, became just silly. Perhaps what drove the continuous use of honey traps against Kalugin was the  proof and precedence of previous successes with less capable, less adroit, or simply inept KGB officers, along with some likely unsupported, doctrinaire, Cold War era preconceptions concerning the Russian male libido, convinced FBI counterintelligence of the correctness and efficaciousness of that method of clandestine contact with Kalugin. The focus was on the physical, the carnal, not the intellectual. Even at the most elementary level of decisionmaking on the matter, some recognition that a mental attraction, some cerebral connection between Kalugin and a female operative foisted upon him might be required. In the intelligence game, nothing about making contact with an opponent in the field can be considered too trivial to disregard. Yet, that aspect was apparently ignored or disregarded by the FBI, presumably counting upon an id-explosion that would overwhelm Kalugin. It was a considerable miscalculation. The failure to open the door to Kalugin in the first few tries resulted in repeated attempts by the FBI to kick it in. Non omnibus ægris eadem auxilia conveniunt. (The same remedies do not suit every patient.)

Regarding the FBI counterintelligence special agents who pursued him, their efforts may also have been a shrieking manifestation of their own thinking, a projection of their own desires and needs. After Kalugin gave professional consideration to using his personal appearance and attributes and those of other handsome males and females to further the KGB’s mission, he loosed those alluring qualities as weapons very effectively against Western officials and especially secretaries working in key offices in the US foreign and national security policy apparatus when he believed something considerable could be gained by doing so.

In First Directorate, Kalugin discusses a remarkable document which he claims to have received from a Central Intelligence Agency (CIA) officer entitled “Detection and Approaches to Psychologically Vulnerable Subjects of the Enemy.” The long paper cited US efforts to recruit Soviets worldwide and painted a portrait of Soviet citizens most likely to become spies. Kalugin quoted part of the document which was still in his possession when he wrote, First Directorate. Cited here is everything that Kalugin quoted, too precious to compress:

Soviet citizens are a highly disciplined group of people who have undergone extensive indoctrination, who are vigilant and extremely suspicious. Russians are very proud and extremely sensitive to any signs of disrespect. At the same time, many of them are adventurous, and they seek to break free from existing restrictions.

Acts of betrayal, whether, in the form of espionage or defection, are in almost every case committed by morally or psychologically unsteady people. Treachery is essentially atypical of Soviet citizens. That can be concluded from the fact that of the hundreds of thousands of Soviets who have been abroad, only a few dozen turned traitors, and only several of those became our agents. Normal, psychologically-stable people–connected with their country by close ethnic, national, cultural, social, family ties–cannot take such a step. The simple principle is confirmed by our experience of Soviet defectors. All of them are single. In every case, they had a serious vice or weakness: alcoholism, deep depression, psychopathy of various types. These factors were in most cases decisive in making traitors of them. It would only be a slight exaggeration to say that no [CIA] operative can consider himself an expert in Soviet affairs if he hasn’t had the horrible experience of holding a Soviet friend’s head over the sink as he poured out the contents of his stomach after a five-day drinking bout.

What follows from that is that our efforts must mostly be directed against weak, unsteady members of Soviet communities. Among normal people, we should pay special attention to the middle-aged. . . . People that age are starting their descent from the physiological peak. They are no longer children and they suddenly face the acute realization that their life is passing, that their ambitions and youthful dreams have not come true in full or even in part. At this age comes the breaking point in a man’s career when he faces the gloomy prospect of pending retirement and old age. . . . The stormy forties are of great interest to a [CIA] operative.

The document Kalugin describes specifically concerned the recruitment of Soviet agents by CIA case officers and not FBI counterintelligence, but one might fairly assess that there were sufficient similarities with regard to tactics, techniques, procedures, and methods of recruitment. Even so, none of the negative qualities described in the alleged official document Kalugin collected from the CIA traitor could be ascribed to him. He was nothing close to a luckless joe. As already enlarged upon, Kalugin was at all a “soft touch.” Oddly enough, the document’s author, imaginably an expert, unskillfully interchanged the national identity of “Soviet” with “Russian.” Even more, there is a discernible flavor of bias against Russians as an ethnic group in the words of the document’s author. What greatcharlie sought to illuminate along similar lines in its review was that bias and surmisal appeared to serve as the basis for developing the FBI’s plan for establishing clandestine contact with Kalugin. That choice left FBI counterintelligence operating in darkness, unsure of each step. Focus could have been placed on Kalugin’s known interests and strengths in a surprising and pleasing, yet entirely plausible way. Here is a quote from Augustus Caesar in which the author of the comment to greatcharlie might be interested: “Iuvenes quibus auditis senex iuvenes senes cum audierint.” (Young men, hear an old man to whom old men hearkened when he was young.)

A “Target-centric” Proposal for Clandestine Contact with Kalugin:

One learns in First Directorate is that a recreational interest of Kalugin in New York was attending The Metropolitan Opera. The FBI would certainly call it a “friendly” organization, and its staff, much as today, would gladly agree to any requests made of it by counterintelligence special agents. During an intermission, a casual encounter, seemingly occurring purely by happenstance could be arranged between Kalugin and a highly skilled operative posing as a frightfully pleasant beau monde and opera devotee, absolutely familiar with opera and the management of The Metropolitan Opera. Appropriately, the operative would need to be a refined, well spoken academic or scholar with considerable credentials in order to reduce the chance that Kalugin would be annoyed or bored by the conversation. That conversation could have led to a tantalizing invitation, to all appearances on a lark, to perform as a guest singer with The Metropolitan Opera Chorus. The invitation would be compelled by the FBI operatives recognition of “the scintillating quality and shocking potential of his voice.” The very brief embedding of journalists, which was after all Kalugin’s KGB cover, in such groups to write interesting stories about them from the inside was not something too unusual. Kalugin had already demonstrated that he liked to get involved in the nitty-gritty of things. Recall that at Columbia University, he did not just matriculate but became a member of the Student Body Council! The effort would be made to subsume Kalugin in a type of on-the-job, rapid training for an upcoming performance. To perform, Kalugin would not need to be proficient in a language of the opera, Italian, French, or German. (Kalugin was proficient in German.) He could easily perform lyrics using phonetical singing. That challenge might further interest him in the whole idea. His training for the performance could have been amply provided by a very capable member of the opera chorus, recruited and rapidly, but thoroughly trained to serve effectively as an FBI counterintelligence operative for a bit of time before the initial contact is attempted. The interactions between Kalugin and the operative could have been designed to lead to the ostensible development of a friendship between them.

Without fleshing out the entire hypothetical proposal, suffice it to say, the approach presented here would have been a plausible, thoughtful way to establish what was so difficult, clandestine contact with Kalugin. Hopefully, presenting it has not furthered any undeserved notion that greatcharlie has sought to be beastly toward US intelligence and counterintelligence services and law enforcement. It would be intriguing to hear Kalugin’s assessment of the proposal’s prospect for success. Periculosum est credere et non credere; ergo exploranda est veritas, multum prius quam stulta prave judicet sententia. (It is equally dangerous to believe and to disbelieve; therefore search diligently into the truth rather than form foolish ideas that would pervert your judgment.)

Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997)

On March 30, 2019, Chinese national Yujing Zhang (above) was twice caught slipping into US President Donald Trump’s Florida residence, Mar-a-Lago. When caught the second time, found on her were two passports, four cell phones, one laptop, an external hard drive, and a thumb drive. While detained and at trial, Zhang sought to confuse authorities as to her purpose. Creating doubt to elude suspicion as to their purpose was a tactic used by a legion of deep cover spies the chief of German Democratic Republic’s foreign intelligence service, Markus Wolf, unleashed into the West during the Cold War. His spies penetrated key political offices, government agencies, business concerns and more. In 1997, Wolf published Man without a Face, revealing intriguing facts on his 35 year intelligence effort against the West.

Markus Johannes Wolf, the author of Man without a Face, was senior government official of the erstwhile Deutsch Demokratische Republik (German Democratic Republic) or GDR. The GDR was created as a self-described Socialist workers’ and peasants’ state and a satellite state of the Soviet Union on October 7, 1949 and eventually reunified with the Federal Republic of Germany (West Germany) on October 3, 1990. Wolf worked for nearly four decades in the GDR’s Ministerium für Staatssicherheit (The Ministry for State Security) or MfS. MfS was also known as the Staatssicherheitsdienst (State Security Service) or SSD. However, it was universally referred to as the Stasi. The Stasi was not just another repressive security service of an Eastern Bloc government. The Stasi has been evaluated as the most effective and repressive intelligence and secret police agency ever to have existed. In a similar way, Wolf was not some ordinary senior bureaucrat in the Stasi. As chief of the GDR’s foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA, for many he embodied the frightening efficiency and domineering power of the Stasi and the overarching freedom crushing nature of GDR Communist system. Even more, Wolf held a unique reputation not only in the GDR, but everywhere else in the Eastern Bloc, during the shadowy intelligence struggle with the West. In Man without a Face, the reader learns exactly who he was and what his job was all about.

Markus Wolf (above). Those who knew Wolf universally described him as strikingly handsome and endowed with great charm. Possessing a tall, athletic build, he was quite the opposite in appearance and demeanor to the common Western image of a Communist security official as a sedentary, somewhat overweight, granite faced apparatchik with the will to enforce Socialist ideals with an iron fist. Although a devout Communist, he admitted a fondness for well-cut suits, elegant diplomatic gatherings, and music. One can discern from the text of Man without a Face that Wolf was a cultured man and possessed scholarly intellect.

The Author

Born on January 19, 1923, Wolf lived a very extraordinary life until age 83, passing on November 9, 2006. His memoir serves as a testament to that. Those who knew Wolf universally described him as strikingly handsome and endowed with great charm. Possessing a tall, athletic build, he was quite the opposite in appearance and demeanor to the common Western image of a Communist security official as a sedentary, somewhat overweight, granite faced apparatchik with the will to enforce Socialist ideals with an iron fist. Although a devout Communist, he admitted a fondness for well-cut suits, elegant diplomatic gatherings, and music. Indeed, one can discern from the text of Man without a Face that Wolf was a cultured man and possessed scholarly intellect. University educated as an aeronautical engineer, his main employment experiences were as a propagandist, journalist, diplomat, intelligence analyst, and spymaster. Reportedly, Wolf possessed an understanding and empathy for others. How that manifested itself with regard to the suffering of the people of the GDR remains an issue if some controversy.  An almost universal criticism of Wolf concerned his political quietism in the response to the hardline approaches of GDR regime and his willingness served as a vital part of a government machine that would crush the souls of its own citizens. Yet, with regard to his work, those sensibilities allowed him to display a personal warmth and concern for his chers collégues. Those assigned to Wolf’s HVA, with the exception of those few who defected during the early years, were unshakable in their loyalty to him and a certain esprit developed within their number. In his efforts  to manipulate and exploit adversaries via the HVA, his particular interpersonal gifts proved useful. It has been posited that many double agents recruited from West felt somewhat comfortable turning to Wolf’s side as he had acquired a reputation for being a very capable spymaster with whom, oddly enough, they could feel secure.

In terms of how he comported himself, Wolf recognized both in his work and in his personal life, the importance of patience, nuance, open mindedness, and the full exploitation of information available. Away from official meetings and formal functions in the GDR or in the Soviet Union, Wolf lived a life in relative obscurity, brilliantly concealing his presence and the footprint of his organization as both operated against the West. Interestingly enough, the memoir’s title, Man without a Face, was a direct reference to the fact that at one point, Western intelligence services only had a blurred photograph of Wolf while he attended the Nuremberg Trials from which elements within the Central Intelligence Agency (CIA) managed to identify him in 1959. Unable to collect an up-to-date photograph from which to identify Wolf, for a long-time he was referred to among Western intelligence services as the “man without a face.” As the story goes, only after a GDR defector, Werner Stiller, identified Wolf in a photograph in 1979 for the counterintelligence element of West Germany’s Bundesamt für Verfassungsschutz (Office for the Protection of the Constitution) did that change. The photograph of Wolf was captured by Säpo, Sweden’s National Security Service, during a visit he made with his wife to Stockholm in 1978. Within the Stasi and GDR government as a whole, the HVA would garner considerable power and influence. From its beginnings on a shoestring budget that left Wolf urging his government superiors for more resources, the HVA eventually had a hard currency budget of 10 million Deutschmarks a year. By the mid-1980s, only the KGB exceeded the HVA in manpower among the Eastern Bloc foreign intelligence services. At the same time, Wolf’s HVA was a prime source of intelligence for the KGB. Wolf would explain that his organization’s greatest contribution was helping to maintain peace between East and West by reducing the element of surprise with the information his spies collected.

Wolf did not follow the times with regard to intelligence tactics, techniques, procedures, and methods. He consciously stayed a step ahead of them. His operations enjoyed a level of security that intelligence services today have good reason to envy. Toward the end of his reign at the foreign intelligence service, Wolf excited further interest in the West when he backed the glasnost and perestroika policies of the Soviet leader Mikhail Gorbachev. Wolf explains in Man without a Face that he was planning to retire at the rank of Generaloberst (Colonel General) in 1985. There were alternative explanations for his retirement accepted in the West. It was said that Wolf retired at in 1986 “owing to serious health problems.” There was also the belief that Wolf was forced into retirement, strangely enough, when GDR officials learned that he had decided to divorce his second wife, Christa Heinrich, and marry his mistress Andrea Stingl. After unification, Wolf was convicted of treason by the Federal Republic government and sentenced to six years imprisonment. After an appeal, the charge and sentence were dropped on the basis that he had only been acting as a loyal government servant for the GDR, his erstwhile country.

Through Man without a Face, the reader is provided with the opportunity to discover how a master craftsman performed his work in his own words. In its review of Man without a Face, greatcharlie explores what sort of individual becomes Wolf, what the earliest years of Wolf’s odyssey informs the reader of the man, and what one can learn about his thinking process from what he provides in the text. To the extent that Man without a Face might interest those flirting with Socialism in the West today, the review calls attention to Wolf’s history as a defender of Socialism and the Communist Movement and his ultimate disillusionment and disappointment with the GDR government.

Previous Reviews of Man without a Face

Surely for those thrilled by spy novels, there was enough provided by the great spymaster to allow them to live vicariously through his anecdotes. Among the 365 page book’s 17 chapters are alluring titles such as: “Spying for Love”; “The Chancellor’s Shadow”; “The Poison of Betrayal”; “Active Measures”; and, “Enemy Territory ”. In his October 30, 1997 review for the London Review of Books, David Blackbourn remarked: “Espionage junkies will enjoy bits of tradecraft scattered through the book: dead-ender drops, fullbacks, couriers, phoney brothels, false bottomed deodorant bottles left in the lavatory cistern of the night train.” However, at the time of its publication in 1997, hopes generally ran high that Man without a Face might also reveal much about the inner workings of a man such Wolf. To their chagrin, Wolf, with the assistance of Anne McElvoy (then a newspaper editor and columnist from the United Kingdom), did not write Man without a Face in a way to make the inner Wolf easily accessible. As a result, many previous reviewers expressed disappointment, feeling unfulfilled, after reading Man without a Face. The intelligence scholar and author, David Wise, in his July 13, 1997 review in the New York Times, explained: “Throughout his account, Wolf has a great deal of difficulty coming to terms with his own actions, and with the Stasi’s Orwellian, police-state methods and its murky operations. He defends his own role by drawing a distinction between his foreign intelligence service and the Stasi branch that acted as East Germany’s own Gestapo. But the lines were often blurred.” In the November/December 1997 edition of Foreign Affairs, Eliot Cohen stated more forcefully: “Wolf’s selective memory, continual attempts at self-exculpation, and specious resort to the argument that the West behaved as badly as the communists are neither convincing nor appetizing.” Some actually expressed anger over the fact the Wolf did not present an absolute “tell all” about life in the Stasi. The remuneration for publishing the memoir would hardly be enough to stimulate Wolf to open the kimono and unload a trove of furtive information which he had held tightly for years. (In the Independent on September 15, 1996, Leslie Colitt revealed in a synopsis of his book on Wolf entitled Spymaster, that Wolf was preempted with a contract to produce three books for more than $400,000.) In a July 17, 1997 review of Man without a Face in the Economist, it was stated: “Readers with the stamina to compare the English and German versions of Mr Wolf’s tome are likely to be struck by two things. One is how much the accounts vary, not just in substance (a lot more in English, for instance, about how East Germany gave succour to fleeing West German terrorists) but also in tone. Which reveals the true Mr Wolf? A silly question really. The other thing of note is how few of Mr Wolf’s revelations are new. Is that because he has nothing much new to say; or is he keeping in reserve some potentially explosive material about treachery practised by some of the good and the great in the West? Just as insurance, of course, against any western pressure. You can’t be too careful.”

Those who may have had only a passing or no interest in what the High Priest of the GDR intelligence service had to say, but familiar enough with the GDR, might have reasonably presupposed before reading the book that they would come across nothing more than a complete whitewash of the activities of the country’s security apparatus, the intelligence service specifically, and the afflictions and wounds of a society that was crushed under the heel of the government’s figurative iron boot. Gilbert Taylor of The American Library Association’s Book List Magazine stated in a May 15, 1997 review: “Wolf still believes in communism, even oddly describing a “semimystical aspect” to his memories about Stalin, whom he once met and regarded as a demigod. If he still holds onto his political dreams, Wolf is too worldly not to criticize (mildly) its failures; although in the spy game, rather than question the communist enterprise, he applied his worldliness to the exploitation of human nature. In that, at least, he was very good.”

Looking at Man without a Face today, knowing fully who Wolf was and void of Cold War bias, it appears that such critical assessments were off-base from the get-go. To be honest, anyone knowing much about Wolf might agree that writing Man without a Face in such an unimaginative, predictable way would be un peu trop classique pour son style et à ses goût. It may very well be that Wolf assessed that for those who may excavate through the book and thoroughly consider points of exposition concerning both himself and activities in which he was engaged, his work would be substantially edifying. To that extent, criticisms that insist Man without a Face is lacking, in the humble judgment of greatcharlie, are wrong. Through Man without a Face, the reader is provided with the opportunity to discover how a master craftsman performed his work in his own words. In its review of Man without a Face, greatcharlie explores what sort of individual becomes Wolf, what the earliest years of Wolf’s odyssey informs the reader of the man, and what one can learn about his thinking process from what he provides in the text. To the extent that Man without a Face might interest those flirting with Socialism in the West today, the review calls attention to Wolf’s history as a defender of Socialism and the Communist Movement and his disillusionment and disappointment with the GDR government.

The symbol of the German Democratic Republic’s Staatssicherheitsdienst (State Security Service), referred to universally as the Stasi (above). The Eastern Zone of Allied Occupied Germany after World War II eventually became the GDR in 1949. The Communist leaders of the new country would lie about or deny realities about what was occuring in their society. Control of the population was aided by the government’s insistence that the people keep a watchful over threats to the new system. It was understood that the reactionary, the counterrevolutionary posed an internal threat and had to be destroyed. In the performance of that mission, the Stasi earned a reputation for being the odious, oppressive instrument of the authoritarian regime.

For Those Unfamiliar with the Defunct GDR

Given the reality of the monstrous treatment that the people of the GDR received from their government, it would be reasonable to expect most of its former citizens to have an emotional response to Wolf’s book. Man without a Face could only have been prejudged as a distorted chronicle of the GDR’s governance as observed from the warped lens of a man who was among the masters of the nightmare in which the people lived. To many of them, it was also very likely thought to be one more occasion in which the moribund GDR regime sought to reach out from the grave to fire a parting shot in defense of Communist hypocrisy. For those too young to be sufficiently aware of the history of the long since gone GDR, one must go back to the end of World War II, during which the Soviet Union held in its tight grip the Eastern Zone of the four zones of Allied Occupied Germany and East Berlin. Three countries, the US, United Kingdom, and France, had control over what was the more well-heeled Western Zone and West Berlin. In the Eastern Zone and East Berlin, the Soviets took responsibility for the reconstruction of cities, towns, and villages destroyed by Allied bombers or its own advancing forces, building countless new residences for German refugees and displaced persons. There were massive infrastructure projects and governing bodies at the national, provincial, and local level. Yet, the Soviets also worked behind the scenes to establish a puppet government in Eastern Zone of Allied Occupied Germany set in East Berlin that would serve as an extension of Moscow’s rule. That government would have the initial outward appearance of being democratic but in reality was not. Local Communists were gathered into a coalition party then handed power after rigged elections. All political parties, other than the Communist Party, were dissolved. The Eastern Zone of Allied Occupied Germany eventually became the GDR in 1949. The leaders of the new country would lie about or deny realities about what was occuring in their society. Control of the population in the burgeoning Communist government was aided by its insistence that the people keep a watchful over threats to the new system. It was understood that the reactionary, the counterrevolutionary, most often “hiding in the shadows,” posed the greatest threat and was viewed as anathema.

Ostensibly, the response had to be strong enough to match “the severity of the disease”. It was in the performance of that mission that the Stasi earned a reputation for being the horrifically oppressive instrument of the authoritarian regime. The Stasi interfered in the interactions and relationships between citizens, ordered citizens to spy on their fellow citizens, demanded that they betray one another, regularly performed intrusive and demeaning searches of citizens’ person, homes, and workplaces. There were arrests of many innocent citizens, accompanied by abusive and endless interrogations. Untold numbers of GDR citizens were sentenced by kangaroo courts to lengthy imprisonments in dark and dank gaols. There was also the Stasi technique of psychological harassment of perceived enemies known as Zersetzung, a term borrowed from chemistry which literally means “decomposition”, but involved the disruption of the victim’s private or family life. Zersetzung was designed to side-track and “switch off” perceived enemies so that they would lose the will to continue any “inappropriate” activities. For those unfamiliar with the technique, it would likely be hard to imagine just how abominable cruel it was. Any foreigners which had contact with GDR citizens, or any visiting foreigners visiting the GDR were tracked by the Stasi. Essentially all of it was documented as a result of the GDR government’s neurotic practice of endless record keeping on everyone and everything. Records showed that the Stasi had over 90,000 employees and used well over 170,000 Inoffizielle Mitarbeiter or informants. The people of the GDR lived in an environment of fear created by their government. Michel de Montaigne, the 16th century French-Occitan philosopher stated: “A man who fears suffering is already suffering from what he fears.”

The society that would develop in the GDR, with its repressive, authoritarian underpinnings, could best be called a human tragedy. The terms austereness, sternness, dourness, grimness, sombreness, unfriendliness, and coldness all fittingly describe its tenor. The strictures of its laws amplified the government’s intention to limit freedom, experiment with social engineering, promote a collective consciousness, reject individualism, and demand a conformist posture of all citizens at all times. Yet, from the moment the GDR government subjected the German people to terror and horrific brutality through the State security apparatus, it condemned his country to a form of arrestment and its people to soul crushing heartache and despair, and that situation stood until the fall of the Berlin Wall. Germany finally came into port after a rough sea.

Leben heißt nicht zu warten, bis der Sturm vorbeizieht, sondern lernen, im Regen zu tanzen. (Life is not about waiting for the storm to pass, but about learning to dance in the rain.) For the sake of providing a balanced perspective of GDR life, one could still say that most East Germans did not live in misery every minute of every day. Basic needs and services were provided to the people by the government to the extent possible. That allowed for some degree of satisfaction. Citizens of the GDR, as Germans, had a long storied history. They also had a rich culture to which they could adhere. By enjoying German traditions that had not been co-opted by the Communists, they could find some authentic satisfaction, joy, and happiness. Pleasant aspects of life in the GDR may have been things such as good times had among family, friends and colleagues (albeit, they may have been surveilling each other for the Stasi.) Luckily, that whole era is dead. (One can visit the Stasi Museum Berlin located in House 1 on the former grounds of the headquarters of the GDR Ministry for State Security and ”Runde Ecke” Memorial Museum and the Stasi Bunker Museum located at Dittrichring 24 in Leipzig, Germany to discover the actual horrors that the Stasi unleashed upon GDR citizens and how it all worked.)

Looking back, relatively widely-held notions from the past of a new world order based on Communism seem barky, but that certainly was once promoted as a philosophy that offered a better life for all. As decades have passed since the end of the Cold War, marked with the collapse of the Soviet Union, a new line of thinking would emerge on the erstwhile geopolitical struggle between East and West and all of the people and events associated with it. Unimaginable a few decades ago, today certain impulses in support of Socialism, apparently untutored by anyone truly knowledgeable on the matter, has manifested itself very publicly on the US political scene. For some, it may be invigorating to read through and adhere to sterilized tenets of Socialism discussed in the abstract in texts of scholars and academics. However, such studies are certainly isolated from the realities endured by earlier generations in the Eastern Europe. Those excited by Socialism today are actually attracted to the best possibilities of a pastiche of the political and economic theory. Their thoughts manifest the vanity of the mind. They need to know the real history of people who suffered under that system.

Konrad Wolf (left), Markus Wolf (center) Friedrich Wolf (right). From Wolf’s account of his childhood in Man without a Face, there is no way to know whether it was a happy one. What is presented on that aspect of his life in the book is a complex story with a lot of backstory. Wolf’s father, Fredrich Wolf, was a prominent physician, well-known playwrite, pro-abortion advocate, and devout, active Communist. His mother, Else Wolf, was a teacher and also a staunch Communist. Wolf’s only sibling was a brother, Konrad Wolf, who was two years younger.

Excavating Wolf’s Inner Workings

Wolf was born on January 19, 1923 in Hechingen, Germany. From the account of his childhood in Man without a Face, there is no way to determine whether it was a happy one. What is presented on that aspect of his life from Chapter 3 is a complex story with a lot of backstory. Wolf’s father, Fredrich Wolf, was a prominent physician, well-known playwrite, and pro-abortion advocate. He rejected Orthodox Judaism to become a devout and active member of the Kommunistische Partei Deutschlands (Communist Party of Germany). Among the plays his father wrote was “Professor Mamaluke,” which dealt with the oppression of Jews in Germany.  His mother, Else Wolf, was a teacher and also a staunch Communist. Wolf described her as follows: “My mother was quiet and gentle but a person of great courage, whether undergoing the Nazis’ rough house searches or those of the secret police in Stalin’s Russia.” He also stressed: “It was our mother who raised us during our father’s long romantic or political absences.” Wolf’s only sibling was a brother, Konrad Wolf, who was two years younger. Konrad would later become a film director. Wolf affectionately mentions him by his nickname “Koni” at various points in the book. The Wolf family lived comfortably in a large Bauhaus-designed home in Stuttgart. As both of his parents were Communist, Wolf says in Chapter 2 that from them he “came to perceive Stalin as as a wise and distant figure, like the benevolent magician in the fairy tales.” From his father specifically, he received considerable tutorial on Communist Movement as well as naturism. Wolf and his brother would become members of the Communist youth organization, Young Pioneers. However, as Adolf Hitler and the Nationalsozialistische Deutsche Arbeiterpartei (National Socialist German Workers’ Party better known as Nazis (Ehrlich! Hitler was a self-styled Socialist!)) took control of Germany, Wolf’s family would eventually rush to resettle in the Soviet Union in 1933.

Readers learn from Chapter 3 that during their exile in Moscow, Wolf’s family lived in a cramped apartment. Wolf adapted well to his new environment, acquired the local slang. He acquired the nickname, “Mischa”. As for his education, Wolf first attended the German Karl Liebknecht School and later a Russian school. Having been primed by his father’s teachings and his experience in the Young Pioneers, Wolf was immediately subsumed by Communism in school. There, Wolf’s understanding of all arguments in favor of the movement and the system were topped off. The beliefs he acquired then likely stood unaltered from that time onward. Any misgivings that he may have had were shucked off. He professed to all his fierce loyalty to Soviet Premier Joseph Stalin. Interestingly enough, the Wolf’s family was present in the Soviet Union at the time of Stalin’s Purges, but it did not affect them directly, although Wolf indicates in the book that he was aware of what was happening. In 1936, at the age of 13, Wolf obtained Soviet identity documents. The Communist Party became aware of his attitudes and attributes and while a student selected him to be a member of the nomenklatura, the high ranking management of the apparat, the Communist Party or government bureaucracy. In his youth, Wolf could hardly discern that the virtues, that his political mentors asserted the system had, were never practiced fruitfully anywhere in which the Communist Movement took root. Having that new attachment to Communism and the Communist Party was crucial at that point because in 1938, his father, central to his life to that point, had a reduced presence. Very telling of his father’s mentality toward family, in 1938 Wolf’s father made his way to Spain to work as a doctor in the International Brigades. However, he was arrested in France and interned in the concentration camp at Le Vernet. In 1941, he gained Soviet citizenship and returned to Moscow where he became a member of Nationalkomitee Freies Deutschland (National Committee for a Free Germany), an anti-Nazi, paramilitary organization formed in 1943. He had affairs with other women, producing what Wolf called a “small brood of children.”

Wolf insists that despite his absences, his father remained the strongest political influence on his life. Whenever he was away, he would send letters “full of advice of how to be correct and honorable socialists and human beings.” Perhaps his departure was also made less disruptive by the fact that by that as Wolf grew older, he came to terms with his own life. In fact, Wolf apparently did not go through a vulnerable age, perhaps because did not really have the opportunity to do so. Indeed, Wolf never gave the indication at any point in the book that he was an uncomfortable person. Still, there is the possibility that lack of  permanence in his family relationships due to his father’s competing dedication to the Communist Party had a significant impact in another way. What he may have acquired from observing and internalizing his father behavior may very well have been how individuals can weave themselves into the lives of others and untangle themselves to find a way out and how natural it all can be. (Wolf’s father, by the end of World War II was thoroughly off on his own. He was in the Eastern Zone of the Allied Occupation, where Wolf would also arrive, active in literary and cultural-political issues. From 1949 to 1951 he was the first ambassador of East Germany to Poland. He died in his personal office in Lehnitz in 1953.)

Wolf would enter the Moscow Institute of Airplane Engineering (Moscow Aviation Institute) in 1940. The school was evacuated to Alma Ata, Kazakhstan after Nazi Germany’s  attack on the Soviet Union. Wolf and his mother and brother arrived there on the Writers’ Union train. While there, he was told to join the Comintern, where he and others were prepared for undercover work behind enemy lines. He would ultimately be assigned as a newsreader for German People’s Radio after dissolution of Comintern from 1943 until 1945. Contact with the Communist Party in Germany and a life lived early enough within the authoritarian Soviet Union very likely enabled Wolf to better understand and accept personal and group interactions under the control of others and learn or attain by unconscious assimilation the level of caution required to survive and thrive rather than bother considering notions of freedom of choice and the exercise of free will.

Wolf the journalist (above). In his first position in the Eastern Zone of the Allied Occupation, Wolf directed Berlin Radio in the Soviet Zone of occupation and worked as a journalist. He was among the journalists from the East who observed the entire Nuremberg Trials against the principal Nazi leaders. From 1949 and 1951, Wolf worked at the GDR Embassy in the Soviet Union, but even more importantly in 1951, he also joined the Stasi. He was assigned to its nascent foreign intelligence service. Although Wolf  presents that moment  as a simple anecdote among others, it is actually an inflection point in his life.

Inflection Point: Wolf’s Start in the World of Intelligence

In Chapter 3, readers discover that Wolf, in 1945, just married to Emmi Stenzer the year before and only 22 years old, was sent to postwar Berlin with the Ulbricht Group, led by one of the founding members of the Weimar era Communist Party of Germany, Walter Ulbricht. During the Nazi regime in Germany, Ulbricht lived in exile in France and in the Soviet Union  Although Wolf was actually coming home, the most formative part of his youth was rooted in the Soviet Union. Under such circumstances, even though German, he felt that he was being transplanted into a foreign land. As he states in Chapter 3, Germany was his “Heimat” (heartland) but he felt “a pang of homesickness” for Moscow.

Die Qual der Wahl haben. (To be spoiled for choice.) In his first position in the Eastern Zone of the Allied Occupation, Wolf directed Berlin Radio in the Soviet Zone of occupation and worked as a journalist. He was among the journalists from the East who observed the entire Nuremberg Trials against the principal Nazi leaders. From 1949 and 1951, Wolf worked at the GDR Embassy in the Soviet Union, but even more importantly in 1951, he also joined the Stasi. He was assigned to its nascent foreign intelligence service, operating as the Institut für Wirtschaftswissenschaftliche Forschung (Institute for Economic Research) under Anton Ackermann. Although Wolf presented that job change as a simple anecdote among others, it was the inflection point of his life. He joined a small cell alongside young Stasi officials as himself. Although Ackermann was the chief of the Institute for Economic Research, it was guided under the stewardship of Ulbricht. Ulbricht was already in control of the GDR, and remained so from 1950 to 1971, as the First Secretary of the Sozialistische Einheitspartei Deutschlands (Socialist Unity Party of Germany). Wolf made it clear that he was not exactly a fan of Ulbricht. In describing the GDR’s chief decision maker, Wolf stated that he was hard-line, ruthless, authoritarian, pig-headed and heavy-handed. Displaying a bit of patrician aesthetic, Wolf added that Ulbricht, who was from Leipzig, spoke with a “provincial Saxon accent.” Ulbricht’s continuous purges of senior leaders was a sign of his insecurity and unsteady leadership. (In addition to being First Secretary of the Socialist Unity Party of Germany, Ulbricht took on the role as GDR head of state from 1960 until his death in 1973. From 1971 to 1973, he only held the title of Honorary Chairman of the Socialist Unity Party, being succeeded in the actual position in 1971 by Erich Honecker, who ruled in the GDR until German Unification in 1989.)

Wolf’s first assignment in the foreign intelligence service was to serve as the deputy to the chief of analysis, Robert Korb. Korb had already worked with Wolf at Radio Moscow. Wolf’s work alongside of Korb did much to elevate his professional capabilities in foreign intelligence work. Wolf described how important Korb was to his development in Chapter 3. He stated: “Korb had profound political knowledge and an enormous command of facts and breadth of learning. I learned a great deal from him about things that had nothing to do with our work, such as Islam, the complicated background of Israel, and the religious conflicts of the Indian subcontinent. He was a brilliant analyst who taught me to regard field reports with skepticism, and we soon came to conclusion that a careful reading of the press could often produce results far superior to secret reports of agents, and that our own analysts should draw independent conclusions from diverse sources in order to evaluate raw intelligence material. This insight has remained with me ever since.” (Using the news media as an overt source of intelligence is not as feasible today as it was in Wolf’s time. The mainstream news media rarely acts as an unbiased, balanced reporter of events. The misguided extrapolation of information from news media sources is a subject that greatcharlie has dedicated considerable discussion.) Engaging in diligent, granular analysis as he learned at Korb’s side was undoubtedly beneficial to Wolf in his interactions with Ulbricht. Ulbricht was a longtime Communist Party operative, savvy about political intrigue. Once in the thick of things as head of the GDR, he apparently kept his head on a swivel so to speak, keeping everyone on edge, wary of his designs. Wolf’s well-managed interactions with Ulbricht may have resulted in part with Wolf becoming integral in the founding the HVA in 1953.

Starting out, Wolf’s HVA was certainly a weak child among the more mature and experienced Western and Eastern intelligence services. Reportedly as many as 80 intelligence services operated on the beat in postwar Berlin. Under its chief at the time, Ackermann, the HVA encountered a number of setbacks at the hands of the Western foreign intelligence services which were up and running well after World War II. There were great concerns regarding loyalties of GDR agents, the viability of networks, the ties to the intelligence service of the Communist Party of Germany. It was discovered through the Stasi’s arrest of an agent codenamed Merkur on the charge of being a double agent, that far more was known about the GDR spy networks outside of headquarters than any at HVA would have hoped. To better understand the situation, Wolf, then deputy chief of analysis, drew a diagram of the connections and choose connections among the existing intelligence networks, which began to look like a huge web. He attributed his capability to map out such fine details of the spy network to his training as an aeronautical engineer. He described his effort as follows: “On the diagram I connected all of the couriers, safe houses,  and the like. I colored suspected double agents red, sources blue, and residents green. The lines and boxes also identified personal and professional relationships. Special symbols marked suspicious circumstances or suspected contacts to opposing services. To the uninitiated, the diagram would have meant nothing, but to my eyes, it began to take on a clear outline indicating possibilities for expanding and deepening our work. It was also a clear picture of how deeply this service had been penetrated from the outside.” The conclusion for action that Wolf reached was rather prodigious. Recognizing that Western secret services could easily liquidate the whole network if they wanted to do so, Wolf decided to liquidate the network himself, and abandon all HVA contacts with Communists in West Germany. Ulbricht approved the decision. In 1952, the HVA recalled all of its agents, and even the most loyal Communists were placed in isolation under a sort of “villa arrest” and subjected to tough questioning.

Wolf provided an extraordinary description of how the HVA questioned its own agents, perfectly reflecting the nature of the GDR’s brutal, authoritarian regime. Wolf explained: “It was based on psychological pressure against men and women accustomed to drawing their sense of identity and self-esteem from membership in a group of like minded people. When that trust is suddenly withdrawn, the psychological pressure on them becomes acute. There was no need to threaten them or issue formal warrants of arrest. Addressing them as suspects and monitoring their replies was enough to convince us that they were innocent and that we had found no more double agents. Of course, there was no question of deployment in the West. They were warned not to talk about what happened. All of them kept their word about thus, as good comrades do.” It all seems quite intriguing and horrifying at once.

When Ackermann was removed as chief of the foreign intelligence service by Ulbricht. ostensibly because he was caught having an adulterous affair. Wolf, only 30 years old at the time, and only had 16 months of experience in the foreign intelligence service, was given the position. According to Wolf in Chapter 4, he was summoned to Ulbricht’s office and told: “We are of the opinion that you should take over the service,’ said Ulbricht. That was a royal’we–or, more precisely, ‘we’ meant the Party leadership. He did not ask me whether I thought I was up to the job, nor did he invite further discussion.” The HVA remained directly under the watchful eyes of Ulbricht until he was appointed as head of the Stasi, a member of the politburo, Wilhelm Zaisser, who he could rely upon. Wolf recalled that Zaisser was less concerned with the intelligence product HVA produced and focused more on his editing of a new German edition of Lenin’s collected works. Wolf, left to his own devices by Zaisser, worked hard daily to better understand the craft of intelligence. Despite his concerns about Ulbricht, Wolf acknowledged in Chapter 4 that he was provided ample opportunity by him to acquit himself well as the leader of the new intelligence service. That was a rather unique, positive response from Ulbricht. Nevertheless, in Chapter 3, Wolf recounts that he was often disappointed in the early years by the actions of Ulbricht. With regard to the uniforms worn by GDR officials that in Western mind came to symbolize the government’s Godless, authoritarian nature, Wolf noted: “One the odder ideas the Ulbricht espoused during the period was a return to military symbolism–a distinct about face given that we had criticized the West Germans for continuing the military nationalist traditions of Hitler’s Wehrmacht. Traditional military music was also revived . . . Like many Communists who had been brought up to view this blend of militarism and music as having prepared the ground for Nazism, I found this disturbing.” The early years of the GDR mark the time when the country began shaping up to be something far less than what motivated, young Communists had hoped. The direction that Ulbricht decided to take the GDR, according to Wolf, was driven by his uncompromising ideology and his desire to appeal to hardline Stalinists in Moscow. Upon Stalin’s death in 1953, Wolf felt that Ulbricht had leaned too far right, gambling that the Stalinist would emerge on top in a power struggle at the Kremlin and went out of his way to impress them with a policy of “accelerating socialism.”  As Wolf explains in Chapter 4: “Large firms and agricultural companies suffered under the sudden drive to perfect the Socialist economy. The activities of the Church were further curtailed.” Ulbricht bet on the wrong horse. Nikita Khrushchev came to power, famously recognizing the wrongs Stalin had inflicted upon the Soviet people. Ulbricht continued doing things his way nevertheless. A change at the top at Stasi would eventually result in Ulbricht settling on Erich Mielke. Wolf referred to him as Ulbricht’s “watchdog,” and would remain in charge at Stasi until 1989. Perhaps the most telling description of Mielke by Wolf was his statement in Chapter 4: “Mielke was a warped personality even by the peculiar standards of morality that apply in the espionage world.” He set the tone for the Stasi as Wolf further explained: “He [Mielke] was afflicted with an obsession for collecting data, not only on suspected dissidents, whom he ordered to be placed under round-the-clock surveillance, but on his own colleagues.” Such was the environment in which Wolf worked.

Wolf, the young HVA chief, in uniform (right). Wolf recounts that he was often disappointed in the early years by the actions of the GDR leadership. With regard to the uniforms worn by GDR officials, which in Western mind came to symbolize the government’s Godless, authoritarian nature, Wolf noted: “One the odder ideas the Ulbricht espoused during the period was a return to military symbolism–a distinct about face given that we had criticized the West Germans for continuing the military nationalist traditions of Hitler’s Wehrmacht. Traditional military music was also revived . . . Like many Communists who had been brought up to view this blend of militarism and music as having prepared the ground for Nazism, I found this disturbing.”

Inter bellum et pacem dubitabant. (They were hesitating (wavering) between war and peace.) The Cold War was a time of considerable intelligence activity. Intelligence studies and intelligence tradecraft are disciplines unknown in the minds of most observers. What is generally understood about it all is unfortunately gleaned from banal amusements propagated about spying, particularly the commercial product, James Bond. Through Bond, observers are inculcated with the idea that in spying, the mundane day-to-day can become exciting at any moment by expulsion or surprise attack! An everyday item can magically become a telephone, microphone, or weapon. In Chapter 4, Wolf stated that a song, that he helped compose, aided in reminding him that he was fighting an intelligence war on “The Invisible Front.” Still, some aspects of it were not so invisible. For the most part, foreign diplomatic services become a shell for the real Cold War being fought. Yet, while there was an understanding that all sides were engaged in such activity and it appeared to be an orderly world, it was actually anarchic. Both East and West were sending intelligence officers and running agents behind enemy lines was perilous undertaking in which one had to be thoroughly prepared. All agents were armed with a catalogue of proscribed practices. Collecting and disseminating was done under a pall of suspicion from all sides.

Those today who gleefully explore and promote the idea of creating Socialist systems, may be unable to view events of the Cold War as the Communist revolutionaries and anti-Communist forces who battled against one another across their respective borders and worldwide. Communism was indeed an aggressive revolutionary political system dedicated to the destruction of the West. Without having lived through the stand-offs between forces, the proxy wars, and incidents that had the two sides teetering between peace and war, one may be easily taken in by curious assessments of the Cold War that characterize it as an episode that was something less than one of the defining moments of the 20th century. It is instead characterized as something more akin to a mere “dust up” between the East and West. Those assessments of the decades long struggle are wrong. It was a collision between to world during great damage was done, and in the end, the West won. As the French Emperor Napoleon Bonaparte explained: “Between a battle lost and a battle won, the distance is immense and there stand empires.” There was no mildness, leniency, or geniality. In the West, Communism was seen as a danger to mitigate and eventually defeat. As Wolf’s opponent declared itself anti-Communist and he became subsumed by the effort to defeat it.

Personnel; Plans and Training

Wolf tried to take the bull by the horns at the HVA and learned with some difficulty how he could best to set about accomplishing things. Being admitted to the top of the intelligence service so quickly by Ulbricht put Wolf, in terms of the theater, downstage center. However, it meant that Wolf never would have the opportunity to see the work of the intelligence service through the lens of a junior worm, upstage, off to the side. At the bottom, realities are more apparent, poor decisions from the top are often felt more personally, and nuance is learned. One becomes aware pitfalls to be avoided. The going was somewhat rough. It was not long before Wolf dealt with what he called his first “bombshell”. Gotthold Klaus, who served in the HVA’s economic intelligence unit, became the first defector. Wolf explained that it took a heavy toll on him personally and made him realize that his young service was far from secure. Klaus had disappeared during the holiday weekend and his absence was not detected for several days. In that short period of time, West German intelligence extracted everything he knew about the GDR agents. Six were arrested before there was even the possibility of calling them back. The incident became known as the Vulkan affair. Interestingly, Wolf noted: “Franz Blücher, the vice chancellor of West Germany, announced at a press conference that thirty five agents had been arrested as a result of Vulkan information. This was an exaggeration; no officer never would have been allowed to know the identity of so many agents operating in a hostile country. It turned out the West German counterintelligence,  overexcited by their first big coup, caught in its net a number of innocent businessmen who did deals in the East but were certainly not spies.”

To his good fortune after that first set back–as well as few other initial failures, Wolf did not put his head completely underwater. He admits to being gently reproved by the head of Stasi, Zaisser, who said: “Mischa, you have to learn more and more about many things.” In the end, despite what occurred, Wolf was kept on board at Stasi. Fortunately for Wolf, at the very top, there was an apparent delicacy toward him. The individual watching over him was none other than Ulbricht. He was responsible for Wolf’s appointment as chief of the HVA, and he had considerable confidence in his capabilities. Presumably, he acknowledged that was operating with a blind spot concerning operational security that did not allow him to see straight about what was really happening. He failed to fully grasp the full measure of the operational prowess of his opponent. Still, Wolf kept his composure. He stated in Chapter 4: “The following months were spent reorganizing our whole operation along more efficient lines. Wolf might have pondered how can he be sure what is genuine anymore after that initial disaster. Surely, he did not want to fall victim to the same lapses again. Wolf’s diagnosis was to better control his organization’s activities, to deploy his agents throughout the West, ensuring that they were allocated wherever they might have a chance to identify and maximally exploit opportunities to collect critical information and links with key players in military, diplomatic, political, economic, social and business decision making. It was akin to sowing seeds across an open field and monitoring their growth. The concept behind it was known as the “principle of patience” in long-term operations. Along the way, Wolf would massage, through controllers,  the infiltration efforts of his agents. Wolf was given a chance to make tomorrow better than today. Wolf developed a sophisticated, intensified plan to place and service illegal agents in deep cover in the West. Surely, he was already engaged in that process at some level.  However, under the new strategy, his long-term “sleeper” agents introduced into the stream of East German refugees entering the West, but they would remain patient for years, sometimes decades, while they would carefully work their way into key positions.  One the innermost secrets of the “class enemy” were in their reach, they would begin to supply as much as they could back home.

Walter Ulbricht (left) and Markus Wolf (right). As First Secretary of the Socialist Unity Party, Ulbricht controlled the GDR from 1950 to 1971. Wolf made it clear that he was not exactly a fan of Ulbricht. In describing the GDR’s chief decision maker, Wolf stated that he was hard-line, ruthless, authoritarian, pig-headed and heavy-handed. Displaying a bit of patrician aesthetic, Wolf added that Ulbricht, who was from Leipzig, spoke with a “provincial Saxon accent.” Once in the thick of things as head of the GDR, he apparently kept his head on a swivel, keeping everyone wary of his designs. Ulbricht’s continuous purges of senior leaders, Wolf assessed, was a sign of his insecurity and unsteady leadership.

An effective practice for selecting Individuals for recruitment was established at HVA after a lack of diligence and breakdowns were discovered in the process following the Vulkan affair. Wolf had to be a very effective talent-spotter. He explained: “The search for suitable candidates was difficult and costly. Checking their political reliability, their personal ties, and their character took time. We sought young, politically motivated citizens, convinced socialists who believed in serving our country and cause. We were not concerned if candidates to be agents had relatives in the West, in contrast to our policy for potential officers at headquarters, who were barred from employment if they had any. In fact, Western relatives could be quite useful in helping an aspiring agent bypass refugee camps and enter the Federal Republic. Undoubtedly, after studying individuals, Wolf ostensibly knew more about them than they knew about themselves. After looking at the individual over and Wolf and his people liked the “cut of his jib”, the recruitment process would begin in earnest. Recruitment in some services can often be a very imperfect process. In recruiting for his bigger and better intelligence service, Wolf was exceptionally careful at every point. Even for a task as surveillance, care was placed in the selection. The HVA would need to rely heavily on the competence of observers, reports they produced, and even their immediate impressions, all of which would impact data extrapolated and inferences made. It would certainly be daylight madness to hire operatives off the street for an intended clandestine operation that is supposed to be finely calibrated. Nevertheless, that very practice of taking anyone off the street to engage in surveillance for remuneration is apparently accepted among some intelligence services in the US today, as well as crude, money hungry contractors, with whom Wolf never would have considered working with in a million years, to which such work is often outsourced by those services. Ostensibly, the grand thought behind the practice is that the more eyes, even nonprofessional, untrained eyes, are placed on the target the better. Yet, the result of that is simply the accumulation of several observations, varied in accuracy and quality. False observation can often be provided by nonprofessionals in an ordinary case seeking to puff themselves up, as if to say: “Hey, look at me! I am a real spy!” This lesser form of “spying” may bestow a certain dignity to the mixed bag engaged in it, but once made aware of those individuals and the sloppy work they are doing at that level, often it can make the work of many in the same intelligence service who are doing far greater things feel less dignified.

If readers would please allow greatcharlie to digress a bit further, given the potential for dishonor that it creates–not all names on a list of impromptu hires may be genuine–it leaves open the question as to who might benefit by collecting the recompense of such nonexistent operatives. Somber and astute counterintelligence officers or investigators might hypothesize that such hiring could be beckoning initial indicia of someone trying “to give themselves a pension.” Wolf clearly understood that efficacious work at the most basic level would determine the success of his operations. Surely, adversarial intelligence services, by insinuating their operatives with little or no vetting into any surveillance element of the US intelligence service or contractors performing such work, would acquire the capability of knowing when the US was monitoring their own people. They might even attempt to move their operatives closer to whomever was managing the whole cabaret. One might suppose that this may have happened more than once.

Wolf’s preparation of his agents was never slipshod. HVA training was originally in the classic tradecraft of intelligence. It was after all the second oldest profession and there were well-known tactics, techniques, procedures and methods that the organization could utilize. However, after Vulkan, there were clearly many lessons learned that Wolf wanted brought to bear in the training process, and thereby, it became more nuanced. Wolf’s summary of how agents were trained to penetrate security screening and penetrate specific targets is something advanced technology and other firms in the US should pay close attention as present day intelligence services, aware of Wolf lessons, might seek or have already managed to infiltrate their staffs. Wolf recounted in Chapter 4: “Each agent’s training was personally supervised by the man who would be running his operation, and special training was added if there was a scientific or technical objective. Once accepted in West Germany, agents usually began their assignments with an inconspicuous period of manual labor to help overcome the bureaucratic barriers of getting established in the West. We therefore preferred candidates with craftsman’s skills or practical experience in a professional. Almost every one of the students and budding scientists who emigrated in the early years found employment in research facilities or companies of interest to us–the Federal government’s nuclear research facilities in Julich, Karlsruhe, and Hamburg; the Batelle Institute in Frankfurt-am-Main, which had been set up by the United States; Siemens, Germany’s largest electronics company; and IBM Germany or the giant German chemical companies BASF, Hoescht, and Bayer. Because we assumed that Germany’s traditional arms manufacturers would–after the storm over German militarization died down–eventually resume military production, we also placed people in companies such as Messerschmidt and Bölkow.” With specific regard to the controllers, they were not mere handlers of spies in the West but expert psychologists who prided themselves on their close personal ties to their charges on the “invisible front”.

As mentioned previously, West Germany was Wolf’s main target. He explained in Chapter 10: “Department 9, responsible for penetrating the West German intelligence institutions, was the second largest in the service, after the Scientific and Technological Sector was one of the busiest. It was the department to which I felt most closely attached.” Fortunately for him, the West was easily accessible to his spies and couriers, who, given new Western identities, were indistinguishable from West Germans. Wolf was also well-equipped to recruit West Germans as his sleeper agents and deep cover assets. He claimed to have a firm understanding of the habits and mentality of middle to upper middle class Westerners and above all their weaknesses as those were his prewar origin. Confident of being able to collect information at the human level, human intelligence played an outsized role as compared with electronic and technical intelligence gathering done at Sektor Wissenschaft und Technik (the Sector for Science and Technology) or SWT.

It has typically been enough to state that for the intelligence officers, the goal is to compel actions by another collect information or act in any way that would promote the interests of the officer’s country. The officer will seek primarily to penetrate organizations, institutions, and communities, and insinuate themselves in the lives of others. After having maneuvered, with Berliners guidance into a position close enough to the target, they would use their tradecraft to attempt to compel a target through seduction or some other form of manipulation. At a more advanced level, it is less akin to police work to the extent that police are typically required to obtain immediate results more often through stressful even harsh interrogations, threats, and offers of protection. Still, there are occasions when the obligation of meeting requirements to satisfy consumer of intelligence, national leaders has required the use of coercive actions, to include torture. In Chapter 4, Wolf made clear that this was his concept for using his intelligence service. Still, to conceptualize further, the intelligence officer’s main task is to open doors. Whether by their own hands or using the hands of an agent, they must very often find the doors of file rooms, code rooms, vaults, and unprotected and protected computers and open them. However, there is an additional effort made to open doors of the officer’s contacts and targets for recruitment. Before the officer is a figurative wall, a barrier to the inner thinking of the target that may be underpinned by patriotism, an honor code, religious beliefs in good and evil, right and wrong, a political philosophy, loyalty to his service and his comrades. The list is exhaustive. Yet, the intelligence officer’s must get through. Smashing through the wall or hoping to get up and over it may be accomplished through those law enforcement tactics of interrogation and carrots and sticks would represent failure. A pitfall would occasionally be betrayal down the road by the same target as he may be intercepted, neutralized, and recruited or re-recruited by his own side as counterespionage agent. He may simply betray the intelligence officer’s with not just chicken feed, but false information that may arouse the officers managers and stall, paralyse, or disastrously distract and divert activities to bring what may once have been a viable operation to its knees. The intelligence officer must believe that there is a door to the inner thinking, soul of the target, which the officer, if experienced and skillful enough, will manage to open.

The Evolution of Recruitment and Training

In Chapter 5, Wolf explained: “The early years of a new espionage undertaking are always prone to the workings of Murphy Law, and scientific technical activity offered abundant potential for errors and misjudgement.” Wolf made adjustments his initial methods. Concerning penetration into the West, he noted that during the 1950s, thousands of the GDR’s citizens streamed across the then practically open borders into West Berlin and West Germany. Those numbers, according to Wolf, increased considerably after a June 1953 uprising in the GDR. Nearly 500,000 of the nation’s 18 million people fled in the following three years. Those considered to be of suitable material, were still being sent along that stream, and they, Wolf says, “laid the cornerstone for many of our later successes.” When they were picked up and questioned in the refugee camps once they got to the West, and the usually were, they still had a good chance of blending in with the mass of refugees. The HVA would equip them with a viable cover story. The declared wish to join relatives in the West was useful. However, HVA diversified the pretexts for to move West. Wolf explained: An agent might say that he had been caught trying to hide his past membership in the Nazi Party or the Waffen SS, or that he made negative comments about our government’s policies.” Diligence in assuring those pretexts were strong, caused him to have HVA place what he referred to as “stains” into personnel files kept on these agents maintained at other ministries to ensure the charges had credibility if perchance BfV somehow got hold of their file. Concerns over the actions of BfV became great enough that Wolf shied away from staffing the HVA with individuals who had relatives in the West. Wolf reasoned that Western intelligence services, particularly West Germany’s Bundesnachrichtendienst (Federal Intelligence Service) or BND, could more easily penetrate us-as we did them–through family links and pressures. Wolf also noted that whereas sending our agents into West Germany, a country with the same language and culture, was clearly an advantage, as the two German countries grew apart, such infiltration became more difficult. The building of the Berlin Wall created even greater problems. Wolf said that it “cut to a trickle the heavy flow of émigrés in which we hid our agents.” Concerning pretexts for moving West, Wolf noted: “This meant cover stories had to become even more foolproof.”

Regarding training and control upgrades, Wolf displayed a firm sense of what he needed from his agents. Wolf stated: “For each person we sent across we had a predetermined mission, and each agent was trained by a staff handler responsible for the mission. We limited training to the elementary rules of espionage and tips on acquiring the information we wanted. It made no sense to train these agents in subjects and skills that did not concern them; in some ways, it would make the operations more risky by unnecessarily complicating their mission. In some cases, we retrieved agents from the West and brought them back to the GDR for additional training when the appropriate time came.” Interestingly, so ubiquitous and ever industrious were Wolf’s spies that they would often encounter each other without knowing due to compartmentalization they were both working for HVA. As a result, there were occasions, those with access to their true identities at headquarters would be tickled on those occasions when they would respectively submit reports on one another suggesting each had useful qualities and would go as far as to recommend one another for recruitment.

In examining the HVA’s success in recruiting West Germans, Wolf recognized that varied, special motives drove them. Wolf explained that among many issues, some felt a conservative distaste for West German Chancellor Konrad Adenauer’s “Americanization”, and other disgust over the top leadership roles former Nazis, Chief of Staff of the German Chancellery Hans Globke, President Karl Heinrich Lübke, and Chancellor Kurt Georg Kiesinger, all of the Christian Democratic Union, managed to play in Federal Republic politics. Many HVA recruits in West Germany believed that their actions were humanitarian contributions to peace. Wolf’s network of spies, sleepers, informers and instructors in West Germany, today estimated to have numbered as many as 20,000 at the height of the Cold War. It should also be noted that Wolf’s agents often sailed under the “false flag” to appeal to the thirst for adventure of potential traitors in the West. At times, they posed as KGB agents. The thinking was that spying for the Soviet Union would sound more exciting for West Germans than spying for the GDR. It worked in many cases. There were times when HVA agents would pose as agents of Western intelligence services under the guise of trying to understand what their West German allies were doing or determine whether West German operations were secure.

Additionally, recruitment and collection was facilitated by the use of so-called “Romeo agents”. Sex has been used to gather intelligence since ancient times. Typically, the female spy would seduce her male victim to obtain secrets. The HVA did not hesitate to use loyal GDR women as well as suitable prostitutes in that capacity. Yet, Wolf’s thinking would go beyond the usual in the sense that he imagined reversing roles to have male agents seduce female targets. To Wolf, it appeared easier for determined agents to ensnare the secretary of a high-ranking Western official than the official himself. In reality, she would often have the same access to confidential information as her boss. He established special team of “women hunters” with the mission of seducing secretaries in West German government offices, turning them into informants. The scores of lonely women that Wolf’s Romeo spies seduced were referred to by the HVA as “Juliets”. Ostensibly, spotters would watch targets, and through observation determine the individual’s needs, desires, strengths, and weaknesses. Wolf’s Romeos would happily waste their substance on lonely women in Bonn government offices and the NATO headquarters in Brussels targeted by HVA.

Within the Eastern intelligence services, the HVA would be known for having a committed visionary at its helm. Whenever Wolf’s spies and others came to light in the West, the event would feed into a paranoid doctrine that all foreign intelligence services were penetrated by Communist spies and intelligence victories were actually their victories. Within the Eastern intelligence services, the HVA would be known for having a committed visionary at its helm.In the West, Wolf was looked upon as a threatening spectre, and he knew it. To quote Wolf from the Introduction of Man without a Face, “As even my bitter foes would acknowledge, it was probably the most efficient and effective such service on the European continent.” Managers in the counterintelligence departments of Western intelligence services would wake up every morning pondering : “We know Wolf has been doing something. What could it possibly be?” Too often, they found themselves chasing shadows. Ironically, a spotlight was placed on a spy chief and his clandestine operations, both of which could not be seen. Der unbestrittene Meister schien unbesiegbar. (The undisputed champion seemed invincible.)

Interestingly, Wolf did not particularly stress the presence of NKVD intelligence officers whose job was to guide members of the burgeoning intelligence service into an effective tool for the GDR’s security but more importantly for exploitation by Soviet intelligence. He would only mention that reality here and there, somewhat higgledy-piggledy, in the text. When the “Institute for Economic Research” was stood up, it actually functioned under the control of the Soviet intelligence. In those same postwar years, Soviet organization of its intelligence, counterintelligence, and internal security functions went through its own period of transformation donning an alphabet soup of titles from the GPU, to OGPU, to GUGB/NKVD. to NKGB, to MGB. In 1954, the service eventually landing on the title, KGB. The KGB or the Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) would be praised by the Soviet Union’s leadership as the country’s ”sword and shield” and the “Vanguard of Communism”. The organizations and intelligence operations undertaken by the Stasi and other Eastern Bloc intelligence services essentially duplicated of those of the Soviet KGB. Their role was made more important due to attention the KGB to Moscow’s chagrin  garnered on the world stage. After only a few years of operation, the KGB became a renowned, albeit dangerous, feature in international affairs. Looked upon as curiosities and celebrities, in foreign policy circles of many capitals, there was considerable, often banal speculation as to who among diplomats at Sovist embassies, consulates, and cultural centers were KGB officers. In certain countries, Moscow determined that was too high profile to use discreetly in the recruitment of agents. The alternative was to make use of other Eastern Bloc intelligence services that were very often operating under the radar in many countries around the world. That effectively took some pressure off the KGB. However, the KGB would insist on maintaining a tight grip on the reigns of all operations of other Eastern Bloc intelligence services. Eastern Bloc intelligence operations directed and controlled by the Chief Directorate of the KGB. The consequence of disobedience to their Soviet masters was well-understood. There is a common belief that those who rise so quickly, much as shooting star, tend to flame out just as fast. Wolf rise was fast, even a bit unsettling for him. Luckily, he and all around him soon discovered that he was a natural at the craft of intelligence. Nevertheless, it would seem he was not out in the world alone when his efforts at HVA first took flight.

Wolf (center) stands in his dress uniform with colleagues at an official event. Within the Eastern Bloc intelligence services, the HVA would eventually be known for having a committed visionary at its helm. In the West, Wolf was looked upon as a threatening spectre. Managers in the counterintelligence departments of Western intelligence services would wake up every morning pondering : “We know Wolf has been doing something. What could it possibly be?” Too often, they found themselves chasing shadows. Der unbestrittene Meister schien unbesiegbar. (The undisputed champion seemed invincible.)

Action and Adventure!

Wolf’s discussion of the various adventures of his agents has been thoroughly recounted in previous reviews of Man without a Face as well as various scholarly studies, books and articles on Wolf in which his memoir was used a source. Much as a previous reviewer noted, espionage enthusiasts would certainly find what Wolf laid out concerning the adventures of his agents is spine-tingling stuff. Some of the more popular stories concerning his actions and the adventures of his agents are still very much worth reading. Among those that greatcharlie found most edifying are: the Gunter Guillaume case; the Kuron walk-in case; and, the Tiedge walk-in case.

1. Gunter Guillaume Case

Gunter Guillaume was a HVA sleeper agent who navigated his way up to become a top staff assistant to West German Chancellor Willy Brandt, a member of the Social Democratic Party (SPD) and a liberal whose Ostpolitik, looking toward reconciliation of the two Germanys, made him GDR’s favorite West German Chancellor. Wolf admitted that he was somewhat surprised by Guillaume’s success. As he explained in Chapter 9: “We never lost hope of penetrating the heart of Bonn, but no one expected to get so close to the top man. Nor would I have bet on Guillaume, who we codenamed Hanson, to be the one to accomplish this historic espionage coup.” Guillaume and his wife, Christel, were a husband and wife team, just two of the hundreds of potential spies, sent into the West in the 1950s. Guillaume was recruited from an East German publishing house with fairly well-known links to the Stasi. The couple was sent to Frankfurt-am-Main, where Christel’s mother ran a tobacconist’s in the mid-1950s. They opened a small copying business and joined the local Social Democrats. His efforts in SPD politics and his contact with Leber really got the ball rolling for Guillaume. In praise for Guillaume, Wolf recounted: “His discipline and dedication never faltered. He rose to become a member of the Frankfurt-am-Main city council and head of its SPD group. Guillaume’s organizational abilities, along with his staunchly conservative position at a time of great ideological upheaval in the SPD, caught the eye of George Leber, the leader of the building workers’ Union and later minister for transport in the grand coalition of 1966-1969 between the SPD and the Christian Democrats.” Eventually, Guillaume was offered a job in Leber’s office and gained access to a number of secret NATO and Federal Republic documents. These were carefully copied by Guillaume and passed to his controller in empty cigar cases “sold” to the East German intelligence officer in his mother-in-law’s tobacconist’s shop.

Wolf went on to explain that when the SPD became the leading party in West Germany in 1969, the HVA ordered Guillaume and Christel “to play a waiting game and not push for personal advancement in the new administration.” Wolf believed that since the record indicated that Guillaume former worked in East Berlin publishing, if he tried to move into a government job, red flags would be raised. Indeed, Wolf would discover the following: “Herbert Hellenbroich, later the head of West German foreign intelligence (Bundesnachrichtendienst), confirmed that Guillaume had been investigated like no one else before him–but without turning up anything. There had, however, been two vague tips from the evaluators in West Germany’s counterintelligence (Office for the Protection of the Constitution, Bundesamt fur Verfassungsschutz–BfV) and Horst Ehmke, the head of Brandt’s office and thus responsible for personnel there, decided to confront Guillaume headlong with these suspicions.” Guillaume brilliantly dealt with all of the suspicions coming his way. With the rare use of a first name, Wolf praised his covert agent, writing: “Gunter’s reactions and his overall demeanor as he explained away his work at the Volk and Welt publishing house seemed so natural, as a stunned Ehmke would say later, that all doubts were put to rest.” (A hidden hope among West German counterintelligence specialists, that such a deep penetration into their country’s political arena was not probable, may have led to a preconception of Guillaume’s innocence that in turn colored their investigation. Such is always a danger. Intensified, thorough research, more interviews, in an effort to find the missing pieces of the figurative ring is the answer, certainly not spurious over compensation in the opposite direction.) When HVA agent, Willy Gronau, one the intelligence service’s oldest sources, was arrested in West Berlin there was concern that suspicion about his concept acts would placed Guillaume in jeopardy. Gronau and Guillaume had maintained professional contact as part of their jobs. However, it was one of those occasions in which neither knew the other’s true identity as an HVA agent. The BND and BfV were never caused to think any similar issues of spying existed among both.

The political world, being complex and often confused, required Guillaume to sift through whatever he came across for golden nuggets. While stuck to the matter at hand, for his own security, he also had to be aware of everything happening around him. Seemingly  extraneous matters were not out of court. In November 1969, Guillaume was offered the post of a junior aide to the newly elected Social Democrat Chancellor Willy Brandt. Guillaume methodically made his way up through the hierarchy of the Chancellery, steadily passing intelligence to East Berlin. Eventually, he became one of Brandt’s top aides. Guillaume’s mission was essentially a political job, monitoring the Brandt administration. Guillaume was able to provide the HVA and hence the KGB with details of divides among NATO members US President Richard Nixon and US Secretary of State Henry Kissinger  sought greater control over the alliance. However, sex would play a part in Guillaume’s work, too! Brandt was a womanizer. According to Wolf, Guillaume procured women for him.

A CIA counterintelligence officer looking into suspicions that there was a spy within the Chancellery remembered a clue from the late 1950s. The East Germans sent messages to their many agents in the West using a five-figure cipher broadcast read out by a female broadcaster who in western intelligence circles was nicknamed “Magdeburg Annie”. The codes were cracked by US computers; one was to an agent in West Germany known as “G” who was active in the SPD. As it was described by another previous reviewer of Man without a Face, with Teutonic precision, the Stasi remembered to radio birthday greetings to its agent. He was also  important enough to be congratulated on the birth of his son. That untidy behavior proved disastrous. The radio traffic was analyzed by the BfV who eventually figured it out. The known details of the agent, and, crucially, the date of the boy’s birth, matched those of Guillaume and his son, and he and his wife were put under surveillance. Guillaume was arrested on April 24, 1974. Brandt resigned ten days later. While the penetration was looked upon with amazement, Wolf lamented that it was all in all a defeat. Wolf, expressing the sense that he had only achieved a bit of a Pyrrhic victory,  explained in Chapter 9, “Our role in bringing down Brandt was equivalent to kicking a football into our own net,” He also stated: “We never desired, planned nor welcomed his political demise. But once the chain of events had been set in motion, they had their own momentum. Where was I supposed to have yelled stop?” Brandt was the architect of Ostpolitik, West Germany’s opening of relations toward the GDR and remainder of the Eastern Bloc beginning in 1969 and the German Basic Treaty of 1972,  setting the basis of relations between West Germany and the GDR. Moreover, the GDR secretly supported and encouraged Willy Brandt’s Ost-politik policy of rapprochement with the East German government. than the former chancellor. His successor as Chancellor, Helmut Schmidt, was less committed to the “Eastern” policy.

West German Chancellor Willy Brandt (right) and Gunter Guillaume in tinted glasses (left). Gunter Guillaume and his wife, Christel, were a husband and wife team, two of the hundreds of sleeper agents set up in West Germany by the HVA in the 1950s. Guillaume managed to navigate his way up to become a top staff assistant to West German Chancellor Willy Brandt. Guillaume dealt well with all of the suspicions that came his way. Wolf admitted that he was somewhat surprised by Guillaume’s success. As he explained: “We never lost hope of penetrating the heart of Bonn, but no one expected to get so close to the top man. Nor would I have bet on Guillaume, who we codenamed Hanson, to be the one to accomplish this historic espionage coup.”

2. Klaus Kuron Walk-in Case

There were occasions fortunate for Wolf when his intelligence officers came across the “walk-ins”, those who on their own volition turn toward and even work for the East. Among those stories is that of the spectacular recruitment of Klaus Kuron, deputy chief of the BfV. Wolf stated in Chapter 10: “ This was exceptional, even for the entanglements of the spy business.” The Kuron walk-in began with a tug of war between HVA and BfV over one of Wolf’s sleeper agents, Joachim Moitzheim. Moitzheim had been caught by BfV attempting to recruit the man who operated the counterintelligence computer named Nazis. Once intercepted by the chief and deputy chief of the BfV, respectively Hansjoachim Tiedge and Klaus Kuron, neutralized him with the threat of a lengthy  imprisonment and recruited him to work as a double agent for them. Moitzheim agreed, but informed Wolf and  his superiors at HVA  of the recruitment effort. The verdict was that Kuron, who was not seen as a threat to the GDR should be function as a triple agent for the HVA. Having been in contact with BfV officials. Moitzheim was asked if he could take a look at a letter anonymously dropped off at the GDR Embassy in Bonn in 1981. The letter written by an individual Wolf believed knew the structure of HVA well, offered to provide a high degree of inside intelligence for a one time payment of 150,000 Deutschmarks. In the letter, Wolf beloved as an effort “to whet our appetites,” by informing in the letter that there was an effort to recruit an official at HVA’s SWT, the unit responsible for technological espionage. To Wolf’s astonishment, Moitzheim identified the handwriting on the letter as Kuron, the deputy chief at BfV with whom Wolf had struggled in the intelligence war. Kuron communicated again by telephone call during which a meeting was arranged in Vienna.

Wolf noted that Kuron “was unembarrassed by his treachery” as he described his situation at BfV. Kuron who came from modest beginnings worked his way  lacked a university degree and was regularly passed over for more senior positions at higher salary levels. Wolf quoted Kuron directly: “It has been a struggle . . . Everyone knows how good I am, but I’ll never go any further.” Noting the bitterness of Kuron’s tone, Wolf quoted him further as saying: “In the West, they say that there is freedom and an equal chance for everyone to achieve their potential. I do not see it like that. I can work till I drop and still end up being treated as a drone. Then they bring along some half-wit bureaucrat whose daddy has paid his way through school and has a glittering path ahead. I can’t bear it any longer.” Wolf saw Kuron as being worth every penny. He noted that for six years, “Kuron did sterling work for us. With the innocent help of his teenage son, who thought he was just doing a favor for his dad for work, . . . . “ Wolf also noted that Kuron took professional pride in his work for the HVA, often helping with projects that fell outside of his agreed contract. While acting for the GDR within the BfV as a figurative predator in the forest, Kuron also had to have an awareness of his surroundings much as prey. Wolf recounted what that entailed. The HVA achieved successes with Kuron, undetected, right up until the fall of the Berlin Wall. For the most part, defections of Kuron’s type were typically driven by such unbalanced ambition. While the overwhelming majority of officers will find the intelligence service to be an acceptable way of life. Evaluations from his supervisors and managers reflect not only the officer’s performance and work product, but attitudes and behavior as observed. When the officer cannot come to terms with the job and the system, a resulting decision may be to escape it. The worst possible impulse would be to take on the defectors cloak and strike against the institution that tried to embrace the officer. The impulse to conquer the institution was equally powerful. It was certainly more than a lack of good judgment. The problem is the insufficiency of the individual.

3. Hansjoachim Tiedge Walk-in Case

As aforementioned, It was Hansjoachim Tiedge’s job as chief at BfV, to intercept, neutralized, and when possible, recruit GDR spies to work as double agents for the Federal Republic. It was believed by many at BfV that Tiedge addicted to the bottle. Tiedge’s condition was more than corridor gossip at the BfV. He could scarcely drag himself through the working day. On the day that Tiedge defected to the GDR, as Wolf thoroughly details in Chapter 10, he used tradecraft. In the summer of 1985, Tiedge reportedly came to the Magdeburg section of the Inter-German Border that a man identifying himself as “Mr. Tabbert” had arrived, demanding to speak to a representative of the foreign intelligence service. Wolf, who was preparing to go on summer vacation in Hungary, was called. According to Wolf: “Throughout Kuron we knew that Tabbert was Tiedge’s code name.” Wolf ordered to quickly pass him through without further questioning, and be treated well. Wolf also directed Karl-Christoph Grossmann, who ran Department 9 and handled Kuron’s first approaches, pick him up on the Autobahn junction leading to Berlin. Once stirred in a safe house outside of Berlin, Tiedge asked to speak with Wolf directly, but he declined to leave the matter to Grossmann. Wolf claimed that he was already planning to retire and decided continuity in terms of his handling was important given all of the ramifications.  After identifying himself to Grossmann, Tiedge reportedly stated: “I’ve come to stay. You are my last chance.” Then the full measure of Tiedge’s dilapidated state became known. Tiedge confirmed that he was a heavy gambler and drinker. His wife died in an accident at home after he had been involved in a drunken fight with her. Investigated for manslaughter, the verdict was death by misadventure. His children were unruly, never forgiving him for their mother’s death. His lifestyle had led to disciplinary proceedings. Tiedge believed he was being kept on at BfV as a means for his superiors to keep an eye on him. Wolf assessed his situation as follows: “Here was a man who had descended into such a psychological hell that he could see two possible escapes, suicide or defection.”

Wolf said regarding Tiedge’s arrival: “It was a much a surprise to me as to everyone else. I had some inkling that he might wash up on our shore if things got much worse for him in Cologne, but we did not seek contact with him.” Wolf used Man without a Face to categorically deny that Tiedge had been HVA’s agent before his defection. Based on what has been made public, Tiedge was very likely Wolf’s greatest catch. Outlining the benefits that Tiedge brought to HVA, Wolf noted: “Tiedge had a memory like a computer for names and connections and filled in a lot of blanks for us, though not as many as he thought, since he was unaware that his colleague Kuron was in our pay.” As the story goes, away from the book’s text, due to Tiedge’s defection, the West German intelligence community was at sixes and sevens, trying to determine what would happen next, who was who, what was real and what was not. His betrayal was called the most damaging of the Cold War for the Federal Republic. It resulted in the recall of numerous West German agents still in the field. In that period, the East Germans captured 168 West German spies. Wolf stated in Chapter 10: “We rubbed our hands in glee at the turmoil.” However, there would soon be a bit of irony to befall HVA as Grossmann, the man entrusted with handling both Kuron and Tiedge, two days after German Unification, accepted an offer to help track down HVA agents. Overall, Wolf believed that the successful recruitment of officials and the collection walk-ins from his adversaries confirmed his notion that intelligence work never simply rests upon technology. It rests upon what cannot be bought, the human element, the mind, thoughts, emotions, conscience and will. Wolf stated in Chapter 10: “Our successes right up to 1989 indicate a technological superiority is of limited usefulness if the basics of the service are mishandled. That kind of expertise can be bought, but good organization, tight discipline, and the right instincts are not commercially available.”

Hansjoachim Tiedge (above) was very likely Wolf’s greatest catch. As chief of West Germany’s Bundesamt fur Verfassungsschutz (Office for the Protection of the Constitution) or BfV, Tiedge’s job was to intercept, neutralized, and when possible, recruit GDR spies to work as double agents. His betrayal was called the most damaging of the Cold War for the Federal Republic. It resulted in the recall of numerous West German agents still in the field. In that period, the East Germans captured 168 West German spies. Wolf believed that the successful recruitment of officials and the collection walk-ins from his adversaries confirmed his notion that intelligence work rests upon the human element, the mind, thoughts, emotions, conscience and will, and never technology alone.

A Thought about Wolf and the German People

It is not difficult to imagine that Wolf firmly believed that through reeducation and practice, the German people would appreciate the Communist Movement’s benefits and the promise that the Socialist system brought for the GDR’s future. He would work toward the cause of establishing a proletariat paradise. Although Communism had been present as a political movement in Germany, it was never an idea universally accepted by the German people. Before World War II, the German people faced the dilemma of choosing between what were considered two undesirable options: Adolf Hitler and the Nazis and the Communist Party of Germany. The two parties engaged in a tumultuous and very violent struggle for political control of the country. Through the efficacious application of force and a more effective political strategy, the Nazis gained the upper hand. Once Hitler and his Nazis came to power, the Communist Party was eviscerated and banned. The road was left open for German people to fall under the spell of Hitler and to be overcome by the false promises and manipulations of the Nazi Movement. It all seemed inspired by ingenious telepathy from Hell. Nazi Germany was an abomination. Under the Nazis, the German people suffered loss beyond imagination. They were plunged into endless depths of despair, anguish, and agony.

For centuries, the German people had been steeped in Western religious traditions and a spiritual link to God. To that extent the laws of Western societies were generally an amplification of Divine law or biblical law. Much as expressed in Ephesians 4:18, under the Nazis, the German people were alienated from the life of God through the ignorance that was in them, because of the blindness of the heart. Postwar, the Communist finally had their chance to rule in Germany. With their country literally fractured by the war and the majority living in privation, the people of the GDR were subsumed by Communism as pressed upon them by their Soviet occupiers. Unlike their fellow countrymen in West Germany, they had to survive what became “Part 2” of a dark, bitter authoritarian epoque in German history. Once again, Germans in the East found themselves in a far country, which is anywhere outside the will of God. The Communist made certain that the people of the GDR were more thoroughly torn from their spiritual underpinnings. Under the Communists, the mystery of the covenant between God and man and His creation was reduced to a mere human puzzle whose pieces can be arranged according to limited human intelligence. Much as Wolf became an albeit willing victim of institutionalized atheism, which the Communist world’s Soviet masters called “gosateizm”, the same requirement to believe in unbelief was imposed on the people of the GDR.

As a true believer in the Communist movement, Wolf acknowledged feeling somewhat unnerved when he observed how the GDR’s society began to vibrate in response to the benefits of the opening and opportunity created by glasnost and perestroika. Suppressed no longer was the desire by the people of the GDR to have for a better life, a better world, better existence. The people of the GDR also heard a message from the West that resonated. French Emperor Napoleon Bonaparte has also been quoted as saying: “There are only two forces in the world, the sword and the spirit. In the long run the sword will always be conquered by the spirit.”

It is not difficult to imagine that Wolf firmly believed that through reeducation and practice, the German people would appreciate the Communist Movement’s benefits and the promise that the Socialist system brought for the GDR’s future. He would work toward the cause of establishing a proletariat paradise. However, as a true believer, Wolf acknowledged feeling somewhat unnerved when he observed how the GDR’s society began to vibrate in response to the benefits of the opening and opportunity created by glasnost and perestroika. Suppressed no longer was the desire by the people of the GDR to have for a better life, a better world, better existence.

In Man without a Face, Wolf apparently sought to present himself as the man he believed himself to have been throughout his career, doing his job for his country as best he could. Through all the years of official secrecy and darkness, he saw himself as a normal man. Surely, normal and fine could be considered relative terms when it comes to Wolf, but letting the world know that he felt that way seems to have been an important point of the book. To that extent, Man without a Face is even more a very personal human story. Of course, everything discussed in Man without a Face is open to interpretation by the reader. One is certainly entitled to form their own opinion of Wolf and his work. To encourage that, greatcharlie suggests its readers take a look at the book give it the old school try! Without hesitation, greatcharlie highly recommends Man without a Face to its readers. Find a copy! For those who have already read it, take a second look. It is truly worth the read!

By Mark Edmond Clark

Commentary: Trump Withdraws US Troops from Syria: What Considerations Impelled His Decision?

The US military base in Al Asaliyah village near Manbij, in northern Syria (above). After US President Donald Trump announced that US troops would be withdrawn from Syria, critics and detractors surmised that he reached the decision from thin air, and hastily announced it at the end of 2018 in order to “check off” a campaign promise. It was also said Trump had disregarded US allies and friends in Syria. In truth, the decision was well-mulled over by US decision makers. Far more factors were part of the decision than the short-list reported in the US news media.

There was a storm of disagreement, and in some foreign policy circles in Washington, outrage, following the decision by US President Donald Trump to withdraw US forces from Syria. Fault with the decision was supported by the claim that Trump was acting against the best advice of his top military commanders and other foreign and national security officials. It was also said that Trump was displaying a certain insouciance toward allies and friends on the ground in Syria, to include Kurdish Forces (the People’s Protection Units or YPG) and the Syrian Democratic Forces (Arab and Assyrian fighters, as well high numbers of YPG units). Additionally, it was widely surmised that Trump reached the decision to withdraw US troops from thin air, and hastily announced the decision at the end of 2018 in order to “check off” a campaign promise. Some news media commentators even went as far as to claim that the decision signalled a new US isolationism and the beginning of a contraction under which certain US interests worldwide would be abandoned. In truth, the decision was thoroughly mulled over in a decision making meeting prior to being announced. Moreover, far more factors, in particular factors that tied to reality, were part of the decision, than the short-list reported in the news media. The aim here is to enumerate and examine, from an out of the box perspective, some of the likely considerations made by Trump and his aides and advisers prior to making the Syria decision public. Hopefully, the examination here will contribute in some way to the policy debate in the US on Syria.

The Syria situation was not a problem of Trump’s making. US President Barack Obama and other national leaders poorly interpreted information concerning an opposition movement that had organised against the regime of Syria Arab Republic President Bashar Al-Assad in March 2011. They believed that opposition movement made Assad regime ripe for change, however, opportunity was seen by Obama and his foreign and national security policy decision makers where there was none. The conclusion was that with a modicum support for the right opposition groups, the Assad regime would face collapse and be forced to the negotiation table, where Assad, himself, would agree to an orderly and immediate transition of power. Among a long list of negative consequences that have resulted from that policy approach have been: a seemingly never ending civil war in which millions of civilians have become casualties, millions more have been displaced, Russia and other countries who are potential adversaries of the US have strengthened their presence in Syria and increased their influence on the Assad regime; and, extraordinarily dangerous terrorist groups such as Al-Qaeda and ISIS, have established strongholds. Along with the US, European and Middle Eastern countries, have invested troops and other resources in Syria in what has been a successful effort to destroy terrorist groups in particular.

The contradiction between the desire to continue the fight alongside allies and friends, (that resulted in what now appear to have been ill-advised promises by US officials that the US would remain in Syria), and the requirements of force protection and the need to respond to rapidly evolving geostrategic realities in the region, made the decision to withdraw undoubtedly agonizing. Trump, however, was not marginal about the matter. Some of Trump’s top advisers were very disappointed over where the final decision fell. A couple top officials, having determined that continuing to work in support of Trump’s choice would compromise their personal values, their consciences, resigned. Perhaps an effort to keep US allies and friends invested in Syria militarily or otherwise of the decision to withdraw, even in camera, was a missing step. However, the decision will not be judged right or wrong here. Homines enim cum rem destruere non possunt, iactationem eius incessunt. Ita si silenda feceris, factum ipsum, si laudanda non sileas, ipse culparis. (Such is the disposition of mankind, if they cannot blast an action, they will censure the parade of it; and whether you do what does not deserve to be taken notice of, or take notice yourself of what does, either way you incur reproach.)

The announced withdrawal of US military units from Syria came as a surprise when Trump first made it on Twitter and then with a public statement on the White House lawn. There was an immediate rush by critics and detractors of Trump to pure negatives on the decision such as calling it an abandonment of allies and friends in the field. Other observers, uncertain about the future of Syria and uncertain of the future course of the US in the region, joined in the chorus against the decision. As promises were made by US officials other than Trump to stand alongside and support allies and friends, did as much to convince many observers that the US commitment to Syria was essentially open-ended, the disappointment and harsh reactions were stronger when that belief was dashed. Yet, with an assessment made that the main mission of destroying ISIS and other terrorist groups in Syria, and correlatively degrading their ability to act elsewhere, reaching toward its terminus, keeping US forces in the combat zones of Syria, keeping them in harm’s way, became questionable to Trump. All along, it was a calculated risk to deploy and allow US  forces to operate in Syria. Having spent months crossing his fingers concerning the well-being of US troops there, Trump made the decision to withdraw. Although US troops, themselves, expect to be in harm’s way whenever they are deployed in combat zones overseas, value judgments must be made by the civilian leadership on the returns or benefits from such dangerous deployments. It would seem Trump determined that the return on the US investment of troops in Syria, no longer justified placing their lives at risk. In making this decision, Trump likely felt some satisfaction knowing that he has robbed potential adversaries of the freedom to include an attack on US forces in Syria in their calculus of how they might hurt the US in the region.

US troops deployed in Syria are among the best trained in the US armed forces. As expected, they accomplished a tremendous amount. Yet, although extremely effectual in their performance, the size of their deployment, 2600 troops, is lean relative to those deployed in Operation Inherent Resolve in Iraq, Operation Freedom’s Sentinel in Afghanistan, Operation Iraqi Freedom in Iraq, or Operation Enduring Freedom in Afghanistan. Their numbers are also meager relative to the presence of potential adversaries in Syria. Expectations from those troops should not be placed too high. For those rightfully concerned with worldwide impressions of Trump’s decision to withdraw US forces, there should be an awareness that the force of 2600 troops was too few to do too much on the ground anyway. Change in Syria in the interest of the US and in a way that reflects US values would mean: allowing for the return of refugees and displaced persons; the establishment of transparent democratic governance in some form at the local, provincial, and national levels in Syria; providing all people of Syria with residences, more than just temporary shelters; an adequate, regular supply of sustenance; a means to sustain the delivery of sustenance; sufficient sources of potable water; continuous power and electricity; a highway and road systems that will allow for freedom of movement; reconstruction bridges, tunnels, airports, harbors, dams, parks, and waterways; schools for children; hospitals and health clinics; sanitation system; law enforcement at the local, provincial, and national level; a courts system; effectual employment bureaus, a secure banking system; the rebuilding of factories and other workplaces; an agribusiness development program; and, a multitude of other necessities that will support the development of a viable society. Given the size of the force, it would not be able to guarantee the top five items enumerated on this list, particularly the safety and security of Syrian returnees from the Assad regime and other potential adversaries. The Assad regime would invariably want all returnees to fold neatly under its cruel subjugation. There would also be the requirement of protecting the Syrian people from Islamic militant groups seeking to reestablish their Caliphate or some new Islamic State from which they could launch terrorist attacks globally.

There is a broader picture concerning US capabilities and capacity to conduct military-style operations. Wars can be fought even when formations of US troops are not present. Other less visible ways and means to support the Kurdish Forces and Syrian Democratic Forces can be provided by elements of the US intelligence community to include the Central Intelligence Agency (“CIA”) and the Defense Intelligence Agency (“DIA”). Invariably, some US troops could be used covertly, in specialized technical role for those agencies. By integrating themselves among local military units, they can provide assistance in the form of supply, training, and guidance to local senior leaders, support special reconnaissance, aid local commanders with command and control of units, and engage in direct action when required. A few historical examples of the success of such operations include: CIA operations in Military Region 3 in South Vietnam; the employment of Special Forces Operational Detachments in Operation Desert Storm in Kuwait; operations in support of the Army of Bosnia and Herzegovina and the Croatian Defense Council during both Operation Sana and Operation Oluja during Bosnia War; and, CIA and DIA operations in Afghanistan during Operation Enduring Freedom. Arguably, engaging in a covert operation with paramilitary trained case officers, special activities operators, and special forces soldiers working in tandem with local troops may not be as effective as having US military units perform tasks, but it is a viable option when the decision has been made to no longer make formal use of the US military. On the particular matter of providing forward control for airstrikes to defend allies and friends against attacks, resources would exist among operatives of those agencies on ground to perform that task. Moreover, with concentrations of US troops no longer on the ground in Syria, US air assets and the US-led anti-ISIS Coalition, while still maintaining parameters for safety for allies and friends, could pursue ground targets more vigorously with less concern that retribution from a malign actor against US troops would be possible. That retribution could take the form of a surprise military attack or an act of terrorism.

Many of the immediate impressions expressed about Trump’s decision to withdraw US troops from Syria ignored certain realities of the evolving situation in the Middle East. There is a broader picture of foreign and national security policy for the US and other countries in the region of which US troops deployed to Syria had become a part. To understand that bigger picture, one only needs to listen closely to the persistent anti-US grumblings voiced from the capitals of potential adversaries within the region. National leaders and other top officials of those countries insist more directly that they have the will and inclination to assert themselves in Syria. In addition to those grumblings are tests of missiles of considerable range and latent warnings concerning the reinitiation of an ostensibly dormant nuclear weapons program. Perhaps through miscalculation, they might decide to act against US forces not simply to destroy them, but rather as a means to force them out. Fresh in the minds of many in the region are the 1983 attack on the US Marine Barracks in Beirut, Lebanon and the 1996 attack on US troops at the Khobar Towers complex in Dhahran, Saudi Arabia, and the responses by the US. Perhaps a few US political leader, though surely well-meaning, have forgotten that the enemy will have a say in the outcome of the best laid plans of Washington. (With all of the “what ifs” considered, force security has been optimized through the employment of a suite of tactics, techniques, procedures, and methods by US force commanders in Syria. Yet, only the clairvoyants can walk with an assured step in the opaqueness of the Levant. There, one must always expect the unexpected.) Lessons learned from past US military deployments to support allies in the region, which were also relatively limited in scope, have undoubtedly left Trump determined to avoid the disasters that US Presidents have faced in the past. It is far preferable for the US to act, not wait until it must react in response to such possibilities. Further, if Trump, using his experience with, and understanding of, other national leaders has felt vibrations, intimations that US forces were facing an increased danger from a certain direction in Syria, it would only be prudent him to be safe rather than sorry by moving those troops elsewhere. Correlatively, Trump would never be willing to take the chance of having the US plunged into a conflict on an adversaries terms.

The possibility must be considered that a clash between US forces and a prospective adversary on the ground in Syria could put US troops in real jeopardy. True, numbers are not everything, and the outcome of a military engagement that would include very capable US troops cannot be determined by simple bean counting. To avoid such clashes, since 2015, the US and Russia have maintained a “deconfliction line” to communicate the locations of their respective air and ground forces in Syria. Still, US troops have exercised their right to self-defense and clashes have occurred. When pro-Syrian regime fighters, mostly Russian mercenaries, attacked 40 US troops at their military base at a refinery near the town of Deir al-Zour in February 2018, around 200 of the attackers were killed. There were no US casualties. Despite that favorable outcome, circumstances may not stand in the favor of US troops on some other occasion. Russian military forces and the forces of other potential adversaries on the ground in Syria are actually formidable given their size and strength. They are close enough to US troops to pose a danger that should not be dismissed.

The order to withdraw US troops from Syria might have equated to the sounding of retreat if it had occurred following a very public threat from an adversary, or had occurred in the face of an adversary’s deployment of its forces on the ground precisely to threaten US forces. A decision not to withdraw in response to such military threats from adversaries would likely require the deployment of greater numbers of US troops in Syria and perhaps preparation for a larger war in the region. This consideration has rarely been a factor discussed by Trump’s critics and detractors and other observers in the US news media. However, it would only be a natural concern for any US president who has placed US troops in harm’s way. Quod dubites, ne feceris. (Never do a thing concerning the rectitude of which you are in doubt.)

As with other US troops in the region, US forces in Syria face a significant threat from attack by potential adversaries in the region with long-range artillery and rockets in country and precision rockets from their countries or other locations in the region in which their forces are operating. The spectrum of possible attacks indeed goes beyond frontal assaults on the several small US bases in Syria’s northeast. This consideration has also failed to find its way into the  commentaries of Trump’s critics and detractors and other observers in the US news media. The enemy has the ultimate say in how it might strike. Projections that fail to ascribe all probabilities and limit consideration to only some possibilities, perhaps the top five or top ten, while dismissing those they may feel are unlikely or de minimus, are flawed. To make a decision without the complete picture would be akin to walking down a blind alley.

There has always been the reality that Assad could attempt to strike US forces in Syria using his remaining chemical weapons stockpile, the same stockpile that the Russian Federation had confirmed that he had removed. Such an attack could be conducted as a suicide attack or “martyrdom operation”. Assad could potentially conduct such an attack even if his regime was placed in complete jeopardy. Assad is a study in miscalculation and irrationality especially when it comes to military action. A surprise chemical attack against a US base in Syria could have a devastating effect, harming a great number of troops. US troops have guarded against any effort by Assad to put his forces in positions near their bases. Away from the combat zone of Syria, comfort may be found in the thought that US forces could respond to such a chemical strike with an immediate, devastating strike upon the regime, essentially destroying it. Still, a massive retaliatory against the Assad regime would do little to help any US troops lost or injured in such an attack. The US certainly cannot rely upon Moscow to keep Assad in check regarding his chemical weapons. In reality, the door has been left open to his madness for some time. Non omnes eadem amant aut easdem cupiditates studiaque habent. (Not all men love the same things or have the same desires and interests.)

The notion that the presence of US troops in Syria should remain to serve as a barrier or trip wires in case of attacks against US allies and friends by potential adversaries and also by other US allies and friends is abhorrent. With regard to dealing with US allies, the capabilities of US diplomats should not be underrated to the extent that military force posed against allies must suffice for skilled negotiation. As for potential adversaries, it is uncertain what would be the fate of US forces if an adversary launched a swift, concerted attack with combined arms against them. It would appear that many US political leaders, policy analysts, and particularly Trump’s critics and detractors in the US news media are willing to wait and see what happens. Leaving US troops in Syria to continue as they have until the time that they might actually be attacked by an adversary could be called questionable judgment. It would essentially boil down to waiting around until casualties are suffered by US forces. Such thinking does not flow from the concept of America First. If having an available response in Syria is absolutely necessary, US military planners could develop a scheme, for example, to encamp US troops in nearby Iraq, Jordan, or perhaps even Turkey, arrange, determine ways to synchronize surprise deployments or powerful blows from vertical and ground assaults against an attacking force at a time and place of the choosing of US commanders. It might actually be a more effective way to place US forces in a position superior to that of an adversary in order to destroy it as effectually as possible.

If US troops in Syria were attacked in a concerted military way or were hit with some massive terrorist attack and losses were suffered, there is no guarantee that public support would exist nationally and that political will would exist in the US Congress for a large military build up in Syria and perhaps the start of a wider war in the region. Trump administration plans might very well be waylaid by a rebuff from the Congress given that control of the US House of Representatives has gone to the Democrats, the political party in opposition to Trump and his Republican Party, following the 2018 US Congressional Election. All indications are that the intention of the Democrats is to be activist, questioning decisions on foreign and national security policy of the US president and possibly uprooting some. (As these things go, the focus of Trump’s political foes would likely be the tragedy of the attack, itself, and why more consideration had not been given, and why more had not been done, to ensure their safety and security. It might be then that the decision of keeping US troops in Syria would be lambasted as questionable judgment given the mission was so limited.) It would seem best for Trump to act now to ensure the safety and security of US troops, rather than face what could very well be: a tragic situation of unknown consequences; the need to make a decision under duress on whether to remain and fight or withdraw; and, if he decides to remain, almost ensure that he will contend with an enormous political battle over the fight in Syria with Congress. To act now, by withdrawing US troops, rather than wait for an adversary to decide their fate, could be considered prudent. Iniqua raro maximis virtutibus fortuna parcit; nemo se tuto diu periculis offerre tam crebris potest, quem saepe transit casus, aliquando invenit. (Unrighteous fortune seldom spares the highest worth; no one with safety can long front so frequent perils. Whom calamity oft passes by she finds at last.)

Israel, Jordan, Turkey, and other regional actors, as well as European allies such as the United Kingdom and France, are already taking steps through airstrikes, ground incursions, raids, and other direct attacks to degrade well-known terrorist groups lurking in strongholds in Syria. Israel, in particular has focused also on placing severe limitations on the capabilities and capacity of a certain country that is also potential adversary of the US in the region. Yet, while such actions have been useful in curating the diverse ecosystem of military forces and terrorist groups on the ground, they have also increased the chances that those elements would attempt to lash out in retribution against US forces in Syria. Thus, as a result of the US troop presence in Syria, US allies have doubtlessly acted in a manner that would avoid precipitating such retribution. Planning for airstrikes in Syria, for example, was done by allies through the Coalition Air Operations Center at Al-Udeid Air Base in Qatar and independently at their respective national air operations headquarters with US troops on the ground firmly in mind.

The primary and strongest US ally in the region, Israel, has been somewhat restrained in its operations in Syria against some longtime adversaries, who have been malign actors not only in the region, but around the world. Upon the departure of US troops from Syria, Israel will be provided an opportunity, a freer hand, to engage in more effectual and perhaps more robust action there. No longer hamstrung by the potential misstep of provoking its adversaries to strike against US forces ostensibly in retribution for its attacks, Israel may decide to finally crack the problem of the presence of its adversaries being based so close to its sovereign territory. With likely the same minimum of attention its operations in Syria have attracted so far in the global news media, Israel can engage in concentrated operations to degrade its adversaries and eliminate threats with a tempo and ferocity such that those adversaries could no longer face losses inflicted upon them. To borrow a phrase from former US President Richard Nixon, Israel will have the opportunity to “sock it to them!”  If those adversaries would choose to resist exiting Syria, in order to survive, they would very likely be required to redeploy in a way that would make them ineffective on the ground. Indeed, Israel might be able to create the type of environment in Syria that would cause pause among Islamic militant groups hoping to establish themselves in Syria. The extent to which the US might support or assist Israel with any efforts in Syria is uncertain. That would likely be decided sub rosa. However, the US would most likely step up and provide whatever might be possible. Turkey would also have a similar opportunity to respond more robustly against Islamic militant groups in Syria. Turkey’s military capabilities, though, are somewhat limited in comparison to those of Israel and its increased efforts would likely require incurring greater risks.

With regard to impressions the withdrawal of US troops from Syria might have made upon the global audience, few capitals worldwide would likely equate their sovereign countries, whose nationhood and history they extol, to the autonomous Kurdish areas in Syria. While feelings of empathy may be felt by national leaders toward the Kurds situation, most would hardly commit anything too significant from their own resources in support of them. In fact, some national leaders would likely agree with the notion that US troops should be kept out of harm’s way to avoid at least for now, a greater conflict in the region. Cito enim arescit lacrimal praesertim in alienis malis. (A tear quickly dries when shed for the misfortunes of others.)

The withdrawal of US troops from Syria will ostensibly eliminate all financial costs for the US related to that deployment. At the same time, Russia and other countries remaining in Syria will need to keep a robust military and security presence there in order to reasonably maintain control of the situation, or at control of that area referred to as “Useful Syria”. They would most likely need to engage in many more operations against Islamic militant groups to secure peace as such groups may attempt to violently reestablish themselves in the country. The job of “restoring Syria to its past glory” through reconstruction will be incredibly difficult as Russia and one of the countries remaining in Syria are contending with punishing sanctions for misdeeds on other matters. They would surely be precluded collecting the amount of financial resources necessary to engage in such an undertaking successfully. As months and possibly years pass, the effects of wind and rain will make bomb-damaged, dilapidated buildings and other derelict structures even less appealing to the eye. The same global audience whose views on the US troop withdrawal were a concern for Trump’s critics and detractors, would have an excellent opportunity to observe and assess what might be in-store for them if they too relied on the patronage of those countries. They could judge for themselves what leadership from those countries is really worth.

Removing the conventional US military footprint in Syria would place the responsibility to develop a complex comprehensive plan for reconstruction and peace-enforcement in the country squarely in the court of Russia and other countries who remain there. Any attempt to proceed without such a plan would be a huge blunder. Moving too slowly to repair Syria will allow ideal conditions to exist for an Islamic militant groups to attempt to fill the vacuum of power around the country. That is what occurred in Iraq after US forces were withdrawn. It was all pretty much foreseen by many US intelligence analysts. Unfortunately, the histories of Russia and other countries in Syria include no authentic success in such a reconstruction effort in contemporary times. As mentioned already, the economic circumstances of those countries are dire, shaped in great part by sanctions. That factor might do much to hinder them from gathering resources to engage in such an undertaking.

Conditions in Syria may not be optimal for the US, but Trump recognized that he was in a relatively favorable position to make the decision to withdraw, and he did so. Despite all of the bdelygmia, the decision appears to be the result of an in-depth examination of the realities of the Syria mission by Trump and his closest aides and advisers over time. The factors presented here reflect Trump’s pattern of well-considering the short-term and long-term interests of the US, before taking any steps. With so many actors on the stage in Syria doing so many disparate and discreet things, it is also possible that some rarefied, furtive bit of information marked “for the president’s eyes only” may have been behind the choice made. At the risk of unsettling readers by injecting in a bit of levity in the subject matter, one could say that Trump, the erstwhile owner of a plethora of casinos, is expert at knowing “when to hold up, when to fold up, when to walk away, and when to run!”

An Open Mind and Direct Talks, Not Reports Developed from Overt US Sources, Will Best Serve Diplomacy with Trump

US President Donald Trump (above). Nearly every government seeks to fill gaps in knowledge and understanding, and verify its on perspectives through its own intelligence efforts. Having a full, compatible understanding of a situation through direct talks by officials, allows leaders and top diplomats to speak correctly and authentically about issues. It also improves the chances for crafting agreements. If countries desire to effectively engage with Trump diplomatically, they must ensure how and what they collect about him and the US is well-considered and accurate.

In the US, the news media serves as a watchdog over government power and political activity. It is a source from which the public can inform itself on the decisions and actions of elected leaders and appointed officials. The news media is at its best when it provides the public with an intimate look inside government bodies and operations. Its role in the society is sacrosanct. “Freedom of the press” is one the Bill of Rights, the first ten amendments of the US Constitution listing specific prohibitions on government power. Admonishment can be viewed as a warning, and one may seek to encourage, improve the quality of another’s performance by warning. However, news media criticism of US President Donald Trump appears aimed at bringing his administration down. Trump’s critics also seemingly have the goal of destroying him as a person, reduce him to a demimonde. It has become de rigueur to speak against Trump. All of the negativity catches the eye. Middle of the list journalists have managed to make a place for themselves at the top by presenting anti-Trump stories with reckless abandon. The ranks of his critics actually extend beyond the US news media to include: think tank scholars, other policy analysts, particularly former officials of the Obama administration. Some of Trump’s critics are convinced that Trump does not really want to do well for the US public or the world. They make such assertions being fully aware that the consequence of them might be to harm the trust that many in the US public have in Trump. Indeed, critics may have infiltrated and despoiled the psyche of many US citizens, and perhaps may have even destroyed the possibility for some to have confidence in future US administrations, both Republican and Democratic. When Trump fights back, his comments are very rough and tough, but they unlikely do enough to prevent negative reports and commentaries, all the opprobrium of critics, from sticking.

If one were to consider, for example, the coverage of efforts to organize talks between US President Donald Trump and Supreme Leader of the Democratic People’s Republic of Korea (North Korea) Kim Jung-un, one might recognize that the two leaders were not really given a fair chance to virtually relate as leaders before they met. The atmosphere was poisoned by exceptionally strong negative reports and commentary of expert observers, well-known political foes, critics, and news media pundits. What was actually being said and done in both capitals was being distorted. The main focus of critics was a back and forth on Twitter, a few awkward official statements, and predictions by experts of unconstructive behavior by Kim. What saved the pas de deux was a step by step approach toward North Korea well-managed by South Korean President Moon Jae-in and US Secretary of State Mike Pompeo. Moon met with Kim at the Demilitarized Zone. Pompeo both as Director of the Central Intelligence Agency and Secretary of State met with Kim in Pyongyang. Trump enabled their efforts by expressing a willingness to meet. The US in a way reciprocated on Pompeo’s visits by having the North Korean Vice Chairman of the Central Committee of the Workers’ Party of Korea, Kim Yong-chol, meet with Pompeo in New York City for talks and then meet with Trump in Washington, DC. Particularly for the North Koreans, having the chance to get to know Trump and Pompeo, and learning what US thinking in the administration was directly from the US President and Secretary of State was both edifying and important. What the North Koreans learned was certainly far more informative and satisfying than what their intelligence services may have been gleaned in the abstract from US news media sources and free wielding comments of experts in conferences and interviews. The meetings also likely had a stabilizing effect.

Nearly every government seeks to fill gaps in knowledge and understanding, and verify its own perspectives through its own intelligence efforts. Relatively isolated countries can easily become victims of false reports, misleading, politicized commentary. Not knowing what gold is, they often gather pyrite. In the current environment, there is so much to sift through to find the truth. The consequence of using bent intelligence, even if only slightly, could be catastrophic. Having a comparable knowledge and full understanding of the situation through direct talks by officials, allows leaders and top diplomats to speak correctly and authentically about issues. It also improves the chances for the crafting of bilateral and multilateral agreements and arrangements. If countries desire to effectively engage with Trump diplomatically, how and what they collect about him and the US must be well-considered and accurate. That is the issue discussed here. Oculis de homine non credo, habeo melius et certius lumen quo a falsis uera diiudicem: animi bonum animus inueniat. (I do not trust my eyes to tell me what a man is: I have a better and more trustworthy light by which I can distinguish what is true from what is false: let the mind find out what is good for the mind.)

Chinese President XI Jinping (left) and Trump (right). In general, foreign leaders encounters with Trump are welcoming and friendly. During them, Trump appears at ease, self-possessed. Those who have engaged in conversation with him are usually left with the feeling that he was in the moment with them. He projects an empathy. At the same time, Trump has a strong presence, a bearing of authority, which may be intimidating to some. Trump’s nature is to try while in direct contact with an individual to create a bridge, if not a bond.

The “Authentic” Trump

Boiled down to the bones, open minded, immediate perceptions of Trump from most who have met him, from national leaders to average US citizens, would most likely agree that their encounters with Trump are welcoming and friendly. He is typically at ease, self-possessed with others. Those who have conversed with him are usually left with the feeling that he was in the moment with them. He projects an empathy. At the same time, Trump has a strong presence, a bearing of authority, which may be intimidating to the odd few. Trump’s nature is to try while in direct contact with an individual to create a bridge, if not a bond. Meeting Trump, one must remember that he has expectations from them. Red flags can be detected in his facial expression. Many discerned them too late in a conversation with Trump to repair the damage. Those who plan to create some interaction with Trump in their own way or seek to create some deal or agreement only on their terms, will accomplish nothing but raise his ire. Those simply trying to create some personal linkage alone should avoid overplaying their hand. Trump will let one know what type of relationship that he would prefer to have with one. A barrier will be created once a line is crossed. One should never try to become too familiar with him too fast. If anyone is going to rustle feathers by being a bit extra jovial during an interaction, it would need to be Trump. In such cases, he would invariably still mean well. Following that, he might try to be giving in some way. It would be better not to meet him, if one intends to go as far as breaking the spoken and unspoken rules of civility with him. Those who might use the opportunity to meet Trump in order to play to popular public sentiment at home by displaying irreverence for Trump, displaying their will to challenge him on issues, and create the optics that would confirm some silly notion of fearlessness by taking on the US President will do great disservice to their people and interests of their countries. There would be so much to gain from the opportunity to meet with Trump, and it would all be tossed away.

One should not glean from what has been stated that Trump dislikes developing new relationships. Quite to the contrary, Trump appreciates crafting new things to include new relationships. That desire to create is unquestionably due to the fact that he has the mind, vision, and spirit  of an artist. His successful professional paths as a businessman, land developer, entertainment promoter, and reality television host evinced that. As a businessman, Trump for decades engaged in high stakes negotiations and immersed in the granular details of forging solid, mutually agreeable deals. As a developer, he thoroughly invested himself in the planning, designing, and constructing buildings. In that process he was humble, meticulous, perceptive, and innovative. He could become lost in his art. As a media celebrity, he lived a life of high drama while he entertained and bedazzled. While very public accusations have made of alleged indiscretions, in the aggregate, the greater side of Trump is influenced by a moral center, his faith. He is a Presbyterian, and attends religious services. At the same time, he is respectful, appreciative, and has a good understanding of other religions, and often will attend their services.

On making decisions specifically on foreign policy, Trump will first demand to be read-in on available information and mulling things over, and formulating an approach. (This fact runs counter to what has been drilled in the minds of many through critics statements that Trump is disinterested in reports and briefings.) Trump will typically begin bilateral and multilateral interactions with high hopes that he can well-serve US interests, achieve positive results. While he attempts to craft a mutually satisfying, sustainable agreements, he will put US interests first. He famously stated during his UN General Assembly address: “As President of the United States, I will always put America First. Just like you, as the leaders of your countries, will always and should always put your countries first.” He also explained that, “All responsible leaders have an obligation to serve their own citizens, and the nation-state remains the best vehicle for elevating the human condition.”

Trump was elected US President having never served In political office at the national, state, or local level. He reviewed US foreign policy, it successes and failures in recent years and how his predecessors got things done, and decided to apply lessons he learned in business to make improvement to enhance US policy approaches. He labelled the central concept and intent for making improvements as “America First”. Trump discovered being successful would not simply require transitioning from the role businessman to that of president. In his short period of time in office, his thinking in terms of his duty and responsibilities and also personally, began evolving. In that process of evolution, Trump has not conformed with politics as usual in Washington. Rather, Trump, while keeping the heart of America First, began a process of transformation in which life lessons on getting things done, coalesced with lessons he would learn on the job daily as president. The change that Trump has brought has been most disturbing for critics as well as allies set in their ways, preferring Trump would take buttoned-down, old fashioned approaches to issues. He has pushed back against their insistent voices that he do things their way, seeking instead to find the truth in himself and doing things his way. A very evident part of Trump’s process of evolution are staff changes. He wants advisers that will best allow for the smooth execution of his plans. A very interesting and practical duality in his thinking has also been revealed as Trump has exercised his own magic. On some matters, Trump has found, sometimes the hard way, that conventional ways of doing things are best. When he has turned to unconventional approaches, he has relied upon a shrewd inner voice, intimations of a military commander in battle, all of it honed and polished by decades of human interactions, to help guide his decisionmaking.

The change that Trump has brought to Washington has been disturbing for critics as well as allies set in their ways, preferring that he would take buttoned-down, old fashioned approaches to issues. On some matters, Trump has found that doing things conventional ways are best. When he has turned to unconventional approaches, he has relied upon a shrewd inner voice, intimations akin to those of a military commander in battle, all of it honed and polished by decades of human interactions, to help guide his decisionmaking.

Indeed, when Trump takes a conventional track, he will support approaches that would require initial, relatively small steps perhaps to unlock the diplomatic process on big issues. He would also seek to gauge actions and responses from the opposite party. If he discerns a positive way forward, his sense of possibility would broaden and he would open his mind up to more options. In certain circumstances, Trump might promote creativity by breaking problems into smaller components; in doing so, he would build a multi-issue business negotiation out of what may have initially appeared to be a single-issue deal. Using multiple issues allows one to make valuable tradeoffs and facilitate a good-faith negotiation. Trump will collect important information by asking lots of questions and listening carefully to the answers. He usually demonstrates a willingness to be flexible by putting forth several different proposals at the same time. He is usually be willing to contemplate unconventional deal-structuring arrangements to bridge the gap between what the other side wants and what he could accept. He will even explore contingent agreements to help overcome differences in beliefs about future events and outcomes. He may even add on conditions for a deal such as “I’ll do X if you do Y”; and, engaging in “mind games” like brainstorming to facilitate creative problem solving and prompt unexpected solutions. On May 25, 2018, when there was discussion about restoring the summit talks with Kim after they were called off, questions were asked in the news media whether the back and forth between the US and North Korea was part of a strategy, Trump was quoted as saying: “Everybody plays games.”

In an unconventional mode, Trump will appear driven by the idea that bold action can turn situations around in the case he is facing. His goal is to exploit success, preserve his freedom of action on immediate matters, and reduce vulnerability from action by his competitors. He acts in a manner designed to gain advantage, surprise, and momentum over his competitors, achieving results that would normally require far more time and would be more costly to the US. This has been observed repeatedly in his interactions with foreign leaders. Trump’s discernment of events and situations as well as his planning and execution of actions against competitors greatly resembles what military thinkers define as maneuver. He rushes to place himself in superior position in order to overcome and defeat his opponents efforts. Quid ergo? non ibo per priorum vestigia? ego vero utar via vetere, sed si propiorem planioremque invenero, hanc muniam. Qui ante nos ista moverunt non domini nostri sed duces sunt. Patet omnibus veritas; nondum est occupata; multum ex illa etiam futuris relictum est. (What then? Shall I not follow in the footsteps of my predecessors? I shall indeed use the old road, but if I find one that makes a shorter cut and is smoother to travel, I shall open the new road. Men who have made these discoveries before us are not our masters, but our guides. Truth lies open for all; it has not yet been monopolized. And there is plenty of it left even for posterity to discover.)

Early in life, Trump was inculcated with a strong sense of duty, honor, and country in secondary school. Trump matriculated for five years at the renowned New York Military Academy (NYMA) at Cornwall-on-Hudson, New York. In the late 1950s and early 1960s, NYMA was the closest thing to a preparation school for the United States Military Academy at West Point, New York, which was only a short drive from NYMA’s campus.  Trump excelled at NYMA. Friends and instructors have noted how Trump eventually thrived in military environment. He graduated as one of five captains, the S4 (supply officer) on the Senior Staff. In his senior year, Trump was given command of a composite company of cadets for the 1963 Columbus Day Parade, and led them and rest of marchers to St. Patrick’s Cathedral where he greeted Cardinal Francis Spellman. Among his many other accomplishments, he commanded NYMA’s Honor Guard in both 1963 and 1964. From 1960 to 1964, he was an Honor Cadet and played on the Variety Baseball team. Trump proved throughout his secondary school years that he could consistently perform well both as a student and leader. Given Trump’s successful ascent as a NYMA cadet, it is hard to imagine that within him there was not a desire to attend the West Point. However, that was unlikely his decision to make. His father, Frederick Trump, who Trump would only describe as a builder to fellow cadets, was a well-known New York City real estate developer. His father likely insisted that Trump attend Fordham University where he would educate himself for work in the family business. Trump behaved dutifully and honorably in response to his father’s wishes. What is left for observers to see from that decisive point in Trump’s life is a juxtaposition between his strong military metiér and his dedication to family and a business path. As a leader, Trump is always ready to subordinate what he might want for what he must do.

Trump has undoubtedly recognized that to be a successful president he had to become a living sacrifice for his country, taking on almost limitless duties and burdens he very likely unforsaw as a candidate. The lifestyle that he led as a successful business leader had to be shed. Interests and focuses of his attention and energy, if simply for recreation, have been replaced by his country’s needs. Through visits to Mar-A-Largo, Trump National Golf Club in Bedminster, and Trump Tower, he is able to enjoy fragments of a life he once lived. It will be interesting to see where this evolutionary process will lead Trump. No one is required to say anything about it, but this aspect of Trump is minimized or ignored in reports and commentaries of critics.

Trump’s father, Frederick Trump (left), mother, Mary Anne MacLeod Trump (center), and Trump (right). Trump was inculcated with a strong sense of duty, honor, and country at the New York Military Academy. He proved throughout secondary school that he could perform well consistently both as a student and leader. Given his successful ascent as a cadet, it is hard to imagine that he did not desire to attend the United States Military Academy. However, that would not have been his decision to make. His father clearly had plans for him to work in the family business.

Who Is Watching?

In intelligence services, getting to know what is happening in a country, regarding a particular event or issue requires agents who are in the right place, are articulate, can answer questions, and receive instructions. In Western countries, particularly the US, substantial information is also collected by electronic surveillance, typically obscure, clever ways to collect what is happening over the horizon via satellites and special aircraft from above. Electronic collection, although very costly, has brought many benefits, by allowing for the monitoring of all manner of communications, discovering plans, patterns of activity and locations of targets. Many have grumbled for years in the intelligence industry that increased use of such surveillance and reconnaisance systems has resulted in the disappearance of the sure-fire agent on the ground with his string of spies and informants. When this issue became most apparent in the US in the late 1970s and the 1980s, there were efforts to make adjustments, but it is still posited that human intelligence has taken a back seat in favor of technology.  Illud autem ante omnia memento, demere rebus tumultum ac videre quid in quaque re sit: scies nihil esse in istis terribile nisi ipsum timorem. (Remember, however, before all else, to strip things of all that disturbs and confuses, and to see what each is at bottom; you will then comprehend that they contain nothing fearful except the actual fear.)

When national leaders do not grasp what is happening on an issue and cannot get a handle on a situation in a satisfying way, there is an anxiety, a sense of panic even, that may ensue from lacking intelligence to answer big questions or fill gaps in knowledge, to develop policies, strategies, and nuanced approaches. In some sudden and urgent situations for a country, sources for its intelligence service might be sparse, or nonexistent, and all one might have are bits and pieces from electronic collection, particularly if that capability is rudimentary. When there is no one to approach, When there is nobody present to approach anyone, whatever has been gathered by intelligence professionals from clandestine operations and perhaps electronic collection, may be supplemented and even complemented in the worst case by theories and guesswork. Among the tactics, techniques, procedures, and methods of many intelligence services of countries of various sizes and power, analytical units will mine through overt sources of intelligence, traditionally newspapers, magazines, books of certain authors, and now websites, blogs, and social media to see what information is out there. That information may also be used to supplement and even complement information that a service already possesses.

Using information from overt sources to confirm things or infer things can be rather dicey as there is no longer assurance that the information is true. Without the means for verifying and confirming whether it is true, intelligence service must proceed with caution. Presently, overt sources can pose nearly as much danger as information that might be dangled before collectors by adversaries. When the wrong information is collected and presented to consumers, things can go terribly wrong. Policy and decision makers demanding intelligence, may not ask or give a cursory look at how and from where the information available was collected. Depending on how bad the situation is, those officials directly advising or supporting key leaders, rather than be palms up due to detected discrepancies, questionable findings, intimations, will pass it along as work product, demonstrating that there some type of understanding of on-going events, some handle on the situation. Consumers receiving that information might be pleased to receive verification of inferred ideas of the leadership. Those inferred ideas, with the support of new data, can often become fact and make its way from consumer to consumer, all the way to the top. In some countries, it has essentially been custom in analytical units of intelligence services covering the US, to use particular sources of intelligence, for example, US newspapers of record, as the New York Times and Washington Post, and watch and listen to NBCNEWS, ABCNEWS, CBS News. on the US. Therein lies the rub.

Then Director of the Central Intelligence Agency, Mike Pompeo (left) and Supreme Leader of the Democratic People’s Republic of Korea, Kim Jong-un (right). Relatively isolated countries can easily become victims of false reports, misleading, politicized commentary. In the current environment, there is much to sift through from overt sources to find the truth. The use of bad information will result in bent intelligence. The consequence of its use, even if slight, could be catastrophic.

Despite an awareness that many reports and commentaries about Trump, particularly from his critics, might be questionable as well as objectionable, and declared by the administration as completely inaccurate, intelligence services in some foreign capitals may not be ready to halt the counterproductive practice of using them. Those intelligence services may not fully understand why US news media houses have surrendered their impartiality in order to proffer negative reports and commentaries about Trump in great volume. They may have observed that critics would be so willing to surrender their credibility in producing reports and commentaries that would be proven wrong in short time. They may have difficulty understanding what would compel critics to attack Trump, speak against his efforts, predict failure, when his successes are successes for the US. They may have discerned that what certain reports and commentaries merely evince a particular political position or preference for a candidate who lost the 2016 Presidential Election, Hillary Clinton, and reject those of the candidate who won, Trump. They may recognize that many critics have behaved figuratively as hammer hoping through relentless pounding to fashion an image of Trump that want the world to see and if possible shape him into what they want him to be. There is said to be a temper of the soul that wants to live in illusion. Still, that alone would not compel most intelligence services to be remiss by continually using suspect information from certain overt sources from the US. A more likely cause for such counterintuitive behavior would be bureaucratic inertia. In nearly every system, there are those who will do their homework, whose trade craft would cause them to do a deeper dive into the information. Raising concerns over such information within some intelligence organizations might be considered blasphemous and those who might suggest there could be issues with standard methods of overt collection may simply be shut down by traditionalist, orthodox voices among bureaucrats who may be managing the intelligence collection process. It would be best to omit information that one does not fully understand. One should not rush to conclusions. Non refert quam multos sed quam bonos habeas. (It is quality rather than quantity that matters.)

A better way to satisfy requirements for collection would be to insist upon and invest time and effort into creating opportunities to meet at some official level with representatives of an adversary or even an ally. It could be done, if necessary, away from the public eye. In such meetings, specific questions could be asked of a foreign counterpart, and information could be provided to ones opposite number to ensure that the genuine position of another government on key matters, not the meditations of pundits or guesswork, would be run through mechanisms for analysis included will prevail in analyses. Depending upon the nature of relations between countries, the relative size of two or more countries, and the urgency or importance of issues between them, direct bilateral or multilateral talks between the most senior officials may not always be possible. For example, one may not officially recognize the sovereignty of another and perhaps visa versa. In the best case for the intelligence services of the respective countries, meetings would be held between senior intelligence officials. There may be the reality that one side may have more power to control the time and place of even such lower level engagements might be an issue for the other side to work through. Still, at whatever level officials might meet, whenever and wherever they might meet, and whether it might be a one shot opportunity, they must come prepared to collect enough information through well-crafted questions, keen listening to words, and skilled observations of behavior to satisfy intelligence requirements and prepare the best possible product for consumers. Interestingly, questions asked also can serve the purpose of informing the other side what one already knows, what one does not know, and what is most important. Questions serve as a curious form of sharing as much as collecting.

Vice Chairman of the Central Committee of the Workers Party of Korea Kim Yong-chul with his interpreter. (left), Trump (center), and US Secretary of State Mike Pompeo (right). For the North Koreans, having the chance to get to know Trump and Pompeo, and learning what thinking in the administration was directly from them was both edifying and important. What the North Koreans learned was certainly far more informative than what their intelligence services may have been gleaned in the abstract from US news media sources and free wielding comments of experts in conferences and interviews.

The US News Media and Trump Critics: Caveat Emptor

The modality of the attacks on Trump from the news media catches the eye. It appears to exceed what few years earlier would have been considered impossible. The media never admired Trump. More seasoned, balanced, critics, have produced reports and commentary explaining that lots of things should be done, omitted, changed, and corrected by Trump. However, many other critics better skilled in “inpleasantry” than bon mot, have deemed Trump unfit for the presidency even before his election victory. The words “not presidential” were heard every time Trump spoke. Efforts by Trump of any kind would elicit a range of reactions by those engaged in the broad, piquant, counter-Trump discourse. (In 2017, greatcharlie frequently used the term, “counter-Trump milieu”, but alas, it failed to gain traction in the foreign policy debate.) There are other critics who apparently have found nothing desirable and everything loathsome about Trump. Trump’s efforts are explained as a cunning deceit, a dark tragedy. He is characterized as just another seductive tyrant, a demagogue. It could be said the US news media has not covered Trump as much as it has attached itself to him. They walk alongside him in order to discomfort and discourage him, increase the power of the blows against him. In the aggregate, they do not want Trump to feel a sense of serenity, calmness, quietness, peace and joy as president for one moment. Apparently, they want Trump to feel a deep-seated frustration, anxiety, worry.  They seem determined to throw Trump into loneliness and pain. Their hope for glory in attacking and defeating Trump walks hand in hand with their own doom for they live in the same country, the civilization that Trump is trying to improve. Ars prima regni est posse invidiam pati. (‘Tis the first art of kings, the power to suffer hate.)

Many critics are at a point in which they simply reject possibilities without hearing others. They rely upon self-serving explanations and surmisal. Critics see their efforts as righteousness, and they see far greater moral authority in themselves than in Trump. Critics analyses of history, of what was spposedly better, is nostalgia at best, myth at worst. Previous administrations would languish in the halls of inaction on a policy issue. They seemed to gain some satisfaction by merely moving from office to office, from conference room to conference room, from building to building, writing one memorandum after another, and declaring that in itself was action. Trump would admit that some mistakes have been made and a number of situations could have been handled differently, particularly on the domestic front. However, Trump has learned lessons. Modifications have been made in the way he makes statements and approaches situations. Nevertheless, critics reject the notion that he has evolved at all, and argue that he will never change. Lacking faith in the president, they surrender all hope that he could accomplish anything good for the US. While one might normally expect some change in behavior or conciliatory attitude from critics as time passes, their civility only seems recede further. There is a Hebrew term, küwl (cool), which means to sustain a hardship, to maintain ones balance in spite of what is happening. Trump has sought to avoid having a wounded spirit, powering away from despair and disappointment. Initially, Trump, in reaction to some critics, would “imitate the action of the tiger, stiffen the sinews, summon up the blood, disguise fair nature with hard favor’d rage.” Trump has since become more selective as to when and to whom he will direct his disagreement. Few men could display true sangfroid if stress were assailing them as it has Trump. Some religious leaders would explain that a trial can present an opportunity to persevere under pressure. Moreover, one can grow in the midst of conflict.

Some Discerning Leaders Can Distinguish Perception from Reality Re Trump

Periclum ex aliis facito tibi quod ex usu siet. (Draw from others the lesson that may profit yourself.) Political and social pressures to conform to a counter-Trump outlook appear to exist in capitals worldwide. However, for any country, relations with the US are too important to allow ties to be damaged by behavior and attitudes displayed by leaders with a skewed understanding of realities about Trump.  As posited here, it would be very easy for intelligence service to provide information with a counter-Trump bent to their leaders thus creating that situation. Perhaps a decision to embrace such information would be the fact that it confirmed individual biases or prejudices those leaders might have about Trump. Many leaders who initially chose to take a stance hostile to Trump recognized that they had done a great disservice to the people and interests of their country. They subtracted such negative thinking and changed their approach to him. Others learned lessons from leaders taking a wrongful counter-Trump tact, and allowed themselves the opportunity to draw their own conclusions about him through direct contacts.

German Chancellor Angela Merkel (left) and a Trump (right). After meetings in Washington with Trump from March 17, 2017 to March 18, 2017, Merkel made the harsh comment that Trump was not a reliable partner Germany and the Continent could depend upon. Her comments expressed her angst. Merkel was personally disappointed that Trump initially declined to publicly endorse NATO’s doctrine of collective defense, or agree to common European positions on global trade, dealing with Russian aggression, and mitigating the effects of climate change.

1. German Chancellor Angela Merkel

Following meetings in Washington with Trump from March 17, 2017 to March 18, 2017, German Chancellor Angela Merkel, hailed as Europe’s most influential leader, made the stunning comment that US President Donald Trump is not the reliable partner her country and the Continent can depend upon. She was quoted in a May 28, 2017 New York Times article as stating: “The times in which we could rely fully on others — they are somewhat over,” adding, “This is what I experienced in the last few days.” Merkel went on to state: “We have to know that we must fight for our future on our own, for our destiny as Europeans.” Her strong comments represented a potentially seismic shift in trans-Atlantic relations, as she has concluded without reservation that the US is now less willing to intervene overseas. The Times article explains that Merkel was personally disappointed that Trump declined to publicly endorse NATO’s doctrine of collective defense or to agree to common European positions on global trade, dealing with Russian aggression or mitigating the effects of climate change. Merkel’s comments were truly an expression of angst. Her words would lead one to believe that the current period, rather than being of change, and reinvigoration, is languid and dissolute. Yet, as a result of her statement, she may have also stirred concerns in the capitals of other NATO countries over how they will defend themselves against their most likely opponent, Russia, and handle other matters, without the US.

However, at some point after the meeting, Merkel likely recognized that she needed to take inventory of what had transpired so far with the US. She needed to stop moving the relationship in a negative direction.  From what Merkel said after her initial contacts with Trump, it was clear that Merkel felt some personal struggle with him. That was very troubling. Merkel’s responsibilities in meeting Trump was not to express her personal feelings about him. The genuine job at hand for the Chancellor was to do what best served the interest of the German people. Berlin needed to reorient Merkel on the matter. At stake was the relationship of Germany, and to an extent Europe, with the Trump administration. Berlin needed to find ways for Merkel to better respond and engage her country’s most powerful ally and cope with the Trump administration’s approach to policy matters concerning Europe. German policymakers, foreign policy analysts, and diplomats had to find answers. Resources needed to be diverted to that end. Cuiusvis est errare nullius nisi insipientes, in error perseverare. (To err is inherent in every man, but to persist in error takes a fool.)

Things changed. While campaigning for her fourth term in office, Merkel stated on August 23, 2017 that Trump must be shown appropriate respect for holding the office of the US president, even if she may differ with him greatly on some policy issues. Merkel, a Trump critic, left no doubt that she was committed transatlantic relationship, and stressed the strength of German relations with the US. The statement was a rebuff to pressure from her Social Democratic Party rivals to resist demands by Trump for NATO members to increase their defense spending. Merkel explained during an interview with the German business daily Handelsblatt: “If you take the president of the United States, whatever differences of opinion there may be, I know he prevailed in a tough election. It wasn’t reserved for him on a silver platter.” She went on to state: “In the end, he won the election under American electoral law and that means he is democratically elected and that this person should be shown the appropriate respect, regardless of how I assess his views.” Merkel did what many US political opponents and allies, friends–full-time and part-time, former US officials, journalists, analysts, and other among his critics refuse to do or at least have not done well. Merkel apparently took inventory, reviewed what had transpired, and reconsidered the direction she wanted her public comments about Trump to take. During her three-hour visit to the White House on April 27, 2018, her exchanges with Trump were very cordial. Merkel discussed but did not emphasize her differences with Trump on steel and aluminium tariffs and the Joint Comprehensive Plan of Action. In a joint press conference afterward, they stressed the long-time ties between the US and Germany and the shared goal of a denuclearized North Korea. Trump now insists that he and Merkel have “a great relationship.”

Merkel apparently took inventory, reviewed what had transpired in March 2017, and reconsidered the direction she, as German Chancellor, wanted her interactions with Trump to take. During her three-hour visit to the White House on April 27, 2018, her exchanges with Trump were very cordial. Merkel discussed but did not emphasize her differences with Trump on steel and aluminium tariffs and the Joint Comprehensive Plan of Action. In a joint press conference afterward, both stressed the long-time ties between the US and Germany.

2. Nigerian President Muhammadu Buhari

Some foreign leaders from the get-go fully understand that their focus during meeting with Trump should be their countries’ interests and relating well with the US President. They should not be prompted by the news media to speak or behave in ways that would aid its narrow interest in grabbing headlines to promote readership and viewership, and to fill advertising space and increase their profits. On April 30, 2018, Nigerian President Muhammadu Buhari had the opportunity to visit Trump at the White House to discuss urgent and important issues concerning his country. Buhari was the first sub-Saharan African leader to be invited for talks with the Trump administration. Trump and Buhari agreed that fighting terrorism is a priority for both administrations. The US sold 12 counterinsurgency aircraft worth $496 million to Nigeria to help in its fight against Boko Haram jihadist insurgents, despite previous refusing to approve the sale due to human rights concerns. Trump let Buhari know that he wanted Nigeria to remove trade barriers and allow imports of US agricultural produce. What was not discussed were disparaging remarks Trump allegedly made concerning African countries on January 11, 2018.

However, when Trump and Buhari held a joint press conference in the White House Rose Garden, the Nigerian President was asked about Trump’s alleged complaints about immigrants coming to the US from Haiti, El Salvador and some African nations. Buhari was very aware of problems between the news media and Trump and aware more so of his duty to serve Nigeria’s interests. He astutely replied: “I’m not sure about, you know, the validity of whether that allegation against the president is true or not.” He added: “So the best thing for me is to keep quiet.

When Nigerian President Muhammadu Buhari (left) and Trump (right) met on April 30, 2018, terrorism, human rights, and trade were on the agenda. In a joint press conference, however, reporters asked Buhari about Trump’s alleged complaints about African immigrants. Aware of problems between the news media and Trump and aware of his duty to serve Nigeria’s interests. Buhari astutely replied: “I’m not sure about, you know, the validity of whether that allegation against the president is true or not.” He added: “So the best thing for me is to keep quiet.”

3. French President Emmanuel Macron

When French President Emmanuel Macron visited the US from April 24, 2018 to April 25, 2018, he came with the purpose to bridge differences over the Iran nuclear agreement, encourage Trump not to withdraw so fast from Syria, exempt European countries from then prospective US steel and aluminum tariffs, and discuss the Paris Agreement on climate change and global warming. Indeed, Macron told Trump that France recognized the need for the US and France to work together to defeat terrorism, curtail weapons of mass destruction in North Korea and Iran, and act together on behalf of the planet. At the same time, Macron emphasized the importance of the Franco-American relationship, the commitment and the bond between the two countries, its historic importance and importance for both countries and world into the future.

Trump had already enjoyed very positive interactions with Macron. Trump was Macron’s guest in July 2017 at the annual Bastille Day military parade in Paris. During the visit, Macron and his wife, Brigitte, took Trump and his wife on a tour of Napoleon’s tomb and the Eiffel Tower where they had dinner while overlooking the City of Light. Trump reciprocated during Macron’s visit to Washington with a welcoming ceremony filled with pageantry and ceremony on the South Lawn of the White House, that included a 21-gun salute. Macron presented Trump with a thoughtful gift of a tree sampling from ”Devil Dog” fountain at Belleau Wood, where US Marines fought a deadly battle from June 1, 2018 to June 24, 1918, to repel a push by German forces toward Paris during World War I. Devil Dog fountain was a rally point for surviving Marines after they defeated the Germans. The Marines suffered nearly 10,000 casualties. Before an audience of US military personnel and Cabinet officials, Trump explained that the relationship he forged with Macron at the start of his presidency was a testament to the “enduring friendship that binds our two nations.” He thanked the French leader for his “steadfast partnership” in the recent missile strike in response to the chemical attack in Syria. Trump went on to state, “It’s an honor to call you my friend.” He predicted that Macron would be a historic leader of France. In a jovial mood in the Oval Office, Trump displayed some personal chemistry with Macron by feigning to brush off Macron’s suit jacket and saying, “We have a very special relationship; in fact, I’ll get that little piece of dandruff off. We have to make him perfect — he is perfect.” During a toast at a formal state dinner, Trump mentioned the ties between the US and France, saying, “May our friendship grow even deeper, may our kinship grow even stronger and may our sacred liberty never die.”

The next day, at a joint press conference, Macron focused on the relationship between the US and France, Macron said, “History is calling us. It is urging our people to find the fortitude that has guided us in the most difficult of times. France and with it, Europe, and the United States have an appointment with history.” However, through a translator, Macron again got down to business, stating: “Mr. President, please allow me to go back to a number of issues, which are fundamental for not only our relationship, but beyond. The first topic is Iran. You said once again, in front of the press, what your position was during the campaign and as well as the President of the United States.  It’s not a mystery we did not have the same starting positions or stances, and neither you nor I have a habit of changing our stances or going with the wind.” On his last day in Washington, Macron, in flawless English, addressed the US Congress. Although Macron spoke critically to an even greater degree of a number of Trump’s foreign policy, trade and environmental decisions, he did so in a well-considered, methodical way, always leaving real hope that at some point a meeting of minds could be reached.

Critics put off by the congenial interaction between Trump and Macron. Their friendship was derided as “Le Bromance” and critics groaned that there were “exaggerated handshakes and a pair of kisses.” Macron was referred to as a “Trump whisperer” because he converses with Trump often by telephone. Critics seemed to find solace in the belief that Trump’s relationships with other European leaders are more strained. While the idea emphasized, it is not necessarily the case. Critics also noted that Trump ended his first year in office without receiving a foreign leader on a state visit, the first president in nearly 100 years to fail to do so.

French President Emmanuel Macron (left) and Trump (right) When Macron visited the US from April 24, 2018 to April 25, 2018, he hoped to bridge differences with Trump over the Joint Comprehensive Plan of Action, encourage him not to leave quickly from Syria, prevent prospective US steel and aluminum tariffs on European countries, and make headway with Trump on the Paris Agreement on climate change. Macron spoke critically on a number of Trump’s foreign policy, trade and environmental decisions, but did so in a thoughtful way. He also emphasized the importance of the Franco-American relationship and his friendship with Trump.

The Way Forward

In Act I, scene iii, of William Shakespeare’s The Tragedy of Macbeth, Generals Macbeth and Banquo have already defeated the invading armies of Ireland and Norway. As they cross a moor together, they encounter three witches. The witches hail Macbeth as thane of Glamis–his original title–and as thane of Cawdor. The witches also declare that Macbeth will be king one day. They call Banquo “lesser than Macbeth, and greater,” and “not so happy, yet much happier”; then they proffer that he will never be king but his children will sit upon the throne. Once the witches vanish, Macbeth and Banquo stand baffled and speak skeptically of their prophecies. However, two of King Duncan’s men, arrive. One tells Macbeth that the king has made him thane of Cawdor as the witches prophesized. While Macbeth is intrigued that the witches words came true, Banquo warns: “That trusted home Might yet enkindle you unto the crown, Besides the thane of Cawdor But ’tis strange: And oftentimes, to win us to our harm, The instruments of darkness tell us truths, Win us with honest trifles, to betray’s In deepest consequence.” The agendas of foreign governments are usually single-minded. They will try to push the US to use its wherewithal and capabilities in a way that favors their countries positions. Some national leaders have projected a sense of apprehension about approaching Trump to improve their countries’ conditions, enhance military, diplomatic, political situations, or at least maintain the status quo. Some partners, much as competitors, have pushed hard with their respective agendas with the US from a counter-Trump perspective. Both the impetus and confirmation of their thoughts, words, and deeds can usually be sourced from reports and commentaries of Trump’s critics. Naturally, discord has obtained as a consequence of taking such an ill-considered tack. Critics have painted a portrait of Trump, and through it, a personality of Trump is conveyed, but it has always been their version of him and it has never been complimentary. They see no style, grace, creativity or intellect in the ways in which he has addressed foreign policy issues. They insist that a dictatorial mayhem exists in the Trump administration and only the worst foreign policy decisions could possibly flow from it. As explained here, one route such thinking from critics can travel to national leaders is through their countries’ intelligence services. Those services might be willing to allow intelligence reports to be colored with information from overt US sources produced by critics openly hostile toward Trump. That information, in turn, would confirm leader negative views of him. That information could “betray with deepest consequence.”.

Smart, confident people can find a constructive solution to any problem. There is, in reality, nothing so mysterious about Trump that should lead any national leader to throw a history of good relations with the US out of the window. Welling up with the type of anger and disappointment that might cause them to find affinity with Trump’s critics will destroy any opportunity for a new, better, enriching path to develop. Those leaders must consider what their respective countries relationships with the US mean not only on one issue, but in the bigger picture. They should consider what the US really offers. When leaders lose sight of the multifaceted nature of their respective countries’ relationships with the US, they create the danger of driving those relationships down to lower points. They should think about current so-called challenges as opportunities. Meditating on the matter, they may discover that Trump, in doing things a bit differently, presents possibilities for getting many new, better things done. Leaders should not let bad words, negative choices flashover all issues regarding the US and become their country’s dénouement concerning Trump. They can still recurvate. Changes on one issue could result in great benefits on another. Sola virtus praestat gaudium perpetuum, securum; etiam si quid obstat, nubium modo intervenit, quae infra feruntur nec umquam diem vincunt. (Virtue alone affords everlasting and peace-giving joy; even if some obstacle arise, it is but like an intervening cloud, which floats beneath the sun but never prevails against it.)

Trump Says Putin Means It About Not Meddling: He Also Wants to Make Sure It Does Not Happen Again!

US President Donald Trump (above). After speaking in camera with Putin on the sideline of the Asia Pacific Economic Cooperation summit meeting in Danang, Vietnam, Trump said that he had again asked Putin whether Russia meddled in the 2016 US Presidential Election, but his continued focus on the issue was insulting him. Although Trump faces attacks from critics due to perceived inaction, he has acted in a well-paced manner, taking calibrated steps to assure the defeat of any future election meddling, and make something positive out of a negative situation.

According to a November 11, 2017 New York Times article entitled “Trump Says Putin ‘Means It’ About Not Meddling”, US President Donald Trump expressed the view on Saturday, November 11th that he believed Russian Federation President Vladimir Putin was sincere in his denials of meddling in the 2016 US Presidential Election. (A version of this article appears in print on November 12, 2017, on Page A1 of the New York edition with the headline: Putin’s Denials Of Interference Satisfy Trump.) The November 11th New York Times article suggested Trump felt Putin was sincere in his denials of Russia played any role in the US elections, and he called questions about Moscow’s meddling a politically motivated “hit job” that was hindering cooperation with Russia on life-or-death issues. After speaking in camera with Putin on the sideline of the Asia Pacific Economic Cooperation summit meeting in Danang, Vietnam, Trump said that he had again asked whether Russia had meddled in the contest, but that the continued focus on the issue was insulting to Putin. Trump proffered that it was time to move past the issue so that the US and Russia could cooperate on confronting the nuclear threat from North Korea, resolving the Syrian civil war and working together on Ukraine. Trump told reporters traveling with him aboard Air Force One as he flew to Hanoi for more meetings that he asked Putin again about meddling in the US elections. According to Trump, “He said he didn’t meddle.” He went on to state: “You can only ask so many times. I just asked him again. He said he absolutely did not meddle in our election. He did not do what they are saying he did.”

The New York Times reported that Trump did not answer a direct question about whether he believed Putin’s denials in Danang. In response, the New York Times offered the surmisal that Trump indicated he was far more inclined to accept the Putin’s assertions than those of his own intelligence agencies which have concluded the Russian president directed an elaborate effort to interfere in the vote. The article pointed out that the FBI, CIA, the National Security Agency, and the Office of the Director of National Intelligence all determined that Russia meddled in the election. The next day, however, the New York Times explained Trump seemed to walk his comments back a bit, saying that he did not dispute the assessment of the nation’s key intelligence agencies that Russia had intervened in the 2016 presidential election.Trump said at a news conference in Hanoi alongside Vietnam’s president, Tran Dai Quang: “As to whether I believe it or not, I’m with our agencies, especially as currently constituted with their leadership.”  He further stated: “I believe in our agencies. I’ve worked with them very strongly.”

Damnant quod non intellegent. (They condemn what they do not understand.) For critics to insist that Trump is malingering on the issue of Russia’s election meddling because he is not doing what they want him to do, is truly unfair. Trump is doing his job, and it would appear, certainly on foreign policy, that he is doing his job well, with a positive energy, and desire serve the US public. Critics who to demand for Trump to continually reproach and punish Putin over Russia’s election meddling have the luxury to do that away from the fray. They do not have the responsibilities of the president. Further, critics condemn him for having a somewhat nationalistic in tone. Yet, they turn away from the reality that if anyone would feel rage over the idea of another country interfering with the US election process, it would be him. As a responsibility of being US President, Trump must suppress those emotions and consider the issue of Russian meddling in the 2016 election in a way that it best serves US foreign policy. Despite any strong feelings, he must not engage in a vendetta to right a wrong, now past. Critics must accept that Trump does not intend to go to war with Russia over its election meddling. Moreover, he does not intend to pummel Russia with unending waves of sanctions, vengeful behavior which would best match the incessant cries of “foul” and figurative grunts and groans from critics due to the hurt the election meddling caused them. There is a foolhardiness to pursuing something that will lead to nothing. Trump would prefer to deal with the root causes of anger in Putin’s mind, in the minds of other senior Russian officials, that lead to a decision to undertake the risky operation in the first place. Trump understands that the true cure for the meddling problem and others is to develop a good relationship between Putin and himself and greatly improving relations between the US and Russia as a whole. Trump wants to work alongside certain countries, including Russia, to resolve urgent security issues such as North Korea, Syria, and Ukraine. On his recent foreign trip, Trump has kindled or strengthened his relationships with the leaders of China, Japan, South Korea, Vietnam, and the Philippines and secured deals with their countries to improve trade the conditions of trade with them. When one develops a viewpoint, there is nothing unusual about the individual expatiating on it. Yet, somehow in their world, removed from making actual decisions and taking action, some critics have gone a bit too far. They insist that Trump acted in collusion with Russia achieve a victory he would want to win on his own and could win on his own. The suggestion that there is an authentic, direct link between Trump and Russia concerning the 2016 US Presidential Election will likely prove to have been sheer caprice. It would be appropriate to take a look at what Trump has been doing on the election meddling issue.  Moreover, it also would be fitting to examine possible underlying reasons why critics, in the face of Trump’s rather efficacious efforts, questioning his performance and have been so certain and have behaved so harshly toward him over allegations of actions by him that remain unproven. Id bonum cura quod vetustate fit melius. (Take care of the good since it improves with age.)

Trump (left) and US National Security Adviser US Army Lieutenant General H.R. McMaster (right). Critics demand for Trump to continually reproach Putin over Russia’s meddling in the 2016 election. If anyone would feel rage over the idea of another country interfering with the US election process, it would be Trump. Yet, as a responsibility of being US President, Trump must suppress those emotions and consider Russia’s election meddling in a way that best serves US foreign policy.

Trump’s Quiet Approach to Defeating Election Meddling by Russia

As a reminder of what the issue of Russia’s election meddling is all about, from June 2015 to November 2016, Russian hackers penetrated Democratic Party computers in the US, and gained access to the personal emails of Democratic officials, which in turn were distributed to the global media by WikiLeaks. Both the CIA and the FBI report the intrusions were intended to undermine the US election. Cyber gives Russia a usable strategic capability. If benefits from its use appear great enough, Moscow may want to risk additional attacks. Indeed, the US Intelligence Community concluded that Moscow will apply lessons learned from its “Putin-ordered campaign” directed at the 2016 US Presidential Election to future influence efforts worldwide, including against US allies and their election processes. The report of the January 16, 2017 US Office of the Director of National Intelligence entitled, “Assessing Russian Activities and Intentions in Recent US Election” presents the best publicized assessment by the US Intelligence Community of the Russian cyber attack during the 2016 US Presidential Election. It stated: “Moscow’s influence campaign followed a Russian messaging strategy that blends covert intelligence operations—such as cyber activity—with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or “trolls.” Russia, like its Soviet predecessor, has a history of conducting covert influence campaigns focused on US presidential elections that have used intelligence officers and agents and press placements to disparage candidates perceived as hostile to the Kremlin.

The English mathematician and philosopher Alfred North Whitehead stated: “The art of progress is to preserve order amid change and to preserve change amid order.” Trump is doing just that. Although Trump faces attacks from critics due to perceived inaction, he has acted in a well-paced manner, taking calibrated steps, to eliminate the possibility of any future Russian election meddling, and to make something positive out of an extraordinarily negative situation. Trump is aware that there are many lines of approach Russia can take to reach the US public. By examining recent actions by Trump, one can infer what he and his national security team have most likely deemed as “decisive points” to focus on in order to be most effective in impacting Russian behavior and reduce the possibility of future meddling. The following six points are very likely part of a suite of preventative measures employed by the administration.

1. Trump Tries to Sit on Russian Cyber Activities Against the US

Adversus incendiary excubias, nocturnos vigilesque commentus est. (Against the dangers of fires, he conceived of the idea of nightguards and watchmen.) On July 9, 2017, when Trump broached the issue of the Russia’s hacking of the 2016 Presidential Election, Putin apparently became a bit scratchy. Putin’s denial of the facts presented most likely signalled to Trump that he would be engaged in a argument without end on the hacking. Trump had to either move away from the issue or move laterally on it in some way.  Surely, Trump did not want to abandon the matter. As an immediate response to Putin’s denials on the matter, Trump then proposed forming a cyber security unit. According to Reuters on July 9, 2017, Trump wrote in the actual tweet about the cyber security unit: “Putin & I discussed forming an impenetrable Cyber Security unit so that election hacking, & many other negative things, will be guarded and safe.”

The proposal for a joint cyber security unit did not simply materialize from thin air. On the one hand, it likely stemmed from Trump’s experience as a negotiator, his gaining of the conversation with his national security team, and his consideration of all the “what ifs” possible. It was also developed more during an intense discussion between Trump and Putin on how to remit Russian cyber warfare programs directed at the US and perhaps similar US programs aimed at Russia. It may have been the product of brainstorming by the two leaders. Trump’s proposal was never supposed to serve as a form retribution against Russia for its intrusions into the US democratic process. Surely, it was not created to be a final solution to the threat of hacking US election. Immediately after the bilateral meeting in Germany, it was revealed that forming such a joint cyber security unit with Russia was prohibited under US law. Yet, although creating an actual cyber security unit was out of bounds, the concept of bringing US and Russian cyber experts together in some way to talk about some cyber matters was not. Trump’s likely aim with the proposal was to create a situation in which US and Russian officials were talking about hacking. Ostensibly, those conversations would create goodwill, perhaps stimulate a more open discussion about the issue, and promote honest talks about the issue among senior officials. In that way, the proposal would have served as a confidence building measure.

Trump (right) and Russian President Vladimir Putin (left) in Hamburg. Trump does not intend to pummel Russia with unending waves of sanctions, vengeful behavior which would best match the incessant cries of “foul” and figurative grunts and groans from critics due to the hurt the election meddling caused them. There is a foolhardiness to pursuing something that will lead to nothing. Trump would prefer to deal with the root causes of anger in Putin’s mind that lead to a decision to undertake the operation in the first place.

2. Enhancing the US Surveillance Capability

US has the ability to monitor activities of Russian Federation intelligence organizations operating on the ground in the US, to include: Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR; the Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU; and, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB. Undoubtedly, Putin also well aware of this now. This capability was made public by the administration of US President Barack Obama in a June 23, 2017 Washington Post article that included a leaked account of that administration’s reaction to reports about ongoing Russian efforts to meddle in the 2016 US Presidential Election. That article indicated that Obama was in a dark mood over the intelligence findings about Russian activities. The approaching transfer of power gave urgency to his National Security Council’s deliberations on how to retaliate against Russia. By mid-December 2016, Obama’s National Security Adviser, Susan Rice, was quoted as saying to senior national security officials: “We’re not talking anymore. We’re acting.” A senior national security official at the time told the Washington Post that Rice challenged them go to the “max of their comfort zones.” Economic sanctions, originally aimed only at the GRU were expanded to include the FSB. Four Russian intelligence officials and three companies with links to those services were also named as targets.

The Washington Post article, as an overt source to intelligences service worldwide, informed that the FBI had long lobbied to close two Russian compounds in the US–one in Maryland and another in New York–on the grounds that both were used for espionage and placed an enormous surveillance burden on the Bureau. The FBI was also responsible for generating a list of Russian operatives, that it had concluded, were working under diplomatic cover to expel, drawn from a roster the Bureau maintains of suspected Russian intelligence agents in the US. In the end, Rice submitted a plan to Obama calling for the seizure of both Russian facilities and the expulsion of 35 suspected spies. Obama signed off on the package and announced the punitive measures on December 29, 2016 while on vacation in Hawaii. Trump has undoubtedly increased FBI electronic and other technical monitoring and surveillance of Russian intelligence activities, and can increase it further. Interviews will invariably be conducted with senior leaders among Russian intelligence officers with official diplomatic cover. To the extent that it does not interfere with counterespionage operations, the FBI will conduct interviews with suspected Russian intelligence operatives working in the US with non-official cover.

3. Trump Seeks to Find Chemistry with Putin to Enhance Communication

Ad connectendas amicitias, tenacissimum vinculum, est morum smilitudo. (For cementing friendship, resemblance of manners is the strongest tie.) One must try to live a life based on a strong moral foundation. In foreign policy and diplomacy there must be some confidence in, some foundation of trust, among opposing parties that they are both trying to do the right thing. Diplomacy will not succeed, and relations will not flourish, if that is not the case. After his bilateral meeting with Putin in Hamburg, Germany during the G-20 Economic Summit, Trump emphasized that he raised allegations of Russian interference in the 2016 US Presidential Election with Putin. Reuters reported on July 9, 2017 that Trump stated: “I strongly pressed President Putin twice about Russian meddling in our election. He vehemently denied it. I’ve already given my opinion…..” When Putin denied meddling, a US official at the time said that Trump expressed the view that both countries must agree to disagree on the issue and move on to other topics where they could work together. As mentioned earlier, after Trump spoke privately with Putin on the sideline of the Asia Pacific Economic Cooperation summit meeting in Danang, Vietnam, Trump revealed he again asked Putin whether Russia had meddled in the contest, and that he gotten the impression that the continued focus on the issue was insulting to Putin. When Trump would ask Putin about Russia’s election meddling, he would likely speak to Putin with un fil di voce, a reserved voice, but with a power behind it that allows it be discerned in the balcony. Trump raised contentious issues with Putin, not to confront but show Putin that there was a need for the two to confide in one another about urgent and important issues if relations between the two countries were to transform. In terms of positive actions, this was a maximum effort.

Russian officials will normally vehemently deny launching cyber attacks. Russian officials almost never open up their covert intelligence operations. Putin has never publicly discussed them. Trump was undoubtedly advised of this fact by his national security team. Perhaps the best way to explain it all is to say that Putin’s denials are routine. Yet, among Trump’s critics, revelations about his response on Russian intelligence activities seems to overwhelm those who learn about it all. When Trump received Putin’s response, he was left with choices. Indeed, both he and Putin were aware of that. He could accept Putin’s denial, or create a hostile exchange by demanding he “tell the truth” as it is known in the US. Surely, there would be no positive or professional end to recreating the communication failures, diplomatic missteps, and delinquencies of the previous administration. Trump would most likely have stoked the same fires that led to a specious struggle of words between Obama and Putin and also ignited a miscalculated decision in Moscow to interfere with 2016 US Presidential Election which the US Intelligence Community assures took place. Actually, engaging in such actions would defy Trump’s own efforts to pull relations in a new direction and the action would best get described as counterintuitive. Trump has no intention of doing so. As the November 11, 2017 New York Times Trump said it was time to move past the issue so that the US and Russia could cooperate on confronting the nuclear threat from North Korea, solving the Syrian civil war and working together on Ukraine.

On June 10, 2015, Putin was asked by the editor-in-chief of the Italian daily Corriere della Sera, “Is there any action that you most regret in your life, something that you consider a mistake and wouldn’t want to repeat ever again.” Putin stated, “I’ll be totally frank with you. I cannot recollect anything of the kind. It appears that the Lord built my life in a way that I have nothing to regret.” While he may not have regrets, Putin may at least be rethinking, reevaluating the operation that stirred so much trouble for the Obama administration and could have potentially destroyed his relations with the new Trump administration before it even started. Trump wants Putin to give that consider. Further, Trump is offering Putin the opportunity to have a unique, intimate relationship with Trump. With Trump, good things are possible if that is what Putin truly wants. Things done together will lead to goodness for both. Opposition, and to an extent, competition, must be replaced by unity. In amicitia nihil fictum est, nihil simulatum, et quidquid est verum et voluntarium. (In friendship there is nothing fictitious, nothing is simulated, and it is in fact true and voluntary.)

Putin (left) with Russian Federation Foreign Minister Sergei Lavrov (right). Russian officials will normally vehemently deny launching cyber attacks. Russian officials almost never open up their covert intelligence operations. Putin has never publicly discussed them. Trump was undoubtedly advised of this fact by his national security team. Perhaps the best way to explain it all is to say that Putin’s denials are routine.

4. Trump Seeks to Obviate Russia’s Penchant for Being Manipulative

The Obama administration never put together the right recipe for working well with Putin. To an extent, it was simply bad chemistry between the two leaders. Trump feels he can find the solution. True, the meeting between Trump and Putin will unlikely be a catalytic moment when opponents of Trump, political or otherwise, will see the method in his madness and appreciate his accomplishment. Moreover, when Russia behaves in ways that tear others from peace, it must still face consequences. However, Trump’s efforts evince his desire not to isolate Russia, or allow engagement with it to fall off. He does not want to settle on a long-term stand-off in which peace, particularly in Europe, is placed at risk. Much as a warrior with power and know-how, and interact with Putin eye-to-eye, head-to-head, brain-to-brain. Through both strength and understanding, Trump believes the US and Russia can be good neighbors on the same planet. Yet, in what seemed to an effort to instigate further troubles for Trump, senior Russian officials provided an alternative account of his meeting with Putin in Danang, Vietnam. Almost mockingly, they asserted that Trump had accepted Putin’s denial of election interference and even said that some in the US were “exaggerating” Moscow’s role without proof. Their efforts at burlesque were in considerable variance with Putin’s response to efforts to connect Russia with the 2016 US election. Putin, sought to avoid the issue altogether, dismissing revelations that Russians had contacts with Trump’s campaign team. After the summit meeting, the Russian news media quoted Putin as saying: “I think that everything connected with the so-called Russian dossier in the United States is a manifestation of a continuing domestic political struggle.”  Putin told reporters in Danang, “It’s important that we find an opportunity, with our teams, to sit down at the level of presidents and talk through our complex relations.” He continued: “Our relations are still in crisis. Russia is ready to turn the page and move on.” Putin also commented that Trump comported himself at meetings “with the highest level of goodwill and correctness,” adding, “He is a cultured person, and comfortable discussing matters related to work.”

Putin’s contacts with the US have certainly not been about shutting the door. Yet, although he may very well have recognized opportunities to create a more positive relationship with the US, his senior advisers seem to be focusing upon the atmosphere of pure hatred and rejection propagated by the “counter-Trump milieu.” (In the US, many journalists, think tank scholars, other policy analysts, particularly former officials of the Obama administration, propagate a cult of ugliness directed at the US presidency. The mass of their combined efforts and the environment they create, is referred to by greatcharlie as the counter-Trump milieu.) They cannot help but recognize that there is an effort to separate Trump from the US public and create turmoil and frustration for him that Russia, for certain, does not have his hand in. They perhaps are suggesting to Putin that he should do nothing that might help Trump restore respect for the US presidency. A rationale for Putin advisers to take such a position is that it fits well with the idea of supporting their leader’s apparent desire of turning Russian into a simulacrum of the Soviet Union into more than a dream. It would accomplished through the capture of former Soviet republics that are now sovereign countries in Russia’s near abroad. The notion that Trump is a neophyte with regard to Washington politics may also be something they believe to be a tangible fact and perhaps even an advantage for Putin’s advisers to develop analyses of Trump’s thinking and action.

Fluctuat nec mergitur. (It is tossed by waves but it does not sink.) The reality is that Trump and his administration are in good nick. Putin might be genuinely engaged in a deliberate process of developing an amicable, constructive relationship with Trump. Trump never had a personal relationship with Putin before  he became US president. It is very clear that Putin is trying to understand his positions and his thinking in a granular way.  Putin’s adviser would do well to engage in a similar effort to develop greater insight on Trump. It would seem they have already run Trump through analyses for an uncongenial, combative relationship, as evinced by given words they expressed Danang. They should dig deeper than the surface, to understand where new linkages can be established. A conscious effort should be made to stay away from distortions propagated from the very emotional, often very irrational, counter-Trump milieu. Trump administration attempts to engage in confidence-building with Moscow should be viewed as perfect opportunities to discuss common ground that exists between the two countries from Moscow’s perspective. Advisers of the two leaders must have ongoing, frank discussions on the timing for presenting initiatives on issues before any bilateral talks. Such discussion would be the best way for them to inform their counterparts of rocky domestic political situations and other political obstacles, that may derail initiatives if not handled with precision. Additionally, discreet matters must be kept discreet. That is a key responsibility of both sides. Resolutions to issues are less likely be found if they are subtly expressed in condescending or patronizing way, even if it is simply an expression of crni humor or some other form of banal amusement. Gaining a perspective akin to that outlined here may demand the development of a duality in the thinking of Putin’s advisers, however, it would unlikely be deleterious to their efforts regarding the US. The more Trump pushes Russia in the right direction, the more Putin may push for better analyses, and better answers concerning the US. The more he pushes, the great chance Putin advisers may decide to see things in a way as discussed here. Intriguingly, although Trump’s approach toward Putin’s advisers is nonviolent, benign in fact, in military terms, it would be akin to “the attack in-depth.”

Trump (right) with Putin (left) in Danang. Trump understands that the true cure for the meddling problem and others is to develop a good relationship between Putin and himself and greatly improving relations between the US and Russia as a whole. Trump wants to work alongside certain countries, including Russia, to resolve urgent security issues such as North Korea, Syria, and Ukraine.

5. Trump Turns Refraining from Meddling into a Matter of Honor for Putin

Long before Putin became the President of the Russian Federation, he revealed that he both engaged in efforts to influence elections in other countries and personally felt the negative impact of election meddling in Russia. Putin outlined his experience influencing elections as a KGB officer in other countries Indeed, in Part 4 of his memoir, First Person: An Astonishingly Frank Self-Portrait by Russia’s President (Public Affairs, 2000), Putin explains that in East Germany his work was “political intelligence,” which included obtaining information about political figures and the plans of the main opponent: NATO. (See greatcharlie’s book review of First Person.) In a precise statement of his intelligence activities, Putin intriguingly described them as follows: “The usual intelligence activities: recruiting sources of information, obtaining information, analyzing it, and sending it to Moscow. I looked for information about political parties, the tendencies inside those parties, their leaders. I examined today’s leaders and the possible leaders of tomorrow and the promotion of people to certain posts in the parties and the government. It was important to know who was doing what and how, what was going on in the foreign Ministry of a particular country, how they were constructing their policy on certain issues and in various areas of the world, and how our partners would react to disarmament talks. Of course, in order to obtain such information, you need sources. So recruitment of sources, procurement of information, and assessment and analysis were big parts of the job. It was very routine work.”

In Part 6 of First Person, Putin also goes into great detail about his work in the 1992 and 1996 mayoral elections in St. Petersburg following his resignation from the KGB. and a sense is provided of his acumen and instinct for work in the political sphere. In 1992, he played a definitive role in the election of his political mentor, Anatoly Sobchak, as the first popularly elected mayor of the city. Putin explains that as chair of the Leningrad City Council under an older system, Sobchak could have been removed by the council members at any moment. Putin felt Sobchak needed a more stable position. Sobchak finally agreed that the post of mayor had to be introduced. The decision to introduce the post of mayor was passed by the Leningrad City Council, by a margin of a single vote. However, from the experience of arranging Sobchak’s political victory, Putin was able to assess four years later that in order to win re-election, Sobchak would need “professional campaign managers and technicians–not just a guy who could finesse the deputies.” Putin saw that it was a whole new ball game. Campaign plans had to be adjusted to fit circumstances. Putin said that he told Sobchak right off, “You know, you’re on a completely different playing field now. You need specialists.” He agreed, but then he decided that he would conduct his own electoral campaign. He says: “You know, running a campaign, bringing in specialists–all of this costs money. And we didn’t have any. Sobchak had been under investigation for a year and a half on allegations that he had bought an apartment with city funds. But in fact, he did not have any money either for an apartment or for an election campaign. We were not extracting funds from the city budget. It never entered our heads to find the money we needed that way.” However, with regard to Sobchak’s opponent, Vladimir Anatolyevich Yakovlev, the former governor of Leningrad oblast (province), Putin said that he got the funds he needed at Moscow’s expense. He believed Yakovlev was supported by the very same people who orchestrated an ethics campaign against Sobchak. Putin described the critical junture in the campaign in the following way: “During the election campaign, someone sent an inquiry to the Prosecutor General’s office, asking whether Sobchak was involved in any criminal investigations. The very same day, the answer came back: Yes, three were two criminal cases under investigation. Naturally, they didn’t explain that he was a witness, not a suspect, in these cases. The reply from the Prosecutor General’s office was duplicated, and flyers were dropped over the city from a helicopter. The law enforcement agencies were interfering directly in a political contest.” The newly elected mayor of St. Petersburg, Yakovlev did not move Putin out of his office right away; but as soon as the presidential elections were over, he was asked rather harshly to free up the space. By that time, Putin had already turned down Yakolev’s offer to keep his post as deputy mayor. Putin said Yakolev made the offer through his people. Putin explained: “I thought it would be impossible to work with him.” However, Putin said what really made staying on a bad idea were attacks he against Yakolev during the campaign. Putin said: “I don’t remember the context now, but in a television interview, I had called him Judas. The word seemed to fit, and I used it.”

Trump knows Putin has personal experience in attempting to interfere with nation elections of other countries. He presumably knows this not only through First Person, but also reports provided by the US Intelligence Community, knows Putin disfavors such efforts given what happened to his mentor Sobchak. As mentioned earlier, Trump said, “Every time he sees me he says, ‘I didn’t do that,’ and I really believe that when he tells me that, he means it.” Trump added: “I think he is very insulted by it, which is not a good thing for our country.” There are pitfalls to relying on ones own moral barometer in the performance of diplomacy. Trump appears to have courageously taken that tact regarding Putin and the issue of Russia’s election meddling. Trump has not said that he agrees with Putin’s view, nor has he  let Putin off the hook. He will not forget what transpired. Yet, by refusing to publicly reproach Putin for not being more forthcoming over the election meddling in the US when he questioned him, Trump demonstrated that he understands the tough situation Putin is in regarding the meddling, now well-exposed. It would appear that the covert operation of election meddling was supposedly crafted to be plausibly deniable, allowing and, perhaps under Russian codes, requiring Putin to gainsay its existence. Trump appears to be holding out hope that his decision to be tolerant of Putin’s response has appealed to Putin’s sense of honor. Indeed, he likely hopes that it will be a factor in future interactions with Putin. At the same time, however, Trump is actually cutting off Putin from possible equivocation and outright denials. Putin’s future actions would be gauged off of denials of interference. Many in US foreign policy circles have absolutely no faith Putin as an honest broker. Yet, Trump’s expectations appear to manifest his nature as a visionary, his sense of imagination. Along with the sense of expectation is an intuition that what is expected will be more vital than what exists. Trump has no intention of recreating the failures, delinquencies of the previous administration. There is no logical purpose in stoking the fires the led to a childlike struggle of words that also likely ignited an adversarial decision that led to an attempt to interfere with 2016 US Election which the US Intelligence Community has confirmed. 

Trump’s critics have not covered themselves in glory. Their performance, though overwhelming, has been disjointed. It is difficult to imagine how presidential historians will judge how critics’ hammered Trump over the manner in which he is handling Russia’s election meddling, and allegations that Trump worked with Putin to secure Russia’s assistance in winning the 2016 US Presidential Election.

6. Trump Offers Business Opportunities to Mitigate Putin’s Desire to Punish the West

Certainly, Trump cannot know exactly what is in Putin’s heart. Putin is a calculator. Various US policy analysts and academics have hypothesized over the causality for the Russia’s misunderstandings and crises with the West over Eastern Europe during the past 25 years. Putin, himself, explained at the 2007 Munich Security Conference and many times since that former NATO Secretary General Manfred Wörner had guaranteed that NATO would not expand eastwards after the fall of the Berlin Wall. Moreover, he has pointed to the statements of German parliamentarian Egon Bahr who explained on June 26, 1990: “If we do not now undertake clear steps to prevent a division of Europe, this will lead to Russia’s isolation.” In a Bild interview on January 11, 2016, Putin pointed to what he described as a very concrete suggestion by Bahr on how that danger could be averted: “the USA, the Soviet Union and the concerned states themselves should redefine a zone in Central Europe that would not be accessible to NATO with its military structures.” When the Bild interviewer pointed out to Putin that under NATO’s rules and self-understanding it can accept free countries as members if they want to be members and meet certain requirements.  Putin responded, “Nowhere is it written that NATO had to accept certain countries. All that would have been required to refrain from doing so was political will. But people didn’t not want to.” Putin declared the reason for NATO’s lack of restraint was “NATO and the USA wanted complete victory over the Soviet Union. They wanted to sit on the throne in Europe alone.”  

Bis interimitur qui suis armis perit. (He is doubly destroyed who perishes by his own arms.) Putin’s penchant for acting in that direction lead to his capture of territory in Georgia, capture of Crimea, and investment in Eastern Ukraine. Interestingly enough, Georgia and Ukraine are not NATO members, but in 2008 had been explicitly and publicly assured that they would be granted Membership Action Plans. By occupying those countries Putin has assured they would never join NATO in the near term. Indeed, no country will ever join NATO while being partly occupied by Russia. To that extent, part of Putin’s grand strategy entails halting NATO expansion while securing more territory in countries in its near abroad. The near abroad is what Moscow refers to as the territory surrounding Russia’s borders. Recall that Napoleon Bonaparte, in an effort to unite Europe under his rule, took an inexorable path to destruction. He became morally myopic. To that extent, as Victor Hugo stated: “Napoleon embarrassed God.” For Putin, now is a time for reflection and resolve. This may be the moment to genuinely improve Russia’s relations with the US.

There are several bargaining chips of differing value to both Trump and Putin. Trump managed to become US president doing what he wanted to do, having truly dominant knowledge of the desires of the majority of the US public and overall US political environment. He knows what he wants and what he can really do. Cooperation on counterterrorism, ISIS, climate change, and poverty may serve as a bargaining chips to get agreements on other issues. However, Greater bargaining chips might include: the return of Russia properties in the US, reconstruction assistance in Syria, peace-enforcement in Syria, making the Group of 7 the Group of 8 again with inclusion of Russia, economic sanctions, closing sanction loopholes, and lifting restrictions on the Exxon-Rosneft agreement through an exemption. Some of these actions may not appear plausible and could have a deleterious effect on the sanctions regime against Russia over it actions in Ukraine and create an uproar among the Europeans. However, Trump undoubtedly believes bold action, when appropriate, may be the very thing to turn situations around, modify Russian behavior, and get relations moving forward. When presidential action could immediately resolve matters, those issues may be hashed out at the table or it could be agreed to allow for  some additional consideration before giving a response. Trump must put “America First” but keep firmly in mind how his decisions and actions regarding Russia might impact European allies and partners. Given domestic political concerns, initial offerings from Putin may appear paltry. There is a real possibility that if he feels secure enough, Putin could offer much, particularly to loosen the US grip on Russia’s figurative economic throat. To date, a degree of good-faith bargaining and compromise between Washington and Moscow has occurred. There have been mutual peace offerings. However, refraining any interference with US elections cannot be part of any peace offering or any quid-pro-quo arrangement. Without any further inquiries about what exactly happened, Russia must stop engaging in such operations. If Russia crosses the line again, everything accomplished will be obliterated and all of the great possibilities will never be realized. Tragically, it would likely once again lock up the diplomatic process. Trump can assume that Putin knows this, too!

Trump (right) and Chinese President XI Jinping (left). On his recent foreign trip to Asia, Trump kindled or strengthened his relationships with the leaders of China, Japan, South Korea, Vietnam, and the Philippines and secured deals with their countries to improve trade the conditions of trade with them. He helped US companies arrange over $250 billion in business deals while in Beijing.

Causality for Critics’ Relentless Attacks on Trump Despite His Discernable Efforts

For those longing for an end to the Obama administration and the many vicissitudes it faced on foreign policy, were heard shout to the effect of “Blessed be the Trump administration and health to all its parts.” However, many critics deemed Trump unfit for the president even before his election victory. The words “not presidential” were heard every time Trump spoke. Eventually, moves by Trump of any kind would elicit a range of reactions by those engaged in the broad, piquant, counter-Trump discourse.

Custos morum. (Guardian of morals.) Some critics seem to believe that they are figurative hammers, designed to shape Trump into the instrument they want. While they may self-declare themselves repositories of the accumulated wisdom on US foreign policy, they are not. Moreover, they are not the stewards of US foreign policy. There other critics who apparently have found nothing desirable and everything loathsome about Trump. Oscillating, moving from one point to the other, critics of Trump have their own relentless logic. Whenever one of Trump’s efforts fail or whenever he makes a mistake, they were over the moon with joy. Short of pushing Trump out of office, it strikes one’s conscience to think that nothing would soothe them than to prescribe plunging Trump forevermore into the boiling cauldrons of Hell from the French playwright Mollière’s, École des femmes. Indeed, they seemed to have let their aggression toward Trump come alive inside of them. At times, admonitions and opprobrium expressed through all manner of writings, created the impression that some giant golem was struggling, fighting to escape their inner souls.

What is truly problematic is the reality that critics may have infiltrated and despoiled the psyche of many in the US, perhaps may have even destroyed the possibility for some to have confidence in future US administrations, both Republican and Democratic. Most of Trump’s critics are individuals with advanced degrees, apt to be eloquent enough on key issues concerning the purported “Trump threat.” The US public is open to eloquence. Further, the precept of being innocent until proven guilty has been forcefully pushed aside in the US newsmedia with regard to all matters related to Trump. Hopefully, in the end, the truth will be revealed to those who are confused and bewildered by it all, both among general the public and Trump’s critics. Certainly there were many personal reasons for critics to harbor such strong, negative opinions of Trump and efforts against him. Their efforts have inflamed passions globally. The administration might explain that concerns expressed about Trump’s approach to the presidency were a manifestation of critics’ own struggles to accept the change from the traditional to modernity. The old is replaced by Trump’s new way of doing things. It has been said that some attacks on Trump are being used to cultivate critics’ emotions on: US policies, Obama’s departure, and Hillary Clinton’s election loss. There is the possibility that their varied attacks may just be projections of character flaws that critics see in themselves. Even more, there is the notion that Trump’s victory has caused them so much emotional harm that there is a desire to strike back, to take vengeance. That is perhaps the idea most worthy of examination.

Trump (left) and Japanese Prime Minister Shinzō Abe (right). Through meetings, Trump and Abe have kindled a good relationship. Seldom have Trump’s critics taken public inventory of themselves, and considered whether their thinking and actions are appropriate or representative of their own notions of good character. It would appear that even the most noble among them have not considered the impact of their attacks against Trump on US foreign policy.

Moral Responsibility and the Strike Back Emotion

There are many sources for the belief in moral responsibility. Many philosophy scholars today conclude that the deepest roots of our commitment to moral responsibility are found in powerful emotions. In The Stubborn System of Moral Responsibility (MIT Press, 2015), philosopher Bruce Waller at Youngstown State University explains this strike back emotion is one of the main sources of our strong belief in moral responsibility.

Indeed, human beings are a punitive species, and share the strike back emotion with other animals. It has been hypothesized that since humans are social animals, and engage with one another to achieve goals, humans are well-disposed to punish those who seek advantage over themselves and others. Wrongdoing stirs formidable emotions in humans, even when it is done to others. In social groups or in societies, anger and resentment is raised toward those who take benefits to which they are not entitled. It almost universally leads to some form of punishment. Culpam poena, premit comes. (Punishment closely follows crime as its’ companion.)

Revenge can seem sweet, and retribution may bring satisfaction, but those feelings are often short-lived. Moreover, the emotional source of moral responsibility, the strike back desire, can create problems with regard to given other desired ends, such as future safety, reconciliation, and moral formation. Most psychotherapists would explain that vengefulness, itself, generally is the manifestation of a serious pathology. Vengeful desires and behavior can ensnare an individual in a vicious cycle of hatred and prevent any resolution of the original harmful experience. Most vengeful actions are based on the misconception that harm to the self can be undone or at least mitigated by harming the perpetrator, when, in fact, undoing of what has already been done is impossible. Ones injuries, pain, and emotional distress is never relieved or obviated. Rather, vengeful action could cause those hurts to smoulder. Sometimes, when the sense of moral justification is high, and the desire for vengeance becomes strong enough, individuals can become willing to sacrifice, violate laws, sustain injury, or even self-destruct, in order to punish a perpetrator. The only permanent solution is working through those feelings, as well as feelings of powerlessness.