Literary Insight: James Risen, The Last Honest Man: The CIA, the FBI, the Mafia, and the Kennedys―and One Senator’s Fight to Save Democracy (Little, Brown and Company, 2023)

Senator Frank Church holding a poison dart gun developed by the US Intelligence Community (left) and Senator John Tower observing (right) at the Church Committee’s first open session on September 17, 1975. In the wake of Watergate, Church was tasked with investigating abuses of power by the US Intelligence Community. Rather than noting mere oversteps by the Intelligence Community, Church and his  Congressional Committee put forth dark truths about its work that they uncovered. Indeed, Church exposed a myriad of clandestine and covert plots orchestrated by the Central Intelligence Agency (CIA), the National Security Agency (NSA) and  the Federal Bureau of Investigation (FBI) as well as other federal organizations. In many cases, singular actions were taken by the Intelligence Community actually amounted to criminal violations of federal law. This essay is not a book review. Instead, it is a literary insight essay providing meditations of Risen’s The Last Honest Man. In this essay, greatcharlie’s insights are delimited to a discussion of occasional rogue behavior, abuses of law, by members of the US Intelligence Community. The book is remarkably suggestive with respect to contemporary times. Such an edict surely requires examination. In this essay, readers may come upon aspects of issues or view new angles of the discussion they may not have not recognized or perhaps would not have considered after reading the book.

James Risen’s The Last Honest Man: The CIA, the FBI, the NSA, the Mafia, and the Kennedys–and One Senator’s Fight to Save Democracy (Little, Brown and Company, 2023), [ISBN-13 9780316565134] tells the story of how Frank Church, at the the time  Senator of Idaho for almost two decades, attempted to reign in US Intelligence Community activities in 1975 after years of no Congressional oversight. Risen draws upon hundreds of interviews, thousands of pages of recently declassified documents, and reams of unpublished letters, notes, and memoirs, some of which remain sensitive today. The story as told in the 480 page tome is true to reality.

As a Senator, Church promoted, advocated, and vigorously defended the US Constitution. He was guided by US values and supported its interests. Church’s beliefs would compel him to lead congressional opposition to the Vietnam War and had become a scathing, radical critic of what he saw as US imperialism around the world. Yet, Risen suggests the “rebellious” Church was politically ambitious, and sough acceptance from the foreign and national security policy establishment of which he was very skeptical. He was also  interested in running for president. The author indicates that Church was not devoid of faults. In the wake of Watergate Church was tasked with investigating abuses of power by the US intelligence community. Rather than noting mere oversteps by the Intelligence Community, Church and his Committee put forth dark truths about its work that they uncovered. Indeed, Church exposed a myriad of clandestine and covert plots orchestrated by the Central Intelligence Agency (CIA), the National Security Agency (NSA) and  the Federal Bureau of Investigation (FBI) as well as other federal organizations. In many cases, singular actions were taken by the Intelligence Community that actually amounted to criminal violations of federal law.

The course taken seemed right to Church as the Committee’s Chairman. One might imagine he understood there was great pitfall involved with criticism the work of Intelligence Community, however, Church never hesitated. By Risen’s account, Church was in fact persistent in his pursuit of the matter. He would show historic strength in his greatest moment. Risen did not indicate that Church had wasted any of the Committee’s valuable time rooting around in extraneous matters. Church stayed focused on his task. 

This essay is not a book review. Instead, it is a literary insight essay providing meditations of Risen’s The Last Honest Man. In brief, a literary insight essay’s purpose is to express a readers feelings and ideas about a literary work. It is a journey of introspection. In this essay, greatcharlie’s insights are delimited to a discussion of occasional rogue behavior, abuses of law, by members of the US Intelligence Community. The book is remarkably suggestive with respect to contemporary times. Such an edict surely requires examination. In this essay, readers may come upon aspects of issues or view new angles of the discussion they may not have not recognized or perhaps would not have considered after reading the book

In previous times, one might have supposed the understanding, acceptance of what Founding Fathers who authored the US Constitution defined as the unalienable rights of life liberty, and the pursuit of happiness were sacrosanct. However, one might be able to comfortably conclude today that far less importance is given to those rights upon which the country’s soul and existence was once firmly based and upon which the US public’s expectation and requirement for the good governance of the democracy has its roots. What seemed so certain about the once lauded strictures–as a sampling, the Bill of Rights, the first 10 amendmens of the US Constitution–that would guide the country perpetually, is far less sure today than ever before. There are laws, but very often justice for the people is much harder to find. Breaches of regulations of the US Intelligence Community against ordinary citizen, not responsible for any wrongdoing, must not only be examined but vigorously pursued. Si quid novisti rectius istis, candidus imperti; si nil, his utere mecum. (if you can better these principles, tell me; if not, join me in following them.)

Meeting of the Members of the Church Committee prior to several hearings in autumn (above). Some Members of Congress in 1975 would likely have been more inclined to be dismissive of an investigation of the Intelligence Community than give serious attention to it. The Intelligence Community’s leadership could only hope that matters concerning its operations would be handled by the Church Committee with the same delicacy. The Congress for years had failed for years to put a leash on the Intelligence Community. Consequently, it ran off on its own in the world. Nothing but the foreign opposition, stood in its way. As for what remotely sufficed for “oversight” before the Church Committee was set up, information on Intelligence Community activities was curiously gleaned from the organizations’ directors by senior Members of both the House and Senate Armed Services Committees. They would meet with the directors to occasionally chin-wag likely on the latest activities, resources, personnel, latest activities, troublesome spots, and accomplishments. In those times, save the Congress and the free press, the US public would be assuredly have been kept in the dark regarding the government’s actions in the province of intelligence. The means today by which the US public is kept equally abreast of the Intelligence Community’s activities as then is not as certain. To that extent, what aided the Church Committee’s cause was the fact that certain elements of the national newsmedia, far less then than today, were nevertheless the best and only fount of information about the US Intelligence Community’s performance.

The Church Committee, known formally as the Senate Select Committee to Study Government Operations with Respect to Intelligence Activities established on January 27, 1975. Open sessions were held in September and October of 1975, but incisive research was conducted throughout that year.  Prior to the Church Committee, there had not been any formal Congressional oversight process for what became the US Intelligence Community for nearly 30 years. The CIA was established in 1947, and the NSA was organized in 1952.The FBI has been around since 1924. The intelligence activities of a White House domestic surveillance program and the Internal Revenue Service were also probed. Following up on information reported in a December 22, 1974 New York Times article authored by investigative journalist Seymour Hersh, there was plenty sitting in the vaults of the Intelligence Communityfor the Committee to investigate. It was not mere tittle-tattle.

Some Members of Congress in 1975 would likely have been more inclined to be dismissive of an investigation of the Intelligence Community than give serious attention to it. The Intelligence Community’s leadership could only hope that matters concerning its operations would be handled by the Church Committee with the same delicacy. The Congress for years had failed for years to put a leash on the Intelligence Community. Consequently, it ran off on its own in the world. Nothing but the foreign opposition, stood in its way. As for what remotely sufficed for “oversight” before the Church Committee was set up, information on Intelligence Community activities was curiously gleaned from the organizations’ directors by senior Members of both the House and Senate Armed Services Committees. They would meet with the directors to occasionally chin-wag likely on the latest activities, resources, personnel, latest activities, troublesome spots, and accomplishments. 

There was a danger that as a result of the Church Committee coming off the heels of the Vietnam War, the violent response to the Civil Rights Movement, the assassinations of Martin Luther King , Jr., Senator Edward Kennedy, and the earlier assassination of US President John Kennedy, Watergate, and the country’s continued disfunction on race, equality for women, and gross inequities in wealth establishing large divisions in social class, enabling poverty. the Intelligence Community would not be used as a depository for the ills of US foreign and national security policy.

Omne ignotem pro magnifico. (Everything unknown is magnificent.) In the old-fashion, out-moded sense, the US public at the time appreciated the services provided by its case officers and special agents, had possessed an sense of obligation to its Intelligence Community. However, ultimately,  the Intelligence Community is beholding to the people who expect and deserve its unwavering fidelity.

When evidence of Intelligence Community wrongdoings and abuses became overwhelming, much changed on all fronts. The US had to confront the truth about itself if it was reach the heart of the matter.The Committee soon discovered that there was no possibility to the limits of the Intelligence Community’s operations. It was clearly capable of any fantastic outrage. There was a certain method to the eccentric madness of the Intelligence Community. What was discovered was all outside of the common. There was no outlier so to speak. Nothing revealed could have dare been called trivial. It was essential for the Church Committee Members to be put in the full picture. A priority appeared to be to gain a sense of the scale of those activities. This matter went much deeper than originally supposed.

It required life experience to understand what might be possible, to explore with an open-mind, all that would likely stand much of what Church Committee Members believed to be known on its head. To accept all that was being exposed in Church’s Committee would require one to possess a mind that could view it all with a mixture of imagination and reality. At the same time, many Church Committee Members and staff served overseas during World War II, as well as in the Korean War and in the Vietnam War were not mystified by any of it. It was about killing, death. Nothing was beyond their comprehension. As with other Committee members, Church examined the Intelligence Community’s activities burdened with a rational frame of mind. There were difficulties, but there would always be difficulties.

True, what was done was done. However, there was the chance to prevent the furtherance of such activities, crimes and halt any additional damage to the reputation and standing of the US worldwide . The US is a constitutional federal republic, meaning its government is based on a Constitution which is the supreme law of the country and both citizens and their governing officials are bound to follow the rules established in that Constitution. The Intelligence Community’s actions overseas over the years fell under the jurisdiction of the countries in which the occurred. However, their actions against US citizens inside the US fell under federal and state law. Remarkably, an extraordinary number of operations conducted by Intelligence Community members and other government organizations against domestic targets were discovered.

In those times, save the Congress, as well as a free press, the US public will be assuredly kept in the dark regarding the government’s actions, particularly in the province of intelligence. The means today by which the US public is kept equally abreast of the Intelligence Community’s activities as then is not as certain. To that extent, what aided the Church Committee’s cause was the fact that certain elements of the national newsmedia, far less then than today, were nevertheless the best and only fount of information about the US Intelligence Community’s performance. At least for a generation or two, not too long afterward, certain services of the Intelligence Community would remain dark organizations in the minds of many conscientious US citizens. There has been nothing of such consequence concerning the Intelligence Community beyond the IranContra Affair in which its activities have been put from and center for the US public. As a news story in present times, Church Committee findings unlikely would be of interest to the overwhelming majority.

William Colby, Director of the CIA from 1973 to 1976 (above). Once the Church Committee came prying, the Intelligence Community’s leadership and even White House under US President Gerald Ford appeared to become unsettled. The Intelligence Community’s leadership knew exactly what had been transpiriing in their organizations over the years. A reasonable assessment, completely unbiased, would be that under the strictures of US law, particularly on the domestic front, much of it was wrongful. To that extent, the Intelligence Community’s leadership, particularly the CIA’s leadership, knew members of the Church Committee would light on them once they had the opportunity to become read in on information available and actiually see and handle some of the recherché tools and gadgets the Intelligence Community had developed. Given how the hearings were organized, Intelligence Community executives and senior managers would have a considerable measure of control over their organizations’ fates and their own careers as would provide testimony as key witnesses before the Church Committee in both open and closed sessions. Whatever the Intelligence Community’s leadership hoped to accomplish, particularly with regard to minimizing the shock to the US public over each fantastic outrage revealed, surely failed if disproving newly hatched fears about the Intelligence Community was one goal, their efforts were not successful. Contrary to whatever public relations benefit the Intelligence Community’s leadership may have been hoping to garner as result of the hearings, the Intelligence Community’s reputation instead was decisively sullied. Yet, years later, it is clear that whatever resulted from the Church Committee Hearings hardly held fast. The way that the US public thought about not only the government and the Intelligence Community and also the ability to hold it accountable, would shift, opening the door to abuses that would have been beyond the Church Committee’s wildest imagining.

Once the Church Committee came prying, the Intelligence Community’s leadership and even White House under US President Gerald Ford appeared to become unsettled. The Intelligence Community’s leadership knew exactly what had been transpiriing in their organizations over the years. A reasonable assessment, completely unbiased, would be that under the strictures of US law, particularly on the domestic front, much of it was wrongful. To that extent, the Intelligence Community’s leadership, particularly the CIA, knew members of the Church Committee would light on them once they had the opportunity to become read in on information available and handle some the recherché tools and gadgets the Intelligence Community had developed.

From their view, circumstances of the time, the Cold War, the Modern Age, surpassed the use of ordinary ways and means to defeat threats and assure policy aims. They expoused that extreme circumstances required extreme action. Much more was constantly being required to meet ends covertly. Despite the rather widespread disapproval of its actions, the Intelligence Community’s leadership never believed the use of “ramped up” tactics, techniques, and procedures was not a crime. Through there use, the Intelligence Community could fight adversaries by means other than war to safeguard US national security.

That explanation–that alibi–would not have a steadying effect on the US public, many of whom had been made quite concerned after learning from news media reporting of the open sessions of the Church Committee how the government, honorable and powerful, had been behaving in their name. Again, there was mostly disappointment among the people. A fearful mood had gripped some. If it were only a smattering of odd incidents, any audacious thinking and action perhaps might have seemed slightly tolerable. That by no means was the case. 

The Church Committee Hearings were a moment at time in which the Intelligence Community’s leadership would been behooved to guard against self-deception and delusion to avoid becoming too far a field. However, their conviction over everything the Intelligence Community did, however, was so unwavering that one might imagine a private response among some executives and senior managers was ironically to question the loyalty of Church Committee members. The pretense within the Intelligence Community’s leadsrship was that their organizations were “something above”,” something better”, than the rest of society and thereby they were entitled to do things outside US values,  principles, and laws.

Given how hearings were organized, Intelligence Community executives and senior managers would have a considerable measure of control over their organizations’ fates and their own careers as they would provide testimony as key witnesses before the Church Committee in both open and closed sessions.

If the Intelligence Community’s leadership had any thoughts of avoiding hearings, the Church Committee would brook no denial. Forced to go through the investigative process, they might have left the door open in their minds to the hope that the Church Committee’s findings would allow for the suggestion of a rationale for the behavior of their personnel and all the transpired over the years. They might have hoped to hear a plausible explanation that would circle around notions of the ubiquitous and ceaseless Communist threat posed by the Soviet Union, the Eastern Bloc countries,, and the People’s Republic of China to the US, its allies and friends, and other democracies worldwide.

A figurative pirate’s chest of the strange, unusual technologies and maccabre tactics, techniques procedures, and methods was unlocked and opened wide. It was trove of horrors. To the overwhelming majority of US citizens who gave their attention to the Church Committee hearings, all that was discovered felt, to turn a phrase of the era, very un-American. Risen describes Church Committee revelations on assassinations targeted at Cuban President Fidel Castro in Cuba, Congolese President Patrice Lumumba, and South Vietnamese President Ngo Dinh Diem. There were others. He reports on the CIA’s MKULTRA program.and the use of LSD. and it’s domestic surveillance program, HTLINGUAL. He tells the shocking story of the FBI’s surveillance and harassment of Martin Luther King, Jr. and other US activists under COINTELPRO operations. The CIA contacted an organized crime figure, Johnny Roselli, to act as an intermediary to elicit the assistance of  Chicago organized crime boss Sam Giancana, to coordinate CIA efforts to assassinate Fidel Castro with the Mafia. This list barely scratches the surface. 

There was a sense of revulsion among Committee members and staff. Each Committee Member may have felt something private, very intense, very off putting  about matter. Some might say that many of Intelligence Community lurid activities reflected a loathing of the human race. Seemingly, it was the organization’s preferred way to have others to perceive it. The Church Committee did not really warm to any of those who testified. The Intelligence Community’s leadsrship was not always well-collected while offering testimony. Still, among those Church Committee Members who may have felt disgust over the deeds of the Intelligence Community they had funded generously, there was no intention of allowing anger and grief conspire to create a blindness that might interfere with their vital work.

Whatever the Intelligence Community’s leadership hoped to accomplish, particularly minimizing the shock to the US public over each fantastic outrage, surely failed. If mitigating newly hatched fears about the Intelligence Community was one goal, their efforts were not successful. Contrary to whatever public relations benefit the Intelligence Community’s leadership may have been hoping to garner as result of the hearings, the Intelligence Community’s reputation instead was decisively sullied. Yet, years later, it is clear that whatever resulted from the Church Committee hearings hardly held fast.. The way that the US public thought about not only the government and the Intelligence Community and also the ability to hold it accountable, would shift, opening the door to abuses that would have been beyond the Church Committee’s wildest imagining.

Surely, nothing uncovered by the Church Committee was lost upon the Intelligence Community’s opponents overseas. Their opponents overseas were tough and numerous. However, it seems elements of the US Intelligence Community thought of themselves as being tougher, and sought to be rougher still. It is doubtful that the Soviet Union, the Eastern Bloc countries, and the People’s Republic of China saw or heard anything too shocking or surprising. The Church Committee’s findings were unlikely music to their ears regarding the international front. Clearly, the US was active clandestinely and covertly overseas in a big way. On the domestic front in the US, however, the situation was likely viewed as much better by adversarial foreign intelligence services. News of the Intelligence Community’s history of operations against political targets very likely indicated to the Intelligence Community’s opponents that it was flush with so much cash that it could divert resources and manpower to those efforts. 

Although it was not broached in Risen’s book, those political diversions may have provided enough reason for their foreign intelligence services to sense they were often operating with impunity in the US. Resources and manpower were not just diverted to that mission, but dedicated to it through multiple programs. Conceivably, that may have encouraged the Soviet Union,  Eastern Bloc countries, and the People’s Republic of China to increase their presence and efforts in the US. The Soviet spymaster of Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, Oleg Kalugin, indicates in his memoirs that the 1960s and 1970s were heady, fruitful times for Soviet and Eastern Bloc intelligence operations inside the US. (SEE greatcharlie’s April 30, 2020 post entitled, “Book Review: Oleg Kalugin, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994)”) It would have been almost impossible for the Intelligence Community to know the totality of what foreign intelligence services might have been successfully collecting at the time until new political, economic, or financial information allowed some unexplained upper hand or scientific or technological advances would crop up that evinced tell-tales of its origins and that it had been stolen.

Risen explains Church worked after the Committee Hearings to establish Intelligence Community oversight. Steps included the development of the Foreign intelligence Surveillance Act (FISA) of 1978 and creation of the Senate Select Committee on Intelligence on May 19, 1976 and the House Permanent Select Committee on Intelligence on July 24, 1977.

James Angleton, Chief of CIA Counterintelligence from 1954 to 1975, at the Church Committee Hearings. A figurative box of the strange, unusual technologies and maccabre tactics, techniques procedures, and methods was unlocked and opened wide. It was trove of horrors. To the overwhelming majority of US citizens who gave their attention to the Church Committee hearings, all that was discovered felt, to turn a phrase of the era, very un-American. Risen describes Church Committee revelations on assassinations targeted at Cuban President Fidel Castro in Cuba, Congolese President Patrice Lumumba, and South Vietnamese President Ngo Dinh Diem. There were others. He reports on the CIA’s MKULTRA program.and the use of LSD. He tells the shocking story of the FBI’s surveillance and harassment of Martin Luther King, Jr. and other US activists under COINTELPRO operations. The CIA contacted an organized crime figure, Johnny Roselli, to act as an intermediary to elicit the assistance of  Chicago organized crime boss Sam Giancana, to coordinate CIA efforts to assassinate Fidel Castro with the Mafia. This list barely scratches the surface. During his testimony at the Church Committee, Angleton was pressed on the CIA’s domestic surveillance program, HTLINGUAL. It was sensed at the time that Angleton had not been completely forthcoming with Committee Members.

Without pretension, what greatcharlie relates in the following discussion is completely true and accurate to the best of its knowledge and belief. The information is simply laid out. There is no insistence that readers accept it. It is what it is.

After the September 11, 2001 terrorist attacks on the US, practically all curbs of the psyche and actual policy and legal parameters against abuses were not observed to the letter–somewhat overlooked–by the Intelligence Community in favor of a “go get ’em” attitude and offensive posture against “the enemy”. The priority became getting results: killing and capturing terrorists; uncovering and thwarting terrorist plots; destroying terrorist networks; and, seizing terrorist assets. The practice nearly became “anything goes.” The mainstream newsmedia in the US was supportive of just about everything done and a very vocal US public demanded further retribution. The emotional response of the US public was certainly understandable, however, most were abysmally ignorant of the Intelligence Community’s activities were overseas, literally on the high seas, and domestically. Among US public there are those who, even after being introduced to actualities, are unable to would hardly shake their views how their government can often operate. Today, only a fraction might take a firm interest in the misdeeds, violations of rights under the Constitution, or even larceny and outright violent crimes committed by the Intelligence Community.  It is likely the case for members of the US public that as long as the Intelligence Community’s actions do not directly effect them or their own, there is little to be concerned about. To go a step further, some members of the US public may not be willing to accept that rogue elements of the Intelligence Community and their contractors would engage in surveillance and direct acts against innocent US citizens. Nevertheless, it happens, as Risen’s book makes it very clear. 

The Global War on Terror has not ended. However, US President Joe Biden has reorganized resources and manpower in the over two decades long ubiquitous fight. Fewer airstrikes are ordered in fewer countries. US counterterrorism forces appear to be operating overseas in lesser numbers. The tempo of their operations has decreased. One would expect those decisions and others have had a correlative impact of ratcheting down the Intelligence Community’s use of resources and manpower. Looking a bit further on its tasks, no greater evidence of the Russian Federation’s potential for military aggression exists at the present than the Ukraine War. Yet, relative threats posed by the Russian Federation to the US and its interests has lessened. The degree of inefficiency and albeit incompetence that has been displayed by the Russian Federation Armed Forces and the intelligence services in the prosecution of operations of or pertaining to the Special Military Operation that the Cold War fears of the untamable and indomitable “”Russian Military Bear” has since faded at bit.. However, concerning the People’s Republic of China, however, its intelligence services have displayed an acumen in their espionage activities within the US that has been seemingly beyond the capacity of US counterintelligence services to combat. US foreign intelligence operations in the People’s Republic of China also have not met with great success. In the aggregate, the People’s Republic of China has delivered wrenching blows against the US. 

The point here is that with relatively reduced threats against some opponents and barely a modicum of success against espionage directed from the People’s Republic of China foreign intelligence services in the US, some unscrupulous individuals in the organizations of the Intelligence Community may feel a “greater flexibility to do other things” undistracted by real work upon which they could fully focus their minds and hone their “skills”. Thereby, in an odd and unhealthy, and criminal twist, they appear to have shamefully preyed upon the average US public. Rogue members of these organizations–and there always have been a few– have engaged have engaged in this behavior for years, but happens not with similar frequency. They generally engage in their wrongful acts well-below the radar.  It is awful to accept that a few personnel of the US counterintelligence services, including not so trustworthy contractors they call upon, to knowingly use the exquisite technical resources of the US and tactics, techniques procedures and methods to crush ordinary citizens who have no interest in doing anything against the US. (On this matter, greatcharlie writes not from study, but rather from personal experience as an innocent target of such wrongful and incredibly costly activities.)

The rogue federal officers and contractors have their own reasons for turning to villainy and own reasons for selecting their victims. The victims names may have been found on some innocuous list within the rogue federal officers organizations. Through wrongdoing, the names are apparently transferred to an active list of targets for the rogue federal officers and contractors to prey upon. Rogue federal officers and contractors will claim to have legitimate cause for their actions them. Warrants from “helpful” judges presiding on the Foreign Intelligence Surveillance Court (FISC) will be provided based on those claims, allowing electronic surveillance,  physical search, and other forms of investigative actions for foreign intelligence purposes. (The FISC was established by Congress in the aforementioned FISA.) More importantly, the warrants will allow the rogue federal officers and contractors to increase available financial resources for activities against their innocent victims. 

Needless to say, cellphone calls, texts, emails of victims are monitored. Letters and other missives are intercepted, extracted from, and occasionally inserted into, the victims mail deliveries. Electronic devices to monitor the victims in their own homes are used. Cable television and high speed internet services are weaponized for use as monitoring equipment. The technologies may have changed, but this practice of monitoring resembles that used against Martin Luther King, Jr. when he was, as noted earlier, the target of a federal surveillance and “dirty tricks” program. Yet, far much more, not relayed here, is done along this track. The individual’s personal life, finances, property, could are targeted. Doors will be closed to employment, association with social and professional groups, membership in organizations. Recognition and awards for achievement and excellent will be denied. Family members and friends will also face attacks designed to separate them from the individual or destroy them. Every effort will be made to shun the victim from society.

To gnaw a bit further on the surveillance of a victim, as a standard practice that task is performed through the use of manpower on the street. The personnel of a contractors are used mostly for this purpose. Some are employeed to engage in electronic surveillance.  To use manpower on the street in a very robust way, contractors, albeit errantly, will hire ordinary individuals from the US public to assist them. Greater budgets allowed once FISC warrants are secured mean bigger operations.  That permits exigent hires  For rogue federal officers and contractors greater budgets through innovative ways mean greater wrongful operations,, but also the potential for increased financial gains for them. (In the past, waggish federal officers were sometimes heard to jest that such improper efforts perfectly allowed for the creation of a “second retirement” much better than the one their organizations were going to provide.) C’est comme ça.

It is rarely difficult to find exigent hires willing for usually modest, but sometimes exhorbitant payment–bribes–to zealously engage in surveillance activities and aggressive, even criminal acts at the behest of rogue federal officers and contractors. Most of the exigent hires only understand “spy work” through Hollywood depictions and exciting novels. Most are thrilled to live out “Walter Mitty” fantasies of being a spy as they disrespect, betray and bully the innocent! The ranks of citizen hires are inflated by the exigent employ of permanent and temporary residents, visitors, tourists, and undocumented immigrants as well. The visitor to the US will receive an unforgettable lesson on the meaning and nature of civil rights in the country courtesy of the rogue federal officers and contractors. Whether a citizen or visitor, the hires receive remuneration. Exigent hires are compensated immediately for their wrongful service. The payments are in essence bribes to encourage and to reward their violation of the law. If prospective hires take the unusual step of asking why such surveillance of the victim is necessary, the rogue federal officers and contractors will offer an apocryphal story that may shock, anger, or outrage the prospect concerning the victim, tell outright, ghastly lies about the victim’s character, or conversely set aside any wrongdoing or any threat posed by the victim and convince the hire that anything done will be to the victims benefit! Intriguingly, the latter actually works exceedingly well.

Exigent hires will invariably  approach the surveillance of their innocent victim using the limits of their varied faculties. The results can be atrocious, shocking, and sometimes silly. Exigent hires can often be seen hiding behind pillars, jumping behind cars, and hiding their faces with their hands among a few things. As the vetting of hires is nonexistent, the dysregulated are often employed and they will often vent rage directly at the victim over false reports about them from rogue federal officers and contractors to relieve unbalanced levels of stress and frustration. Occasionally, participation is shamefully impelled not only by remuneration, but by racial, ethnic, religious, and gender prejudice. Those hires will indubitably make their offensive perspectives known to victims when walking by them or loitering near them. Evidence of how they manage racist and otherwise biased hires may offer an indication of whether the rogue federal officers and contractors harbor similar prejudices toward a victim. They can often develop a kinship with such odious individuals. On the odd occasion, one might unexpectedly observe the rogue federal officers and contractors communicating with them in plainview! Those hires surely receive opportunities for contracts and more chances to abuse a victim for payments. There is often a sense great importance and power that conspiring with “secret men” and “secret women” conveys to most hires, this can expectedly lead to hostility, aggression, and violence against an innocent victim.

Since none of the hires employed under these circumstances are not acting against actual officers or operatives of a foreign intelligence service or some other dangerous group, these exigent hires can act with relative impunity against victim. A victim’s response to the hires transgressions must not include acting physically. The rogue federal officers and contractors will use their standing and FISC warrants to ensure local law enforcement will arrest a victim and “friendly” prosecutors will secure fines or sentences against them. Such occurances have indeed been tragedies. Yet, the activities of the rogue federal officers and contractors will not stop even after causing that degree of harm. On s’en fout!

The exigent hiring of “operatives” by rogue federal officers and contractors is not always unsystematic. Some hires are offered contracts to encourage regular service against innocent victims. Often, contract hires are asked rogue federal officers and contractors to log their observations of victims via text or group chat. They often provide the information on what the victim is wearing, the number of the taxi in which the victim is riding, the direction the victim is walking or the activity in which the victim is engaged. (Interestingly, rogue federal officers and contractors always inform their hires of their victims whereabouts, yet they will often insist their hires log their “observations” of the victim by text or group chat. Other than creating activity for the hires, that work amounts to kabuki, hardly serving a useful purpose day-to-day when the rogue federal officers and contractors are watching the victim themselves. Maybe it is more a matter of keeping up appearances.

Some exigent hires are sought out because they are in a position to have opportunities for more than occasional contact with a victim. These “key hires” will,typically be associated with the victim’s personal and professional life, and the victim’s simple daily activities. A short list of such hires would typically include: neighbors; apartment building staff; contractors; locksmiths, municipal civil service workers of all types to include the police and emergency services technicians; dog walkers; taxi cab drivers; car service drivers; barbers; hairstylists; restaurant staff; pizza shop employees; coffee shop staff; street food vendors; conveniance store clerks; department store employees; luxury watch store employees;  supermarket employees; car garage attendants; storage company employees; moving company employees; realty agency staff; funeral directors, movie theater staff, museum staff; performing arts center staff; elementary and secondary school staff; parents of elementary and secondary school students; elementary and secondary school students; visiting professors at nearby universities; sports book authors; content management system employees; bank branch employees; accountants; tax preparers; paralegals; lawyers; medical office administrative staff and technicians; physical therapists; doctors; court house staff; and, judges. (The actions of judges co-opted by the rogue federal offcers and contractors in an US court proceeding against a victim are typically so remarkably corrupt that greatcharlie assures they must be seen to be believed.) It is fascinating to observe just how many individuals are typically made privy to the rogue federal officers and contractors “secret operations” against innocent victims.

Through contact with such key hires, the rogue federal officers and contractors aditionally hope to receive information about the victim through “clandestine conversation”. Usually, they will insist these hires ask victims specific questions about themselves which is most often incongruous with the natter in which they might be normally engaged. The activities of those key hires, along with other hires who have contracts, are controlled through cellphone calls, direct texting, and group chat. Group chat is at the present the most unified way for the rogue federal officers and contractors to assemble and mass their hires to act upon a victim collectively. Essentially, hires are organized for “gang stalking” and out-and-out harassment–bullying. These hires are compensated usually at central locations in the vicinity of their activity: a parked car or a coffee shop.

Interestingly, with warrants from the FISC in hand, rogue federal officers and contractors can also make use of programs created for use by employees of specific service industries to surveil and act against targets of investigations. In New York City for example, a clandestine program–so called a covert program by officials–was developed by federal and local law enforcement and US intelligence services to use taxi cab and car service drivers to surveil and photograph targets when they are on the street and to engage them in clandestine conversations as passengers with the aim of “surreptitiously interrogating” them or passing disinformation to them. Remember, the victims are absolutely innocent, have no special information offer. So, insisting the taxi drivers engage in such a practice, certainly not as training, along with simply using the shed light upon the mental state of the rogue federal officers and contractors. Maybe it is again a matter of keeping up appearances. It is as plain as a pikestaff that the taxi and car service drivers are impelled by pecuniary interest and ego, certainly not intellect. Clearly, most of the drivers take on their “secret work” having received insubstantial educations overseas, possessing a limited vocabulary as English is usually a second language for them, being devoid of sophisticated conversational skills–being tactless, and not knowing what it means to be congenial. One can imagine how awkward, clumsy, and better than annoying their efforts at “clandestine conversations” usually are. Ironically, the drivers must rely upon the politeness and tolerance of the victim to perform their “clandestine” work while lacking any compunction over deceiving a victim or potentially causing them harm.

It might be worth noting that warrants from FISC also allows for the rogue federal officers and contractors to cooperate with members of foreign intelligence and security services of US allies stationed in the US. The officers of some foreign intelligence and security services will make their presence known to victims by behaving overly aggressively, with hostility, and even a threatening them. Indeed, they take on this barbaric posture even against US citizens living in their own country. Officers of somewhat more sophisticated foreign intelligence and security services may make it a point to have an attenuated presence. However, they may deliberately make themselves known if they have been tasked to ask questions of–softly interrogate–the target. Interestingly, that task invariably falls to female officers of the foreign intelligence and security services who, with male colleagues close by, will “noticeably” spend an ordinate amount of time studying the victim before moving in. Such activities fall under the category of transnational repression and are illegal. Foreign intelligence and security services of US allies are surely pleased to receive financial resources from their US counterparts for their cooperation. Warrants from FISC open the financial spigot for such funding. However, what is imaginably most important for the foreign intelligence and security services of US allies who might participate in such activities at the victim’s expense is finding a place for themselves at the “high intelligence roundtable” with the powerful US. Once again, rogue federal officers and contractors more than likely trigger this activity by foreign intelligence and security services stationed inside the US as a matter of keeping up appearances.

Attempts to co-opt a victim’s immediate family members and other relatives are also made by rogue federal officers and contractors. If successful, they will usually forever destroy the victim’s immediate family unit and separate the victim permanently from other relatives. 

The definition of success among the Ancient Greeks was the full use of one’s powers along the lines of excellence. At a minimum, success for the rogue federal officers and contractors against their victims clearly has meant stripping them of anything resembling an ordinary life, completely restricting their liberties in a normal sense by standing between the victims contacts with others, and interfering with any effort to pursue happiness. The whole wrongful process can go on for years or at least as long as the victim lasts. Yet, very often the outcome desired by the rogue federal officers and contractors is far more sinister. The “stress response”, the flight or fight system, is triggered when mind and body are out of balance. When mind and body are out of balance, in stress mode, one is headed for health problems, disease, or breakdown. No organism can stand being in emergency mode all the time. The infliction of daily episodes of gang stalking and harassment can elicit heart disease, heart failure, and psychological disorders. Cases of suicide can also stem from a victims in ability to cope with strains too strong and too alien for “normal living” in an advanced industrial democratic society to countenance. Mere empirical observations of rogue federal officers and contractors actions and the results inflicted upon victims should reasonably assure one that there is not a shred of decency among them. Far more perverse actions are taken against victims. Plainly, the rogue federal officers and contractors have even acted in a variety of ways to cause a victim’s death.

As mentioned, the exigent hires and contract hires of the rogue federal officers and contractors are generally more concerned with how much money they will receive. Typically, hires will hardly notice, or even look to see on their own volition, if the victim were suffering physically or psychologically in some discernible way. As a combination of the hires’ “low-vibrational” character and their receipt of regular abhorrent reports from the rogue federal officers and contractors about the victim usually meant to infuriate their hires or even amuse them, there is generally no empathy shown by hires for the victim. The victim is not recognized as a human being. The victim is seen only as a commodity. Noticeably, hires are quite deliberately directed and bound as a collective through a form of mind control. From the prostitute and drug peddler to the doctor and state court judge, the rogue federal offcers and contractors get their hires to do exactly what they want them to do. The reality is there is no professional side to involving US citizens and so many others in the wrongful–illegal–surveillance and possibly the criminal homicide of anyone, especially an innocent victim. In their own criminal way, the rogue federal officers and contractors are destroying the fabric of the society.

Victims of rogue federal officers and contractors have no voice. The few who would make reports of their maltreatment and entreaties for justice are stifled by the corrupt. Through the use of their standing with law enforcement and judicial systems, FISC warrants, and long exercised technical ways to block a victim’s communications, it is assured that the victim’s pleas will go unheard. Many victims are so despaired by trying and failing to successfully report their mistreatment and circumstances surrounding it that they are led to either very quietly or very publicly self-destruct.

As suggested earlier, it is easy enough for those in the US public who cannot accept corruption and murderous criminality on such great scale among corrupt members of the US security services and their contractors and some will surely to find comforting ways to dismiss it or outrightly rebuke it. Yet, those who would accept this reality may be unwilling to speak against it. The number of other government officials in the organizations who may discover others acting corruptly and may wish to report or to investigate such criminality would be few as the consequences of their detection might be retribution in the form of daily attacks on the job equal or worse than those suffered by the innocent victims.

Leaders of organizations can be changed in response to revelations of wrongdoing at the senior level and within the rank and file. However, a subsequent change in leadership to that could lead to the rejuvenation of such vengeful, aggressive thinking and actions against the previously targeted inedividual found guiltless, incident free will be ordered. The individual’s personal life, finances, property, could once again be targeted. Doors will be closed once again to employment, association with social and professional groups, membership in organizations. Recognition and awards for achievement and excellent once again will be denied. Family members and friends not co-opted by the rogue federal officers and contractors once again will face attacks designed to separate them from the individual or destroy them without fail. Victims will once again be shunned by the society. During the new episode, the most devastating psychological and physiological attacks upon the individuals–by then a few years older and likely less interested in struggling against a tide a wrongdoing–would be launched by authorities with far greater intensity, to achieve their destruction or even deaths through suicide or violence so dearly wanted by others through the original effort. Ironically, the rogue federal officers and contractors who assisted in organizing and managing the individual’s destruction originally, will very likely have retired from their federal security service by then to enjoy the fruits of their wrongdoing. However, others would doubtlessly rush forward to take their place. Où va-t-on à partir de maintenant?

This is in some small part the actual state of affairs for many victims of rogue federal officers and contractors at the moment. It is a whole world invisible to the ordinary citizen. As explained earlier, there is no insistence that anything discussed here be accepted by readers who are unfaniliar with it all. Nevertheless, everything presented is true and can be easily substantiated with the cooperation of honest and thoughtful law enforcement officials. (Note: All that is discussed concerning the mistreatment of citizens by rogue federal officers and contractors is based on the author’s personal experience!) One might suppose that for those who may be interested in how surveillance is conducted on the street level in the US, this discussion may prove instructive. It is unlikely lost upon readers that “one” who might desire to penetrate domestic surveillance activities in the US, not too much would be involved with becoming a “contract hire”. Once onboard as a hire, one would potentially have access to details about the daily surveillance activities of some US intelligence service or law enforcement organization, such as what organization was currently tasked with, who exactly is being targeted, where the target is acting, and who the organization’s street “operatives” are. What could be accomplished by “one”, one in a hypothetical case being a foreign intelligence officer or a team of officers and operatives tasked with the mission of infiltrating surveillance activities of a US intelligence service or law enforcement organization, must be left to the imagination. 

One possibility might be the regular successful “collection” of vital information to protect their country’s foreign intelligence operations inside the US. One can only guess how difficult it would be to launch successful counterintelligence operations against a wily foreign intelligence sserviceoperating inside the US when it knows everyday where its opponent’s officers and operatives are and who and what they are looking at. Perhaps something of the kind is already happening on some scaleg. For that reason, for more than a theory, on-going surveillance operations as discussed here, either sanctioned by authorities or wrongful conducted by the rogue federal officers and contractors, should be immediately rolled up, audited, and assayed. Perhaps doing any of that would be too bothersome. (Curiously, the average individual in the US public may not accept that such wrongful behavior by rogue federal officers and contractors occurs, however foreign intelligence services surely have no doubts about what transpires.) Born Jacques Anatole François Thibault, known as Anatole France (April 16, 1844-October 12, 1924) was a French poet, journalist, and novelist. Considered in his day as the ideal French man of letters. He was awarded the 1921 Nobel Prize in Literature in recognition of his literary achievements. In Le Petit Pierre (1918), ch. XXXIII, he wrote: “De toutes les définitions de l’homme, la plus mauvaise me paraît celle qui en fait un animal raisonnable.” (Of all the ways of defining man, the worst is the one which makes him out to be a rational animal.)

Martin Luther King, Jr. (above). When King was the victim of FBI’s surveillance and harassment under its COINTELPRO operations, he had committed any federal crimes and was not a threat to US national security. He was an innocent US citizen. To that extent, actions taken against him by Intelligence Community organizations once uncovered by the Church Committee were shocking and surprising. In previous times, one might have supposed the understanding, acceptance of what Founding Father’s who authored the US Constitution defined as the unalienable rights of life liberty, and the pursuit of happiness were sacrosanct. However, one might be able to comfortably conclude today that far less importance is given to those rights upon which the country’s soul and existence was once firmly rooted and upon which the US public’s expectation and requirement for the good governance of the democracy has its foundation. What seemed so certain about the once lauded strictures–as a sampling, the Bill of Rights, the first 10 amendmens of the US Constitution–that would guide the country perpetually, is far less sure today. There are laws, but very often justice for the people is much harder to find. Breaches of regulations of the US Intelligence Community against ordinary citizen, not responsible for any wrongdoing, must not only be examined but vigorously pursued.

Seared in the minds of the authors of the US Constitution, the Founding Fathers, were the extraordinary sacrifices made by thousands of Colonists before and during the Revolution. Attendant to that were acts of tyranny leveled upon colonists by authorities in the Kingdom of Great Britain. There was usually much suffering dealt by the British Army to the rebellious in territory controlled by the British Empire. Methods used by the professionals of the British Army for the purpose of assuring the Kingdom’s grip on the Empire’s many lands overseas were tried and true. Given the that, the victory of the American Colonists, with assistance from France, was spectacular and almost supernatural. The tyranny resulting from the imposition of coercive power by the Kingdom of Great Britain was a manifestation of what was intrinsic in mankind: the desire to control others for self-interest. The despotic intrusion of ones will upon another compelled in some. The Bill of Rights, the initial 10 Amendments of the US Constitution are in part responses of the Founding Fathers. to egregious injustices under which Colonists suffered much of which was intended to break any sense of unity among them.

It is greatcharlie’s firm belief that few in the US public–indeed, relative to the size of the population and to include officers of the court–are aware of the contents of the Bill of Rights and their meaning. There is the real possibility that many in the US may have no interest at all in the matter. Rather than simply utter the term, Bill of Rights, which for many may amount to empty words, greatcharlie offers the concisely authored first 10 amendments of the Constitution passed by Congress on September 25, 1789 and ratified on December 15, 1791.

The First Amendment states: “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press, or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”

The Second Amendment states: “A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.”

The Third Amendment states: “No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law.”

The Fourth Amendment states: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

The Fifth Amendment states: “No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb, nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.”

The Sixth Amendment states: “In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed; which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the assistance of counsel for his defense.”

The Seventh Amendment states: “In Suits at common law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved, and no fact tried by a jury shall be otherwise re-examined in any Court of the United States, than according to the rules of the common law.”

The Eighth Amendment states: “Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted.”

The Ninth Amendment states: “The enumeration in the Constitution of certain rights shall not be construed ttho deny or disparage others retained by the people.”

The Tenth Amendment states: “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”

It must be noted that under the Fourteenth Amendment, which concerns civil rights–as well as Senators, Representatives, and the public debt, citizens in the US, born or naturalized, and other individuals living in the US are entitled to equal protection under the law of the US and the State in which they reside and no person shall be. deprived life, liberty, or property, without due process of law under either jurisdiction.

Two centuries after the Bill of Rights were ratified, power can still corrupt. In the country the Founding Fathers constructed, led by a government formed of the people, for the people, and by the people, the aforementioned intrinsic negative impulses in mankind could nevertheless manifest within those who were members of the citizenry themselves. Despite swearing to an oath to support, protect, and defend the US Constitution and the solemn compact between government and the people, various episodes of corruption have taken their place in the country’s history.

Sojourner Truth was a 19th century African-American abolitionist and activist for civil rights, women’s rights, and alcohol temperance. Truth was born into slavery in Swartekill, New York, but escaped with her infant daughter to freedom in 1826. Sojourner Truth is known for saying “The truth is powerful and will prevail.” The truth will “prevail.” That is as may be. However, without some preconcerted, energetic effort to make certain the truth is heard, understood, and accepted by all who are reasonable and rational, it will unlikely have an impression and be unappreciated. Only a precious few open-minded individuals, following the law and holding firm to their beliefs, spiritual or philosophical, will hold firm to the truth.

Reportedly, the writer, professor, political activist, Nobel laureate, and Holocaust survivor, Eli Weisel, once explained God created man because He loves stories: Weisel would cite the Chasidic tale of the Baal Shem Tov. Accordingly, when misfortune threatened his community, Tov would venture into a certain part of the forest to meditate. There he would light a fire and say a special prayer. In consequence, misfortune would be averted miraculously. During a later time of peril, a despondent Rabbi Israel of Rizhyn addressed God as follows: “I am unable to light the fire. I do not know the prayer; I cannot even find the place in the forest. All I can do is to tell the story: this must be sufficient.” It did suffice, and God saved His People. Dum spiro spero. (While I breathe, I hope.)

By Mark Edmond Clark

The Continued Ascent of Dong Jingwei: After  Succeeding at MSS, His Sights Are Now Set on Opponents in Hong Kong

Dong Jingwei (above). Without a doubt, Hong Kong and its future are issues of great concern for People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping and the Party leadership in general. Likely to Xi’s satisfaction, Dong Jingwei is now in firm control of issues concerning protests and conspiracy against the regime and foreign sponsored efforts to orchestrate and sustain resistance in the city. Having pondered Dong’s posting and its responsibilities, greatcharlie has sought in this essay to dive a bit deeper into Dong’s background to better understand him and to meditate on his likely plans to get a handle on Hong Kong. Interestingly, in the photo image above provided by the Guangxi People’s Congress, conspicuously displayed on center of Dong’s jacket (above) is his official name tag. Readers may note, Dong is the only attendee visible in the photo that displayed both a table placard and a name tag to identify himself. While he apparently saw the need for “maximum” identification to assure recognition, Dong at the time of a photo served in the fairly well-known and powerful positions of Vice Minister of the Ministry of State Security (MSS) and the Chief of MSS Counterintelligence.

On July 18, 2023, the People’s Republic of China Ministry of Human Resources and Social Security announced Dong Jingwei was appointed as the central government’s commissioner for the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region. Dong succeeded Zheng Yanxiong was appointed director of the Liaison Office of the of the Central People’s Government in the Hong Kong Special Administrative Region in January 2023. The Office for Safeguarding National Security was established in 2020 just months after China imposed a national security law in the wake of extended pro-democracy and anti-People’s Republic of China government protests that began in 2019. Protests were attended reportedly by as many as half a million people, In 2022, a HK$508 million ($65 million) headquarters building was constructed in Hong Kong for the organization. Zheng was the first director and.a founding member of Dong’s new office. John Lee Ka-chiu was installed as the Chief Executive of Hong Kong Special Administrative Region on July 1, 2022. Upon the announcement of Dong’s appointment, Lee welcomed him in a statement saying Hong Kong “will continue to work and communicate closely” with the Office for Safeguarding National Security as it seeks to fully implement the 2020 law.

Concerning the 2020 national security law, following the Hong Kong protests from 2019 to 2020, the People’s Republic of China imposed it to enable the prosecution of four major crimes, stamping out dissent. Zheng, at that time, pursued dissenters with vigor and was consequently sanctioned by the US for his activities. Of equal concern was the need to eliminate external influences in the form of foreign intelligence services. Beijing reported with conviction that they were entangled in Hong Kong’s protest activities,  providing both funding and direction to pro-democracy and anti-government activists. His extensive background at Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS and working alongside Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (the Ministry of Public Security of the People’s Republic of China) or MPS, in part gave Dong a leg up for selection to the commissioner’s job.  MSS is essentially the People’s Republic of China’s equivalent to the US Central Intelligence Agency (CIA) and is responsible for foreign intelligence worldwide and counterintelligence both abroad and at home. MSS counterintelligence is directly aimed at the infiltration of foreign intelligence and counterintelligence services and the neutralization of their operations. MPS is a sort of dual law enforcement and intelligence service under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS and MPS share the counterintelligence mission for the People’s Republic of China. As national security bureaucracies, both organizations are organized under the State Council of the People’s Republic of China Central Committee of the Communist Party of China, but both have settled lines to the highest realms of power into the Party. Very likely, it was Dong’s successes against foreign intelligence networks and operatives on the mainland in particular as the Chief of MSS Counterintelligence that also caused him to stand out of the best choice.

Interestingly, official sources on Dong’s appointment were especially frugal with their information about his intelligence background, never mentioning his very accomplished previous post as the Chief of MSS Counterintelligence. At the time of the announcement of Dong’s appointment, a representative for the Hong Kong government did not immediately respond to a request for comment on Dong’s appointment, including his past experiences at MSS. The China Daily only went as far to state Dong was the director of the political department of the MSS from 2017 to 2018, according to a resume published on the website of the China Law Society, of which he is vice president. It added the he previously served as director of the Hebei Provincial Department of State Security from 2006 to 2017. Omne ignotem pro magnifico. (Everything unknown is magnificent.) 

Without a doubt, Hong Kong and its future are issues of great concern for People’s Republic of China President and Communist Party of China Secretary Xi Jinping and the Communist Party of China’s leadership in general. To what is likely Xi’s satisfaction, Dong is now handling of issues in the city concerning protests and conspiracy against the regime and foreign sponsored efforts to orchestrate and sustain such resistance. In this essay, greatcharlie has sought in this essay to dive a bit deeper into Dong’s background, to include apparent safeguards taken for his security and what may have been external efforts against him, and what he may have in mind for quelling the threat posed by the People’s Republic of China’s opponents’ in Hong Kong. Thoughts are offered not only on decisions he has likely made but also on decisions he may likely make in the immediate future to shape events. Dong may have reason to believe the national security situation in Hong Kong may soon turn considerably in the Communist Party of China’s favor. This essay is relatively brief and could hardly have squeezed issues dry so to speak and put one in the full picture of regarding Dong’s thinking. However, the hope is that greatcharlie’s ideas and insights may lead readers, hopefully to include some practitioners in the field of foreign and national security policy analysis and decisionmaking, to develop new lines of thought on how to proceed concerning this pressing issue. Luce sunt clariora tua concilia omnia. (All your advice is clearer than the light.)

Before July 2021, this photo image of Dong Jingwei (above) was accepted by greatcharlie as authentic. As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. Dong is a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises. In attempting to ascribe certain traits to Dong given his role at MSS, those considered by greatcharlie may appear to be mere abstractions. However, among the few traits listed should be a reliable intuition, further honed when at MSS he coped with challenges posed by foreign opponents. It may have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions of managers within the intelligence services of opponents.

Things To Know about Dong

As reported by greatcharlie in its June 30, 2021 post entitled, “The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax”, Dong was born on November 18, 1965. At the time of this writing, he is 59 years old. In the People’s Republic of China, it would be of some significance to note that he is of Han nationality. As for his studies, he earned a master of science degree. The only publicly reported member of Dong’s family is his daughter, Yang–also known as Dong HuaHua on social media, She is the ex-wife of Jiang Fan, who at the time was an Alibaba executive, heading the company’s e-commerce platforms, Tmall and Taobao.

Suffice it to say Dong is a member of the Communist Party of China. Highlights of his career include service as the Secretary of the Party Committee and Director of the State Security Department of Hebei Province from 2006 to 2017. He served as Director of the Pokitical Department of the Ministry of State Security from 2017 to 2018. He eventually became a Member of the Party Committee and Vice Minister of the Ministry of State Security and the Chief of MSS Counterintelligence. It was noted in the July 24, 2015 edition of Intelligence Online that Dong’s direction of the State Security Department in Guo’anbu in the Hebei Province was significant for him as that province has reportedly produced many of Xi’s “securocrats.” Loyalty to superiors, age, and regional background apparently put him in good standing with senior party officials under Xi. One could probably safely mention reliability and discretion. By 2015, Dong reportedly became part of the “Xi Jinping Clique”, one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles and accolades provided to Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

Further concerning the MSS, as briefly noted earlier, it is an intelligence service responsible for foreign intelligence, counterintelligence, and internal security as well. To go a bit deeper, its impact stems mainly from providing consumers in Beijing to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, and ministers and senior executives of appropriate ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their foreign and national security policy decisions. The People’s Republic of China’s intelligence services and law enforcement organizations have had considerable success in destroying the networks and intercepting the intelligence officers and operatives of foreign intelligence services operating in their country. Dong surely would had a considerable role in the interception and neutralization of those foreign an local actors. Whatever may have been put in place to ensure those foreign intelligence services networks would not be rejuvenated or replaced in some form has successfully mitigated such efforts. Dong surely had a considerable role in creating such a defense to foreign opponents aims and efforts as well. It would stand to reason that whatever Dong organized while at MSS to hold back the People’s Republic of China’s opponents surely could have been recognized by results as being strong enough, sustainable enough, to allow him to advance to his new position in Hong Kong.

Very likely from the view of the Communist Party of China’s leadership, Dong was much deserving of promotion and greater authority, and should not be held down indefinitely in the MSS as counterintelligence chief. Such has not been an obvious choice for national authorities in many countries to make about an individuals such as Dong. In foreign and national security policy bureaucracies in many countries, individuals such as Dong have been kept in place when they have exhibited great skill and seemingly unique capabilities in their jobs. For instance, Alexander Bortnikov has stood as Director of Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB since 2008. During the Cold War, CIA executive, James Angleton held his position as chief of counterintelligence from 1954 to 1975. Further, in the broader sense of counterintelligence as being a element of law enforcement, J. Edgar Hoover led the US Federal Bureau of Investigation from 1924 until 1972.

Dong achieved great success at MSS primarily under the leadersip of its director, Chen Winqing. Apparently, they had an good working relationship  Dong assured for Chen Winqing that MSS would have solid one-two punch against opponents via foreign espionage and counterintelligence. However, through a decision made at the 20th National Congress of the Communist Party of China, on October 28, 2022, Chen Winqing was named Party Secretary of the Central Political and Legal Affairs Commission, overseeing national security and intelligence. He was additionally made a member of the Communist Party of China’s 24-member Politburo. On October 30, 2022, Chen Yixin was officially appointed by the Standing Committee of the National People’s Congress as his successor at MSS.

The Central Political and Legal Affairs Commission is the Communist Party of China’s highest security body and oversees all legal enforcement agencies, including the police force. As it concerned his preceding service at MSS with Dong at his side, Chen Winqing’s 2022 appointment more importantly placed him in charge of the People’s Republic of China’s national security and intelligence systems. It was only a few months later did Dong receive his opportunity to advance to the national security position in Hong Kong.

It is unclear why Dong did not simply receive to the top job as Minister of the MSS. However, it seems having Dong simply replace Chen Winqing was not likely viewed as the answer at any point. It was likely accepted by decisionmakers that it would be best to promote Dong to a duty of great importance and requiring immediate results that few could handle successfully. The position would require him to immerse himself on critical, exigent, and defined issues and not “just manage” MSS with its broad purview, although he most likely could have performed the top job there well, too. To that extent, Communist Party of China authorities, to include his former chief, Chen Winqing, obviously felt the best choice was to appoint a counterintelligence manager, a spymaster, a blood hound for a spycatcher as Dong to Hong Kong.

Notably, Dong’s appointment was confirmed only after a revamping of the Hong Kong and Macau Affairs Office (HKMAO). The HKMAO is an administrative organization  of the Central Committee of the Communist Party of China and the The State Council of the People’s Republic of China. Dong’s organization with its security role sits under the HKMAO.

This photo image of Dong Jingwei (above) was posted on Wikipedia website at the time greatcharlie wrote its June 2021 essay about his alleged defection. It has since been removed. The public in the People’s Republic of China and the world will never get to see a true photo image of Dong. Perchance the fact that there are discrepancies in those photo images leaves room open for the supposition that the latest official image popularly displayed in the local newsmedia in Hong Kong and beyond may indicate a desire by Beijing authorities or by the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region to furnish a false clue as to the spymaster’s true identity. For whatever reason, the use of varied photo images may be a national security requirement set for Dong by Chen Winqing and the Central Political and Legal Affairs Commission. It also ostensibly gives the impression that in official foreign and national security policy circles in Beijing and Hong Kong, and particularly in the Communist Party of China, that Dong holds a place of importance to them which surpasses that of any ordinary civil servant posted to the region. To gnaw just a bit further, the use of alternative images of Dong may tindicate the use of decoys is a more commonly used practice by the People’s Republic of China’s foreign intelligence and counterintelligence services than anyone outside of the country might have imagined. Surely, the sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. Mentioned in theis essay in the use of an alias by Sun Qingye, one of Dong’s senior deputies in Hong Kong.

The Photo Image Discrepancy

As the two images have far more similar features of the official than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. To support greatcharlie’s discussion on the discrepancies in the two popular photo images of Dong, two are used, and discussed  briefly within captions of this post. The discrepancies in the two photo images was covered in somewhat ample detail in greatcharlie’s July 15, 2021 post entitled, “”Commentary: Will the Real Dong Jingwei Please Stand Up?: Comparing Features of Popular Images of People’s Republic of China’s MSS Vice Minister”. However, it is not greatcharlie’s intention to re-visit the discussion on the issue of the variance in Dong’s images here

There remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case, then in the possible effort to conceal his identity, Dong has done the thing completely. The two photographs focused upon here will continue to be published perhaps until another plausible image, or perchance another two or more, of Dong surface at some time and via some source of Beijing’s choosing.

As the two images have far more similar features than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. Of the two different photo images, one may actually be Dong.

Suffice it to say as discussed in some greater detail in greatcharlie’s July 15, 2021 post, the idea of a director, senior executive, or key operations manager of an intelligence service taking steps to conceal his or her identity would not be unique in the annals of secret intelligence. Turning to a handful of examples, in greatcharlie’s November 13, 2019 post entitled, “Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997),” it was explained that Markus Wolf, chief of the foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA of the erstwhile Deutsch Demokratische Republik (German Democratic Republic) or GDR, lived a life in relative obscurity, brilliantly concealing his presence and the footprint of his organization as both operated against the West. His memoir’s title, Man without a Face, was a direct reference to the fact that at one point, Western intelligence services only had a blurred photograph of Wolf while he attended the Nuremberg Trials from which elements within the CIA managed to identify him in 1959. Unable to collect an up-to-date photograph from which to identify Wolf afterward, for a long-time he was referred to among Western intelligence services as the “man without a face.” As the story goes, only after a GDR defector, Werner Stiller, identified Wolf in a photograph in 1979 for the counterintelligence element of West Germany’s Bundesamt für Verfassungsschutz (Office for the Protection of the Constitution) or BfV did that change. The photograph of Wolf was captured by Säpo, Sweden’s National Security Service, during a visit he made with his wife to Stockholm in 1978.

At the time Stephen Dorril wrote his authoritative book, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000), Richard Dearlove, then head of the United Kingdom’s Secret Intelligence Service–colloquially known as M16–was virtually unknown. A contemporary photograph was not published in the newsmedia. According to a BBC report, when Stella Rimington in 1992 was named the first female chief of the United Kingdom’s Security Service–known colloquially as MI5–her neighbors finally discovered what she did. Even her children learned of true occupation for the first time. No official photographs accompanied her name at that time. However, later, official photos of her were provided after photographers managed to take what was described as “a very blurry picture of her out shopping.” Petit rusé, petit malin!

Interesting also is the fact that Sun Qingye, a deputy head of the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region, has a background in MSS. More directly, he served in the China International Cultural Exchange Center. When he assume his post in Hong Kong, in July 2020, Sun used the alias “Sun Winqing”.

The public of the People’s Republic of China and the world may never get to see a true photo image of Dong. Perchance the fact that there are discrepancies in those photo images leaves room open for the supposition that the latest official image popularly displayed in the local newsmedia in Hong Kong and beyond may indicate a desire by Beijing authorities or by the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region to furnish a false clue as to the spymaster’s true identity. For whatever reason, the use of varied photo images may be a national security requirement set for Dong by Chen Winqing and the Central Political and Legal Affairs Commission. It also ostensibly gives the impression that in official foreign and national security policy circles in Beijing and Hong Kong, and particularly in the Communist Party of China, that Dong holds a special place for them which surpasses that of any ordinary civil servant posted to the region. To gnaw just a bit further, the use of alternative images of Dong may tindicate the use of decoys is a more commonly used practice by the People’s Republic of China’s foreign intelligence and counterintelligence services than anyone outside of the country might have imagined. Surely, the sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. Recall the aforementioned note on the use of an alias by Sun Qingye, one of Dong’s senior deputies in Hong Kong.

Admittedly, greatcharlie lacks any information that would allow it to judge which photograph holds Dong’s true image. As promised, greatcharlie has only sought to parse out a few possibilities here. What is presented are simply perceptions based on observations made of less than a handful of photographs. Certainly in China, there are more than a few people in the MSS, MPS, the State Council, and the Communist Party of China who know exactly what Dong looks like and which of the two photographs, if either, depicts him. It may very well be that the causaliy for the use of mixed images of Dong is based on an effort to increase security. However, just as greatcharlie, a nonpracticioner, “amateur sleuthhound”–as one reader sardonically  referred to the editor–has examined two reported images of Dong in photographs, Expert, professional analysts in US intelligence services and those of foreign intelligence services allied with the US have doubtlessly examined all of the photographs available that purportedly include Dong using Artificial Intelligence and other advanced technologies, and have reached to their own conclusions. Thus, despite any possible efforts to conceal Dong’s identity, they likely have a fair idea of how he looks, too!

In the end, Dong’s work product will tell volumes about the individual and indicate his presence. Certainly, even if business as usual to date is the best foreign intelligence services may have offer to retain a handle on Hong Kong, with Dong on the beat, they will have to find answers where currently there may be none to simply maintain their grip, big or small, on the situation.

The Defection Rumor

Rumors of the alleged defection of Dong Jingwei, a vice minister of MSS were the subject of intense discussion worldwide, but especially in the US newsmedia and social media in June 2021. The singular story was previously discussed in greatcharlie’s June 30, 2021 post entitled, “The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax”. Assuredly, as with its July 15, 2021 post regarding Dong’s photo images, there is no intention by greatcharlie to simply rehash in detail territory that it has well-trampled. The aim is to explore a bit deeper for readers.

Allegedly, Dong fled the People’s Republic of China in February 2021 and handed himself over to US intelligence officials. Dong would have been one of the highest-ranking officers from People’s Republic of China’s Intelligence Community, and the Chinese government in general ever to defect to the US. Yet, alas, the rumored defection never occurred.

As reasoned by greatcharlie in its June 2021 post, the nature of the man or woman who would be able to serve as the chief of MSS counterintelligence, it indicated that is was hard to form a mental picture of Dong and how he of all people could had defected to the US, with his daughter in-tow no less. It is harder to envision who among those with any knowledge of the People’s Republic of China government and the national security apparatus would believe, Dong would ever consider defecting to the US no matter what the circumstances may be within the Communist Party of China or in his personal life. One could imagine Dong would be a deadender, sticking with the Party and his country until the rattle. It is also difficult to imagine what individual, organization, or professional organization gave the rumor its wings. Equally hard is understanding how those who ignited the rumor of Dong’s defection intended to benefit from its formulation and promotion. There was always the possibility–though there are absolutely zero newsmedia reports anywhere that suggested some proceeding mental health episode had befallen him–that Dong hypothetically could have been overwhelmed by some cacoethes. Yet again, the defection never happened.

There may be something to learn concerning how such a bold lie took public form. Among those who reported on the defection, there was general acceptance of the sequence of events. The defection scheme as laid out was indeed mad-capped. Dong allegedly defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. Dong supposedly provided the US government with information about the Wuhan Institute of Virology that allegedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. According to Han Lianchao, a former People’s Republic of China Ministry of Foreign Affairs official who defected in the wake of the Tiananmen Square massacre, Dong’s defection was raised by then Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and then People’s Republic of China Foreign Minister Wang Yi at the US-China Summit in Anchorage, Alaska in March 2021. On June 16, 2021, Han, citing an anonymous source, alleged that in Anchorage, Yang and Wang demanded that the US return Dong to China, but US Secretary of State Anthony Blinken refused. Subsequent reports, coupled with analyses by China specialists continued as Dong’s precise whereabouts remained unknown. Speculation had even reached Chinese social media threads after Dong had not been seen or photographed for several weeks.

Inferred from the odd choice to promote newsmedia stories of a defection was the potential confusion and chaos that might have been created in the minds of MSS, MPS, and People’s Libération Army’s Intelligence Bureau officers operating in the US and in the confines oF US interests overseas. The implications of such a breach in security would have been enormous. Information mined from such a highly positioned executive and director of MSS through interview, and potentially coercive interrogation, could result in the identification of officers, managers and their operatives, the exposing of netwirks, and collective information on sensitive operations conducted in the past and being performed at the moment

Rather than having a deletorious effect on the psyche of such officers, as well as their operations, the move uncovered the fact that they would hardly shrink at the last. In the worst cases scenario for the People’s Republic of China, Dong would have likely been quickly replaced under such circumstances. They as intelligence officers had accepte# the risk that there could the unexpected, things could go terribly wrong in the field. They had to prepare themselves for before travelling to the US or elsewhere.

Nothing about the tricky step would indicate a path upward to strengthen counterintelligence efforts against the People’s Republic of China’s espionage in the US. The People’s Republic of China’s Intelligence services have been steady in the approach to their work. Conceivably, the dismal failure of the suspected psychological operation would embolden if not the People’s Republic of China, but other foreign intelligence services to take bolder steps the Breach US security and ignite recruitment and espionage operations of audacity and  of an extent never considered in the past elsewhere.

Within the foreign and national security bureaucracies in Beijing, the assessment may likely have been that finding itself bereft of ideas, the choice was made by some foreign intelligence service or counterintelligence service to use a gimmick, a deception, a dangle if any specific response or individual were to be caught in a trap. It was likely assessed that the source was a Western counterintelligence service, perhaps one in Washington. 

As a friendly suggestion from a humble observer, it might be best for foreign counterintelligence services to refrain from engaging in such “poorly calculated” and “poorly calibrated” disinformation operations, if one of them was indeed involved in the Dong Jingwei defection hoax. Such action would appear to have the effect of emboldening People’s Republic of China intelligence officers operating overseas. If foreign counterintelligence services might insist upon adding to the chronicle of wasted time, perhaps one of them could send a large, ultra-high altitude balloon over the People’s Republic of China. Surely, it would mimic Beijing’s own actions throughout January and February of 2023. Still, one could imagine that a balloon as such, blithely passing over the country, would at least garner the attention of, and some discernible reaction from, a few officials of the security services there. (It remains difficult for greatcharlie to understand why the People’s Republic of China’s high-altitude balloons were not colored red if not to represent the Communist Movement then for artistic reasons: “Le Ballon Rouge” (1956). In leaving the balloons colorless, perhaps the aim was once again deception. Ostensibly, they could have been any country’s big balloons.) Einen Vogel haben!

This photo image of Dong Jingwei was posted on Twitter on June 16, 2021 by the US based, Chinese pro-democracy activist, Han Lianchao. In the tweet Han discusses how he came upon a rumor from an associate that Dong had defected to the US. If readers could pardon greatcharlie’s frankness, and not to disparage Han’s efforts, but as the rumor in the tweet was false, perhaps the photo that accompanied the tweet was a false image of Dong, too! In the rather diminutive space of Hong Kong–relative to mainland, Dong may be able to once and for all destroy all inroads made by foreign intelligence services. It will be more than a chess piece battle. Dong’s hope appears to be obviating all future possibilities for funding, providing information, and directing protest actions as the governments in Hong Kong and Beijing suggest were organized in 2019 and 2020. Lessons learned in successfully destroying foreign intelligence networks in mainland China will very likely serve as the basis to develop new and far more effective and  efficient tactics, techniques, procedures, and methods best suited for Hong Kong. Successful work by Dong could potentially improve the chances for the Communist Party of China to bring Hong Kong more peacefully back into its fold earlier than it might have envisioned.

Dong as a Threat to Activists and Foreign Intelligence Service Secreted in Hong Kong

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. Dong is a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

In attempting to ascribe certain traits to Dong given his role at MSS, some considered by greatcharlie may appear to be mere abstractions. Among the traits it feels should be listed is a reliable intuition. His intuition was surely exercised when at MSS he handled challenging problems posed by foreign opponents. It may very well have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions of managers within the intelligence services of opponents. Perchance the same trait likely assisted Dong in successfully navigating to the top rung of the People’s Republic of China’s national security apparatus and to perform well at the side of leaders of the Communist Party of China.

Unt desint vires tamen est laudanda. (Even if it is beyond one’s power, the will [to try] is worthy of praise.) If foreign intelligence services are doing their jobs well in Hong Kong, it is almost assured that intelligence officers, their operatives and informants, covert sites, and clandestine lines of communication are well-ensconced in the city. Certainly from the Communist Party of China’s perspective, all foreign intelligence operations in the city are ready to be cracked. As of this writing, Dong has held his new position for nearly six months. Imaginably, in the initial phase of whatever Dong hopes to do, he and his managers will study the problem afresh ad nauseum and mine through existing information collected until with some assurance he can strike with speed, surprise, and–again from the Communist Party of China’s perspective–in some cases, lethality. He would very likely hope that his first big operation against his opponents would have a strong educational effect on them. However, foreign intelligence services would unlikely leave their operations open to defeat with one decisive blow. After all, they likely learned lessons from their intelligence disasters on the mainland.

On October 1, 2023, on the blog of the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region, Dong expressed a philosophical perspective on what his office’s work would entail. In brief, he stated: “The central government has built a comprehensive legislative and enforcement mechanism for the SAR to safeguard national safety, introducing the law, which had provided a solid security guarantee for the long-term prosperity, and started a new era for one country, two systems.” He proffered that Hong Kong has been transformed from chaos to order and was advancing from stability to prosperity but still faced risks and challenges in maintaining long-term prosperity. To help the city along that path, Dong stated that his office will use Xi’s thoughts on socialism with Chinese characteristics in the new era as guidance. That would include upholding a holistic view of national security to implement one country, two systems. He declared: “[The office] will work with the committee for safeguarding national security of the HKSAR and relevant departments, to deeply implement the national security law in Hong Kong, combat all acts that endanger national security, and safeguard national sovereignty, security, and development interests of the country.” Expressing a holistic view, Dong said that he hoped various sectors of Hong Kong could support the work, strengthen the awareness, and “jointly build a solid dam” of safeguarding national security, to “promote a greater role for Hong Kong in building a great country and rejuvenation of the nation.”

However, before October 2023, Dong spoke more plainly about the counterintelligence task ahead in his country. At the aforementioned 2021 seminar on a counter-espionage regulation, Dong, then an MSS vice minister, spoke plainly about the counterintelligence task in his country. He explained they must catch spies as well as the funders working behind the scenes who carry out anti-China activities, according to the ministry’s summary of the meeting. Two months later, according to an online report by People’s Republic of China’ Central Political and Legal Affairs Commission, Dong held a press conference and stated the national security departments had “mobilised all forces in the society for a people’s war against spies.” According to the Central Political and Legal Affairs Commission’s website, Dong told reporters, “We insist on catching both the foreign spies as well as the hidden traitors.” He added: “We are determined to adopt powerful approaches in order to resolutely safeguard state sovereignty, security and development interests.”

What Will Dong Do?

In Hong Kong’s very crowded and rather diminutive space–relative to mainland, Dong may have a better chance to once and for all destroy all inroads made by foreign intelligence services there. However, it will be no mean feat and much more than a chess piece battle. Dong’s hopes may be to obviate all future possibilities for foreign intelligence services to fund, providing information to, and direct protest actions. One could infere from statement from the governments in Hong Kong and Beijing that they were convinced foreign intelligence services played a role in organizing the protests in 2019 and 2020. How Hong Kong and Beijing came across such information has never been made clear publicly. No clear and convincing evidence of the presence and interference of foreign intelligence services has been put forth. Perhaps the information was gleaned as a result of interviews and interrogations of both detained and arrested Hong Kong activists. Perhaps one of the overseas stations of the People’s Republic of China”s foreign intelligence services was able to secure information about an opponent’s foreign intelligence operations in Hong Kong. In any event, lessons learned through the successful destruction of foreign intelligence networks in mainland China will very likely serve as the basis to develop new and far more effective and efficient tactics, techniques, procedures, and methods best suited for Hong Kong. Despite the stated desire in Beijing to a policy of one country, two systems, successful work by Dong could potentially improve the chances for the Communist Party of China to bring Hong Kong peacefully into its fold politically.

The whole world watched in 2019 and 2020 via broadcast newsmedia and online sources, thousands of people rushed to the streets of Hong Kong to call for greater freedoms and more autonomy from mainland China. Not just governments but ordinary observers everywhere noticed the protests, commonly known as the Anti-extradition Protests, were well-organized and well-orchestrated. Apparently, Beijing was actually unnerved by the spectacle. Its reaction to it all was quite different from that toward the 2014 Umbrella Movement and the 2016 Mong Kok Unrest. As part its legal response, Beijing imposed an overarching national security law in 2020, equally effective in Hong Kong, to punish four major crimes: secession, subversion, terrorism and collusion with foreign organizations. The offenses carried sentences up to life in prison. Under the 2020 law, People’s Republic of China security service officers were for the first time allowed to openly operate in the city unbound by local laws. The law also allows for suspects to be extradited to the justice system on the mainland. An estimated 260 people have been arrested and 79 convicted under the law, including dozens of Hong Kong’s most prominent democratic politicians and activists.

Under Hong Kong’s mini-constitution, the Basic Law, the Central People’s Government in the Hong Kong Special Administrative Region is required to implement its own national security law. Once enacted, law known as Article 23, most likely would prohibit not just four, but rather seven offenses in the city: treason; secession; sedition; subversion against the central government; theft of state secrets; the conduct of political activities by “foreign organizations”; and, the forming of ties between local organizations with foreign organizations. As of this writing, the city’s government is reportedly continuing to develop effective legislative options and will have its own law in 2024. La patience, la persévérance et la perspiration forment une combinaison imbattable pour le succès.

Yet, seemingly foremost in minds of most in Hong Kong at the moment of Dong’s posting to the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region was talk about eight pro-democracy activists who fled abroad to evade national security charges. The story has been extensively covered in local newsmedia reports developed local and to a smaller extent within the international newsmedia. Of such great interest is the story that it shared coverage with Dong’s appointment. In July 2023, the city’s Chief Executive, Lee, pledged a lifetime of police pursuit for the eight fugitives. In support of that pledge, Hong Kong authorities have put a HK$1 million bounty on each of them. 

One might have expected that the flight of the eight fugitives normally would have been a matter best investigated by the city’s main law enforcement organization, Xiānggǎng Jǐngwùchù (the Hong Kong Police Force) or HKPF. HKPF is the primary law enforcement, investigative agency, and uniformed force in the city. Much as MPS officers, HKPF investigators would be authorized to travel outside of the city to track down fugitives as a uniform course of action. Typically, to support those efforts, HKPF would make use of the resources of the International Criminal Police Organization (INTERPOL) and national, provincial, and locally police forces worldwide. For the MPS, a huge benefit of such cooperation as essentially a matter of procedure has been the INTERPOL “Red Notice”. INTERPOL defines a Red Notice as “a request to law enforcement worldwide to locate and provisionally arrest a person pending extradition, surrender, or similar legal action. A Red Notice is not an international arrest warrant. The individuals are wanted by the requesting member country, or international tribunal.” However, the “forced repatriation” of the eight fugitives would be handled under standard operating procedure by the HKPF. The “forced repatriation” of the eight fugitives would not be looked upon in a similar way to the cases of thousands who absconded from the People’s Republic of China and were returned under the MPS’s Operation Fox Hunt and Operation Sky Net.

Reading and hearing reports from the local reporters and commentators, it seemed almost certain that interested authorities in Hong Kong and Beijing, in the name of providing justice, would insist that Dong run down the rabbit hole of pursuing the eight fugitives. The case of the eight fugitives indeed achieved such prominence as a national security matter that it rose to a level of importance requiring the “full” attention” of Dong’s new office. Subsequently, a “good number” of its investigators were surely dedicated to the puzzle. (It is the best “figure” greatcharlie can come up with in the abstract.)

Certainly, Dong would have been very satisfied with tracking down the fugitives so early in the game. Their capture would certainly make quite a splash for the newsmedia and a feather in Dong’s cap. He surely will not hesitate to have the national security police detain pro-democracy activists, former opposition politicians and journalists under national security law. However, chasing down the eight fugitives who are now essentially smaller actors on the larger stage of foreign inspired and supported activities to destabilize the Central People’s Government in the Hong Kong Special Administrative Region would hardly be a matter upon which Dong would prefer to focus. 

Directly on the matter from his first day, it very likely would have viewed as most important by Dong to study and make strong and ample observations on the pattern of activities, contacts, communications, and external influences, that allowed for the popularized “eight fugitives” to slip away That, as a start, would have assisted him in understanding how it was established and eventually shutting down the network that facilitated their actions and shutting down other networks that were in place. Such work would likely include to use of the latest technology advances in electronic surveillance developed in the People’s Republic of China. Some innovative combined use of existing technologies and manpower may provide a surprising new wrinkle to Dong’s counterintelligence effort in the city. Dimidium facti qui coepit habet. (Half is done when the beginning is done.)

Still, that work would hardly have diverted Dong’s focus on what has been professed as the bigger picture of the activities of foreign intelligence services and their varied contacts in Hong Kong for the past six months. As aforementioned, Dong’s tacitly declared the objective of People’s Republic of China’s counterintelligence efforts is not just to frustrate, seriously inconvenience, or hamper efforts by foreign intelligence service, but rather, to destroy them completely. That is a priority. Utilizing what he may likely uncover from his studies and observations of the activities of pro-democracy activists, former opposition politicians, journalists, and other elements, as well as using what the People’s Republic of China”s foreign intelligence services might collect about foreign intelligence operations in Hong Kong from their overseas stations, he would likely develop a strategy to level a decisive blow against his opponents. What would put him on track would be the successful identification of foreign intelligence officers operating in Hong Kong. From that point, he could monitor their efforts to: create clandestine linkages with pro-democracy activists, former opposition politicians and journalists; recruit and run operatives and informants in the city; and, develop multiple, sustainable, networks of operatives and informants there. Ostensibly, Dong would look in those particular directions as he would expect foreign intelligence services by tradecraft to take steps in those same directions. Les petits ruisseaux font les grandes rivières.

Dong in uniform (above) while serving in his previous post as Vice Minister for State Security. Dong once declared the objective of People’s Republic of China’s counterintelligence efforts is not just to frustrate, seriously inconvenience, or hamper efforts by foreign intelligence service, but rather, to destroy them completely. That is a priority. Utilizing what he may likely uncover from his studies and observations of the activities of pro-democracy activists, former opposition politicians, journalists, and other elements in Hong Kong, as well as using what the People’s Republic of China”s foreign intelligence services might collect about foreign operations in Hong Kong from their overseas stations, he would likely develop a strategy to level a decisive blow against his opponents.

The Way Forward

Out of academic interest, one might consider in the abstract that rather than being the former fount of acumen and success at MSS counterintelligence, Dong may have merely been the benefactor of the excellent work of bright and capable members of his team. If so, it might account for any decision revealed that he brought members of his MSS counterintelligence team in Beijing with him to Hong Kong. Of course, if he did take a few with him that may not at all have been his reason for doing so. In any event, whether Dong succeeds or suffers shipwreck in Hong Kong will truly tell if he is Communism’s greatest spymaster, albeit post-Cold War. With some hesitancy, greatcharlie is willing to go out on an attenuated thread, likely to the disagreement and dismay of some foreign intelligence services–if its humble opinion is of interest to members of any of them, and state Dong is the real deal!

As it is now likely been the case, managers of foreign intelligence services and counterintelligence services responsible for Hong Kong as well as the People’s Republic of China may now wake up in the morning wondering: “We know Dong has been doing something. What could that  possibly be?” They would want to avoid chasing shadows, but they would want to find out, peering into figurative darkness, if Dong is “getting close.” Putting Dong and his clandestine operations in the spotlight would seem the best way to concentrate resources and talent on thwarting him. However, until enough of his organization’s clandestine counterintelligence steps in Hong Kong are identified and studied, some pattern of its activities in the city takes shape, and its efforts become predictable to a sufficient degree–if any of that ever happens–that task will not be so easy. Sine ira et  studio. (Without animosity, without favoritism.)

Ruminations on the Russian Federation’s Failure To Close the Door in Western Ukraine to Foreign Military Assistance as Part of Its Invasion Plan

US airmen and marines (above) load M777 artillery pieces marked for delivery to the Ukrainian Armed Forces on an US Air Force transport plane. Many weapon systems sent into Ukraine have had a multiplier effect on the battlefield. Firepower in the form of multiple launch rocket systems, self-propelled artillery, and heavy caliber guns, transported possibly along the now heavily traveled supply lines from both Poland and Romania enabled the Ukrainian Armed Forces to launch two highly-successful counteroffensives. Presented here are some ruminations on Russia’s failure to initially shut the door to the massive levels of military assistance to the Ukrainian Armed Forces from the US, other NATO Member States and the EU via Poland, Slovakia, Hungary, and Romania. Emphasis is placed on the likely reasons why Russia went into Ukraine militarily without addressing the potential impact of Western resupply of Ukrainian forces. To that extent, issues considered include: whether the Russian Federation General Staff was responsible for this considerable delinquency or was the Kremlin near criminally remiss for not heeding likely recommendations of the military chiefs and their war planners.

Intriguingly, Russian Federation President Vladimir Putin launched the Ukraine War lacking a strategy that took into consideration of what Vooruzhonnije Síly Rossíyskoj Federátsii (the Armed Forces of the Russian Federation, hereinafter referred to as the Russian Federation Armed Forces) would come up against. What was seemingly completely missed or misunderstood was the degree of support from the US and NATO Member States that Kyiv would receive. No effort, that was apparent, was made to obviate the ability of the US and its NATO allies to supply Ukraine at will as part of the military strategy. From the start, conquering Kyiv was the focus as if Putin, his foreign and national security policy team at the Kremlin, and his senior commanders in the Russian Federation Armed Forces. Perhaps, for Putin, the conquest of Ukraine was a dream on which he could feast his imagination. That was at least until the matter was reduced to reality. If one might think of Putin at all as a rational actor, it would seem Putin has painted himself into a corner. That is quite unlike Putin. Some might say that after all the years of accomplishments and successes, and all the experience, he was bound to make one big mistake. It is a real head rubber.

Presented here are some ruminations on Russia’s failure to initially shut the door to the massive levels of military assistance to the Ukrainian Armed Forces from the US, other NATO Member States and the EU via Poland, Slovakia, Hungary, and Romania. Emphasis is placed on the likely reasons why Russia went into Ukraine militarily without addressing the potential impact of Western resupply of Ukrainian forces. To that extent, issues considered include: whether the Russian Federation General Staff was responsible for this considerable delinquency or was the Kremlin near criminally remiss for not heeding the recommendations of the military chiefs and their war planners; whether the door was left wide open between Poland Slovakia, Hungary, and Romania with Ukraine because they were hamstrung by Putin’s concept that a successful “lighting strike in Ukraine” could be achieved even though the idea was apparently developed in the abstract; and, whether they had little choice but to acquiesce to the manifestations of Putin’s sense of vulnerability over Ukraine’s close ties to the US, the EU, and NATO. Unless one was actually behind closed doors of conference rooms in the Kremlin and the national security bureaucracies in Moscow, or “reading someone’s mail,” one cannot know for certain how the decision concerning resupply from western Ukraine was made or maybe not made. The best informed guess would inevitably be an interpretation. While “ruminating”, greatcharlie sought to stay grounded within the realm of what would actually be possible in Putin’s regime given what is known about it. Insights offered here are occasionally supported with historical examples of timeless relevance that immediately came to mind or actually helped to generate ruminations. Causa latet, vis est notification. (The cause is hidden, the result is obvious.)

Chairman of the Joint Chiefs of Staff US Army General Colin Powell (above) at press conference at the Pentagon on January 23, 1991. When a military campaign is launched, often an objective becomes separating an opposing army from what gives it support and what allows it to continue to generate combat power. Acting in this manner against an opponent is referred to as acting decisively. During the Persian Gulf War, Operation Desert Storm, the concept of separating Iraqi forces in Kuwait from resupply as well as command and control from the Iraqi military and political leadership was expressed without ambiguity by then Chairman of the Joint Chiefs of Staff US Army General Colin Powell during a press conference at the Pentagon on January 23, 1991. He famously stated: “Our strategy to go after this army is very, very simple. First, we’re going to cut it off, and then we’re going to kill it.”

Why Is Resupply an Issue?

When sent to war, the purpose of an army is to use its trained troops to deliver calculated lethal violence in protection of their country and its values wherever they are ordered to go. Not to be forgotten, is the necessity that the army’s troops place their very lives on the line in that pursuit. Equally important to note, not all countries have the same values. The values of the Russian Federation, particularly those that compelled the invasion of Ukraine, are quite different, for example, from those of the United Kingdom, France, or Germany. As professionals, army commanders act to the best of their knowledge and experience, use their troop in accordance with their army’s doctrine and in obedience to the concept and intent laid out by the army’s senior leadership. When it is the case, the army leadership acts in fol)owing with the concept and intent of their country’s political leadership. Such was the case when the Russian Federation Armed Forces were directed by Putin and ordered by the Russian Federation General Staff to invade Ukraine.

Today, armies can deploy with a considerable amount of supplies, but supplies begin to deplete as soon as the fight is underway. Nevertheless, to keep the army going, long before it becomes engaged, considerations and arrangements are made by planners and logistical (supply) officers to transport supplies wherever they are needed. Losing the ability to be resupplied means an army can fight only until the point when it metaphorically and literally, as one element of resupply, runs out of gas. To that extent, the most extreme of human endeavors becomes an even greater challenge for troops in that army. Whether resupply is possible can more often mean the difference between victory and defeat. 

To be a useful, effective fighting force on the battlefield, critical items such as bullets, grenades, rifles, other small arms, Kevlar vests, phones, petroleum, oil lubricants, and all and elements as replacement troops, and troop medical evacuation must get up to where the fight is. As shortages become problematic, commanders must begin to economize, their ability to act will be reduced, and subsequently their army becomes far less effective. The commander of the opposing army, if a capable commander, will discern the change, recognize the advantage presented and seek to exploit it as best as possible. The decision would need to be made on whether the army with dwindling supplies should be withdrawn. If the situation reaches the point when the commander can no longer act to alter the army’s situation, his army is being battered, or his army is cut off and has no available means of egress, he may be forced to surrender. While this description is somewhat oversimplified, it lends support for the idea that when a military campaign is launched, often an objective becomes separating an opposing army from what gives it support and what allows it to continue to generate combat power. Acting in this manner against an opponent is referred to as acting decisively.

During the Persian Gulf War, Operation Desert Storm, the concept of separating Iraqi forces in Kuwait from resupply as well as command and control from the Iraqi military and political leadership was expressed without ambiguity by then Chairman of the Joint Chiefs of Staff US Army General Colin Powell during a press conference at the Pentagon on January 23, 1991 alongside the US Secretary of Defense Dick Cheney. In the hour-long briefing, which detailed the first week of operations of the 28-nation coalition against Iraq, Powell famously stated: “Our strategy to go after this army is very, very simple. First, we’re going to cut it off, and then we’re going to kill it. To cut it off, that began last week when we started to go after the nerve center, the brains of the operation, the command and control of the operation, and the lines of communication that come out of Baghdad and other places in the country.”

One might have expected that Russian Federation Armed Forces top commanders and planners, in a similar vein, might have taken a similar tack toward the Ukraine Armed Forces. It might have been expected that they would have recognized that resupply not so much from Ukrainian arsenals but from those of US, other NATO Member States, and other countries in the EU would need to be blocked, cut off in some way. Yet, nothing remotely similar to what Powell expressed in 1991 was heard from theMinisterstva oborony Rossiyskoy Federatsii (Ministry of Defense Russian Federation) or General’nyy shtab Vooruzhonnykh sil Rossiyskoy Federatsii (General Staff of the Armed Forces of the Russian Federation), or from Putin, himself, about cutting Zbrojni syly Ukrayiny (Armed Forces of Ukraine, hereinafter referred to as the Ukrainian Armed Forces) off from resupply. There were no feigned movements such as moving Russian Federation forces to points outside Ukraine from which a blocking operation could best be launched in order to signal the intention to cut the Ukrainian Armed Forces off from resupply. Nothing was done sufficiently enough to cause supporters of the government of Kyiv to second guess any planned efforts to resupply the Ukrainian Armed Forces. In view of the potential decisive impact from contributions by the 30 countries in NATO,  particularly the US with its military largess, it would seem some Russian Federation Armed Forces commanders and planners thinking logically would urge the Russian Federation General Staff to suggest scrapping the operation until the problem of the Western resupply threat was resolved. 

A near endless list of situations during wars in which resupply determined the outcome of battle or even the war, itself. For example, armies have often encountered difficulties in cutting off resupply on a strategic level when fighting a determined opponent. Occasionally political leaders and army commanders have been slow in recognizing the opportunity to act decisively to mitigate resupply efforts on a strategic level. Armies have faced difficulties on the tactical level against a smaller force of well-trained, well-organized, and well-led opposing troops, even during a siege, when sufficient resupply has been made available to them

Ho Chi Minh Trail

The Ho Chi Minh Trail (Đường mòn Hồ Chí Minh) was a supply system that provided support, in the form of manpower and materiel, to the Communist insurgency, Viet Cong, and the People’s Army of Vietnam (North Vietnamese Army) during the Vietnam War. It comprised a logistical network of roads and trails that ran from North Vietnam to South Vietnam through the kingdoms of Laos and Cambodia during the Vietnam War. Initially troops, pushing heavily laden bicycles, driving oxcarts, or carrying supplies on their backs, moved hundreds of tons of supplies along it. However, trucks would become the primary means of moving supplies and troops. By 1969, tgere was even a pipeline crossed the Lao frontier through the Mu Gia Pass and, by 1970, it reached the approaches to the A Shau Valley in South Vietnam. The plastic pipeline, equipped with numerous small pumping stations, managed to transfer diesel fuel, gasoline, and kerosene all through the same pipe. By the end of 1970, the number of pipelines entering Laos increased to six that year. As a whole, supply efforts through trail were quite effective, which no mean feat given US efforts to thwart effort through trail included attacks from a CIA-raised clandestine army and the most intense air interdiction campaign in history. Mitigating the effects of US operations to destroy the trail was an existential effort. One might say the Ho Chi Minh Trail was the “center of gravity” for the Communists. Its loss probably would have led to their defeat in the war. As long as supplies could get to the Viet Cong and North Vietnamese Army, their war effort could continue with vigor which complicated US-led efforts to secure South Vietnam for the government in Saigon. South Vietnam would eventually surrender to North Vietnam.

Battle of the Atlantic 1939-1945

During World War II, Germany acted robustly to prevent merchant ships from carrying food, raw materials, troops and their equipment from North America to the United Kingdom. If they had succeeded, the outcome of war might have been radically different. The United Kingdom might have been starved into submission, which would have been complete strain on the morale. Its forces and those of its allies worldwide likely would have been deeply impacted. The supply line from the US was essentially the beating heart, the center of gravity, of the United Kingdom’s war effort. The threat to the movement of ships across the Atlantic came in the form of German submarines, the “Unterseeboot” or U-boat. United Kingdom Prime Minister Winston Churchill once wrote that, “The only thing that ever really frightened me during the war was the U-boat peril.”

At the start of World War II, the Befehlshaber der Unterseeboote (Commander of the Submarines) was Konteradmiral (Rear Admiral) Karl Dōnitz. Dönitz pushed for a German fleet that consisted almost entirely of U-boats, claiming that depriving Germany’s enemies of vital supplies such as food and oil would be the most effective way to achieve victory. He claimed that given 300 U-Boats of the latest design, the Type VII, he could defeat the entire Royal Navy. He would utilize them in tactical formations that would later be called “wolfpacks”. Dőnitz’s  superior, Oberbefehlshaber der Kriegsmarine (Commander-in-Chief of the Navy) and Großadmiral, Oberkommando der Marine (the Naval High Command) Erich Raeder, was uninterested in his theories. Raeder was a traditionalist whose focus was surface warfare. Raeder also judged that Germany could not contest the Royal Navy for control of the sea. Even more, Raeder believed submarine warfare was cowardly. By 1941, although relatively small in number, U-boats under then Vizeadmiral (Vice Admiral) Dőnitz were threatening Allied shipping as far as the US east coast. By the end of 1942, U-boat “wolfpacks” were achieving considerable success in sinking merchant ships. By early 1943, the United Kingdom’s resources, especially oil, were running out, and it became a question of whether Allied shipyards could build merchant ships fast enough to replace the tonnage that was being sunk. 

Finally recognizing the value of then Admiral Dönitz concepts on the effective conduct of submarine warfare, in January 1943, German Führer und Reichskanzler Adolf Hitler saw to it that he was advanced to the rank of Großadmiral (Grand Admiral) and replaced Großadmiral Erich Raeder as Oberbefehlshaber der Kriegsmarine and Großadmiral, Oberkommando der Marine. Interestingly, he retained his post as Befehlshaber der Unterseeboote. Dőnitz was given the authority to act as he saw fit with German naval forces too late. At that juncture, Dőnitz had 200 operational U-boats. By April 1943, his U-boats were clearly struggling to make an impact. The Allies were sinking German submarines in greater numbers, with 45 being destroyed in the months of April and May. Aggressive Allied anti-submarine tactics were aided by the introduction of new technology. Long-range aircraft were equipped with centimetric radar and directed based on Ultra intelligence from intercepts of Kriegsmarine Enigma code communications. The mass production of Liberty Ships in US shipyards would ensure that the Allies would overcome attrition rates and win the Battle of the Atlantic. Without the victory, the Allies would not have been able to land forces ashore in the Mediterranean Theater or at Normandy.

In Operation Sonnenblume, in 1941, the German Afrika Korps‘ first offensive in North Africa, it sought to advance on Alexandria and Suez. In that advance, the capture of Tobruk was a priority as it was the only deep water port in Eastern Libya and would have provided the Germans with the closest supply port to the Egypt–Libya border. Of some significance is the fact that the one the renowned military commanders to emerge from the war led the attack on Tobruk: Generalleutnant (Lieutenant-General) Erwin Rommel. In 1940, Rommel commanded the 7th Panzer Division during the invasion of France where he demonstrated skill in the new tactic of blitzkrieg. He was a military officer who knew his business. When Rommel struck, he achieved complete surprise against British Army units in Libya’s eastern coastal region. The British Army was forced to retreat several hundred miles across the desert toward Tobruk. At Tobruk, the British Army and its allies held on. The Germans frequently bombarded the port. A blockade had been organized to thwart British resupply and reinforcement efforts. However, ships of the Royal Navy’s Mediterranean Station ran the blockade, and provided Tobruk’s defenders gunfire support, supplies, fresh troops and by ferrying out the wounded. The defenders of Tobruk received enough resources to keep up the fight. Rommel was stopped and the siege was lifted in December 1941.

Tobruk Siege 1941

In Operation Sonnenblume, from February 6, 1941 to May 25,1941, its first offensive in North Africa, the German Afrika Korps sought to advance on Alexandria and Suez in that advance, the capture of Tobruk was a main objective. Tobruk was the only deep water port in Eastern Libya and would have provided Rommel a supply port closer to the Egypt–Libya border than Benghazi, 900 kilometers or 560 miles west of the Egyptian frontier, which was within the range of Royal Air Force bombers; Tripoli was 1,500 kilometers or 930 miles to the west in Tripolitania. Of some significance is the fact that the one the renowned military commanders to emerge from the war led the attack on Tobruk: Generalleutnant (Lieutenant-General) Erwin Rommel. A veteran of World War I, from 1929 through 1933, Rommel served as an instructor at the Dresden Infantry School and from 1935 at the Kriegsakademie (German War Academy) at Potsdam. In 1940, Rommel commanded the 7th Panzer Division during the invasion of France where he demonstrated skill in the new tactic of blitzkrieg. He was a military officer who knew his business. When Rommel struck, his Afrika Korps achieved complete surprise against British Army units in Libya’s eastern coastal region of Cyrenaica. The British Army was forced to retreat several hundred miles across the desert towards Tobruk.

Recognizing that he had the opportunity to capture Tobruk before the British Army and its Allies had time to organize an effective defense, Rommel advanced aggressively to exploit it. The 9th Australian Division, dubbed “The Rats of Tobruk”, supported by British Army armor and artillery, repulsed initial German assaults on April 10, 1941 to April 14, 1941, and even when the fresh 15th Panzer Division was committed to the attack on April 30, 1941, the defenders held on. The Germans frequently bombarded the port with artillery and Luftwaffe (German Air Force) dive-bombers and medium bombers. A blockade had been organized to thwart British resupply and reinforcement efforts. However, ships of the Royal Navy’s Mediterranean Station–to include the Inshore Squadron–ran the blockade. Indeed, known as the “Tobruk Ferry Service”, Royal Navy and Royal Australian Navy warships provided gunfire support, supplies, fresh troops and by ferrying out the wounded. The defenders of Tobruk were provided enough resources to keep up the fight. The Royal Air Force flew defensive sorties from airfields far away in Egypt. The siege of Tobruk was the first occasion in the war that German Panzer units had been stopped. The siege was lifted in December 1941. It must be noted that via Operation Crusader, launched on November 27, 1941, Tobruk was relieved by the British Eighth Army which after September 1941, controlled British Army and other Allied ground forces in the Western Desert. It seems worthwhile to note the Fall of Tobruk occurred when Generalfeldmarschall Erwin Rommel  commanding Panzerarmee Afrika (Panzer Army Africa) which controlled the Afrika Korps and additional German units deployed to Africa as the 90th Light Infantry Division), as well as the Italian X Corps and XX Corps, attacked  on June 20, 1942 with massed air support, broke through a weak point on the eastern defensive perimeter, and captured the port. Although the garrison on the western perimeter had not been attacked, it was cut off from supplies and transport. Lacking the means to escape, the majority had to surrender; 33,000 prisoners were taken. Rommel had indeed learned lessons during the 1941 siege.

Être Voué à L’échec dès le Début

Even if everything else had been planned and arranged in the correct manner in every other aspect for the invasion, the viability of the entire plan would still rest on the ability of the Russian Federation Armed Forces to at best destroy, acceptably disrupt, or at the absolute minimum, delay resupply from the US, EU, and NATO. Without being able to control the movement of resupply in the West, the plan for the invasion should have been scrapped or the attack should have been postponed until that was nailed down. The reasoning behind such a decision has already been made abundantly clear looking at the circumstances of the handful of examples presented here already. As it was, the “special military operation” was launched, half-baked, and billions of dollars in military assistance has reached the Ukrainian Armed Forces via their country’s western border. Many weapon systems sent into Ukraine have had a multiplier effect on the battlefield. Firepower in the form of multiple launch rocket systems, self-propelled artillery, and heavy caliber guns, transported possibly along the now heavily traveled supply lines from both Poland and Romania enabled the Ukrainian Armed Forces to launch two highly-successful counteroffensives. On August 29, 2022, a counteroffensive was launched to eject Russian forces occupying the Kherson and Mykolaiv oblasts (provinces). On September 6, 2022, a counteroffensive was launched to eject Russian forces occupying the Kharkiv, Donetsk, and Luhansk oblasts. Given the unsatisfactory nature in which the Russian invasion was arranged and indeed, has been prosecuted, the decision to go into Ukraine was the sort that if made during an instance of saber rattling and war fever in a highly-industrialized democracy, would very likely lead to the impeachment of a national leader.

Ruminations

To set the record straight from the outset, greatcharlie believes that if Russian Federation forces were selectively positioned in Western Ukraine, the Ukrainian Armed Forces would have likely used their formidable and quite impressive drone arsenal to bombard them. They might have achieved the same relative success that they have achieved with Russian Federation forces in the east and south and around Kyiv. Once aptly prepared, Ukrainian special forces would likely do their part to hunt down and displace and destroy any Russian Federation troops settled in their country’s Western region. 

Commanders and planners in the Russian Federation Armed Forces would unlikely have known or believed any of that would have been possible before the invasion. One would need to consider other reasons for the omission of a mission to thwart, to an extent blockade resupply to the Ukrainian Armed Forces from the West.The Romania-Ukraine border is 649 kilometers or around 403 miles, but it is discontinuous. The. Moldova-Ukraine border is 1,222 kilometers or 759 miles. However, along the Dniester River, between Moldova and Ukraine, is the autonomous Republic of Transnistria.  Thereby, 454 kilometers or 282 miles of the Moldova-Ukraine border stand as the de factor border between Transnistria and Ukraine.

To the left of the above map are all countries situated on Ukraine’s western border. As Ukraine is looked upon in Europe as a very large country, perchance the area in western Ukraine that would need to be covered was judged by military commanders and planners in the Russian Federation General Staff as too large and deemed too difficult to control or monitor, surveil, and launch successful interdiction attacks and raids from. The Polish–Ukrainian border has a total length of 529 kilometers or 329 miles to 535 kilometers or 332 miles according to different sources. The Romania-Ukraine border is 649 kilometers or around 403 miles, but it is discontinuous. The Slovakia-Ukraine border is 97 kilometers or a bit over 60 miles. The Hungary-Ukraine border is roughly 103 kilometers or 60 miles long. It its located in Hungary’s Tisza river valley of its northeast. The Moldova-Ukraine border is 1,222 kilometers or 759 miles. However, along the Dniester River, between Moldova and Ukraine, is the autonomous Republic of Transnistria.  Thereby, 454 kilometers or 282 miles of the Moldova-Ukraine border stand as the de factor border between Transnistria and Ukraine.

Omission or De-emphasis?

Negligentia sempre habet infortunam comitem. (Negligence always has misfortune for a companion.) Imaginably, there is a moderately rational reason behind the decision to attack the second largest country in Europe, 603,500 square kilometers or 233,000 square miles, without being fully prepared. Ukraine is second largest in size to Russia, which is 17,098,246 square kilometers or 6,601,670 square miles. As Ukraine is looked upon in Europe as a very large country, perchance the area in Western Ukraine that would need to be covered was judged as too large by military commanders  and planners in the Glavnoe operativnoe upravlenie General’nogo štaba Vooružёnnyh sil Rossijskoj Federacii (the Main Operational Directorate of the General Staff of the Russian Federation) and commanders and planners at the lower level in Yuzhnyy Voyennyy Okrug (the Southern Military District) and the Zapadnyy Voyennyy Okrug (the Western Military District) and deemed too difficult to control or monitor, surveil, and launch successful interdiction attacks and raids into. The Polish–Ukrainian border is the state border between Poland and Ukraine. It has a total length of 529 kilometers or 329 miles to 535 kilometers or 332 miles according to different sources.

Concisely and admirably described by the Mission Opérationnelle Transfrontalière (Transfrontier Operational Mission), an association that was set up in 1997 by the government of France to resolve issues for entities concerned with cross border issues, the Poland-Ukraine border begins at the tripoint formed by the Ukrainian, Polish and Slovak borders, in the middle of the Eastern Carpathian mountains. The demarcation runs initially towards the east, arriving at the Ushok Pass and the source of the San River, whereupon it turns north-west to follow the river for around 50 kilometers or 31 miles. It subsequently leaves the river to take a north-easterly direction, crossing the region known as the “Przemyśl Gate”, where mountains meet lowlands. The border then crosses large swathes of agricultural land, to reach the Bug River, which forms the last third of its demarcation. It ends at the tripoint formed by the borders of Poland, Ukraine and Belarus. Poland is a NATO Member State and an EU border state.

The Romania-Ukraine border is 649 kilometers or around 403 miles, but it is discontinuous. Again using a description from the Mission Opérationnelle TransfrontalièreThe Republic of Moldova separates the border into two segments. The first in the west, at the tripoint between the Hungarian-Romanian and Hungarian-Ukrainian borders. That segment then continues across the East Carpathian mountains and terminates at the tripoint formed by the Moldovan, Romanian and Ukrainian borders. The second segment begins at the second tripoint between the Moldovan, Romanian and Ukrainian borders, on the north bank of the Danube River, and terminates as it reaches the Black Sea. Romania is a NATO Member State and an EU border state. The Slovakia-Ukraine border is 97 kilometers or a but over 60 miles long. Slovakia is also a NATO Member State and an EU border state. The Hungary-Ukraine border is roughly 103 kilometers or 60 miles long. It is located in Hungary’s Tisza River Valley in the country’s northeast. As with the preceding three countries discussed, Hungary is a NATO Member State and an EU borderstate. The. Moldova-Ukraine border is 1,222 kilometers or 759 miles. However, along the Dniester River, between Moldova and Ukraine, is the autonomous Republic of Transnistria.  Thereby, 454 kilometers or 282 miles of the Moldova-Ukraine border stand as the de factor border between Transnistria and Ukraine. Transnistria is an autonomous republic aligned since 1992 with the Russian Federation. Russian Federation Armed Forces units have also been garrisoned there since 1992. To that extent, anyone providing military assistance to Ukraine would hardly choose to move anything through Moldova as Russian Federation intelligence services posted in Transnistria would likely be able to position themselves to monitor such resupply activities. Moving through Moldova would very likely be deemed too risky, unsafe. To an extent, one might say any effort by Russian Federation Armed Forces to monitor resupply efforts for Ukraine would indicate commanders and planners were covering the matter. Perhaps the Russian Federation General Staff sold that notion to Putin. However, while a few things could be done from Transnistria, given the sheer size of its border with Ukraine, and its position south and toward the east with respect other bordering countries, it would unlikely be enough to make a real difference. It would seem Putin did not want to stir trouble over Transnistria issue. The Russian Federation Armed Forces there have remained relatively quiet, and the West has more or less left the autonomous republic alone. If covert monitoring has been transpiring along or across the Transnistria border, it is apparently not having an impact. Thus, the focus here is on resupply from Poland, Slovakia, Hungary, and Romania.

Russian Federation President Vladimir Putin (center), Russian Federation Defense Minister General Sergei Shoigu (right), and Chief of Staff of the Russian Federation Armed Forces General Valery Gerasimov (left). Commanders and planners in the Russian Federation Armed Forces apparently “wholeheartedly” accepted the idea that the Ukrainians would acquiesce as in 2014. Despite losses inflicted upon Ukrainian defenders and territorial gains, in eastern and southern Ukraine as well as Kyiv, the mission to completely snuff out the combat power and resolve of the Ukrainian Armed Forces and force a sort of mass capitulation was not achieved. The losses of the Russian Federation Armed Forces have been exponentially higher. It seems most apparent that the Russian Federation General Staff had moved forward without a satisfactory long-term plan for the invasion. Indeed, by results alone, one might infer that there were actually no contingency plans to draw upon for the invasion of Ukraine.

Folly, Doctor-Like, Controlled Skill

Commanders and planners in the Russian Federation Armed Forces apparently “wholeheartedly” accepted the idea–fiction–that the Ukrainians would roll over and play nice doggie à la 2014. Tomaten auf den augen haben. Despite losses inflicted upon the Ukrainian defenders and territorial gains, in eastern and southern Ukraine, the mission to completely snuff out the combat power and resolve of the Ukrainian Armed Forces and force a sort of mass capitulation was not achieved. In the end, the losses of the Russian Federation Armed Forces have been exponentially higher. It seems most apparent that the Russian Federation General Staff had moved forward without a satisfactory long-term plan for the invasion. Indeed, by results alone, one might infer that there were actually no contingency plans to draw upon for the invasion of Ukraine, with solutions for all conceivable challenges. Doing the “what-ifs” beforehand was probably viewed as walking out on thin ice “politically”. While the idea might be difficult for the reasonable to reconcile, it appears the massive enterprise was  truly undertaken by Moscow on the fly. 

Allowing the Russian Federation Armed Forces to perform in such a way would be very much unlike Putin given the record of his past behavior. True, over the past two decades, he has dropped some clangers. Even the most knowledgeable and experienced can make mistakes they learned to avoid long ago. That is human nature; the human element. Still, Putin’s actions are usually thoughtful, calibrated, well calculated, with the use of resources in a measured way to achieve the most favorable outcomes. Putin can surely tell the difference between real and unreal. He has not managed to stay in power since 2000 by engaging in Quixotic pursuits. This is something new. One wonders what could possibly come next for Ukraine and for the world.

Putin was oddly hooked on the idea that among the officers, men, and women of the Ukrainian Armed Forces, there was a lingering sense of Soviet unity equal to his own. This in itself was quite interesting as Putin was hardly known for truly displaying brotherly love toward former Soviet republics. He would create an environment of fear in his relationship with their respective leaders. After Euromaidan, the Ukrainians did not want any part of that. In his invasion day television broadcast of February 24, 2022, Putin would go as far as to implore the Ukrainian Armed Forces to submit to his will and allow Russian troops to again simply march into their country. There appeared to be a singular emotional commitment on his part to the ideas of Russian-Ukrainian unity and the fealty of the officers, men, and women of the Ukrainian Armed Forces to Moscow, to him. Putin “appealed” to members of the Ukrainian Armed Forces as follows: “I would also like to address the military personnel of the Ukrainian Armed Forces. Comrade officers! Your fathers, grandfathers and great-grandfathers did not fight the Nazi occupiers and did not defend our common Motherland to allow today’s neo-Nazis to seize power in Ukraine. You swore the oath of allegiance to the Ukrainian people and not to the junta, the people’s adversary which is plundering Ukraine and humiliating the Ukrainian people.” Putin continued: “I urge you to refuse to carry out their criminal orders. I urge you to immediately lay down arms and go home. I will explain what this means: the military personnel of the Ukrainian army who do this will be able to freely leave the zone of hostilities and return to their families.” If the matter were not so grave, his words might be looked upon as comical.

Putin seemed forgetful of, or totally oblivious to, the fact that he was responsible for the greatest humiliation of the Ukrainian Armed Forces when he ordered the “green men” of the Russian Federation Armed Forces into Crimea to seize Ukraine’s sovereign territory. Further, without firing a shot, the green men first corralled members of the Ukrainian Armed Forces much as sheep in their own garrison and then herded them out of Crimea. Knowing the Ukrainians as well as he claimed he did in the February 24, 2022 broadcast, Putin should have known the Ukrainians are not sheep. He should have been well-aware that there would be payback for what happened in 2014 and everything that has happened since. He surely knows that now.

In its ill-designed aspects influenced by the political leadership, the Russian Federation’s special military operation on a macro-level much resembles the failed German campaign, Operation Barbarossa, launched on June 21, 1941. Hitler provided empty assurances resulting from his baseless analyses to Oberkommando des Heeres (High Command of the Army) to the effect that “We have only to kick in the front door and the whole rotten edifice will come tumbling down.” Oberkommando des Heeres went along with Hitler’s concept that the campaign would be a short one, and that the Soviets would give in after suffering the shock of massive initial defeats. As a result, it did not develop a satisfactory long-term plan for the invasion.  The shock and awe of the initial Blitzkrieg was dissipated by the vast distances, Supply challenges could not be overcome. There was a lack of sufficient manpower resources. German losses could not be sustained. After initial contact, there was stiff resistance from Soviet forces. Despite the serious losses inflicted on the Soviet Army the mission to completely destroy Soviet fighting power and force a capitulation was not achieved by January 7, 1942, and the operation was terminated 20 kilometers short of Moscow. Interestingly enough,a number er of fitting comparisons between Putin and a national leader whose blunders came as a result of being closed to the recommendations and entreaties of his or her top advisers, are those made with Hitler.

Delinquency

There is the real possibility that commanders and planners in the Russian Federation Armed Forces, attempting to hastily organize the massive Spetsial’noy Voyennoy Operatsii (Special Military Operation) were not even aware that the opportunity to destroy and disrupt the resupply effort for Ukraine was missed. Everything truly started off on the wrong foot from the get-go. By logic, at first glance this would seem unlikely. After all, the well-trained senior officers and planners of the Russian Federation Armed Forces would not be aware of the danger posed by Ukraine’s open western border. Perhaps there may have been some understanding among military planners that the situation there would be played-down in order to line up with thinking from the Kremlin. In the realm of conjecture, anything becomes possible. If such was the case, from that point onward, they could only hope nothing bad would come of that considerable  omission.

The US educator and organizational theorist, Russell Ackoff was a pioneer in the field of operations research, systems thinking, and management science. In a research article entitled “A Major Mistake That Managers Make” in Handbook of Business Strategy, volume 7, number 1, January 2006, pages. 225-227, Ackoff wrote: “Errors of omission, lost  opportunities, are generally more critical than errors of commission. Organizations fail or decline more frequently because of what they did not do than because of what they did.” Although the December 7, 1941 surprise attack of the Imperial Japanese Navy on Pearl Harbor was a tactical victory, it was also a strategic blunder, as the Japanese failed one of their most critical objectives: destroy the US aircraft carriers. Even worse, the Japanese failed to destroy the strategic oil reserves at Oahu, and the damage to docks and yards was slight. That oil reserve fueled the US Navy through the remainder of the war against Japan.

A well-intervaled column of German vehicles moves through the Ardennes Forest in 1940 (above). At the top of the list of historical causes for military blunders has been insufficient intelligence analyses as well as the failure of consumers to include valuable forecasts in their appraisals of situations. Consider for example how the military high command of France failed their government three times in 70 years by minimizing warnings about the intentions of Prussian and German Governments. In 1870, the Supreme Command of the French Imperial Army, with its attitude of debrouillez-vous (“We’ll muddle through somehow”), did not heed signaling that the Prussian Army would move via the Ardennes Forest through Belgium into France. In 1914, the French Grand Quartier Général (General Headquarters) did not heed indicia signaling that the Imperial German Army, to avoid French defenses on the Franco-German border, would move via the Ardennes Forest through Belgium into France. In 1940, the Anglo-French Supreme War Council, relying on the defenses of the Maginot Line, did not heed indicia signaling that the German Army would move via the Ardennes Forest through Belgium into France. Even with this history, in 1944, the Supreme Headquarters of Allied Expeditionary Forces in Europe ignored idicia signaling that the German Army might attempt to move via the Ardennes Forest into Belgium in an attempt to reach Antwerp and cut Allied Forces into two pieces. The result was the Battle of the Bulge in which US forces suffered an estimated 75,000 casualties.

Was Faulty Intelligence to Blame?

Quis, quid, ubi, quibus, auxiliis, cur, quomodo, quando? (Who, what, where, with what, why, how, when?) Very pertinent here is the attendant influence of faulty intelligence in understanding the situation of an opponent, strengths and weaknesses, capabilities and possibilities in the development of the concept and intent of an operation in terms of supply. It becomes a factor of some magnitude in planning support operations. It is imprudent for political leaders and top military commanders to ignore information from intelligence services that confirms some action by an adversary is very likely, imminent, or has been taken. Well at the top of historical causes for military missteps has been insufficient intelligence analyses as well as the failure of consumers to include valuable forecasts in their appraisals of situations. 

Consider for example how the military high command of France failed their government three times in 70 years by minimizing warnings about the intentions of Prussian and German Governments. In 1870, the Supreme Command of the French Imperial Army, with its attitude of debrouillez-vous (“We’ll muddle through somehow”), did not heed signaling that the Prussian Army would move via the Ardennes Forest through Belgium into France. In 1914, the French Grand Quartier Général (General Headquarters) did not heed indicia signaling that the Imperial German Army, to avoid French defenses on the Franco-German border, would move via the Ardennes Forest through Belgium into France. In 1940, the Anglo-French Supreme War Council, relying on the defenses of the Maginot Line, did not heed indicia signaling that the German Army would move via the Ardennes Forest through Belgium into France. Even with this history, in 1944, the Supreme Headquarters of Allied Expeditionary Forces in Europe ignored idicia signaling that the German Army might attempt to move via the Ardennes Forest into Belgium in an attempt to reach Antwerp and cut Allied Forces into two pieces. The result was the Battle of the Bulge in which US forces suffered an estimated 75,000 casualties.

Referring again to the attack on Pearl Harbor, a newly discovered official US Government memorandum has revealed that intelligence collected about the activities of the Imperial Japanese Navy, led to assessments that Japan might attack the US on the West coast, the Panama Canal, and the US naval and military bases in Hawaii some time in December 1941. The Japanese Imperial Navy would eventually execute a devastating surprise, aircraft carrier-based, aerial attack and submarine attack on the US Naval Base and Headquarters of the US Pacific Fleet at Pearl Harbor, and aerial attacks against the US Army Base at Schofield Barracks and the US Army Air Corps Base at Hickam Field. Most US military commanders were bewildered by the successful attack which they never would have believed Japan could execute before it actually happened. By leaning into those beliefs, they were caught flat-footed by the attack. Their immediate responses were meager and ineffective.

In the case of Ukraine, it would seem Putin was provided faulty information. Some intelligence services apparently did more in the direction of providing fabrications than others.. From what can be gathered by newsmedia reports about its findings, the foreign intelligence service of Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsii (Federal Security Service of the Russian Federation) or FSB, known as the organization’s 5th service. The 5th Service is a division that was established in 1998, when Putin was director of the FSB, to carry out operations in the countries that were formerly republics of the erstwhile Soviet Union. Its mission was to help ensure those countries remained within Russia’s orbit. Apparently, the 5th Service laid it on thick. There were allegedly many unproven, torrid statements on the nature of Ukrainian society made concerning the destructive impact of the West on the culture, morality, spiritually, self-image of the people, ultranationalists, and the leadership in Kyiv, and the Ukrainian people’s willingness to stand fast against an invasion. 

Are Russian Federation Satellites Functioning?

One might imagine that there was a chance that intelligence, surveillance, and reconnaissance (ISR) capabilities by Russian Federation satellites could have assisted in covering the space and monitor and act against assistance efforts by supporting calibrated attacks on supply trains, especially readily observable ones  traveling along roads and rails. Intriguingly, only a few short years ago, there was great concern expressed in the US about formidable Russian Federation satellites that were interfering with US satellites. As discussed in greatcharlie’s July 6, 2017 post entitled, “Trump to Meet With Putin at G-20 Gathering: Trump Seeks an Authentic Relationship with Russia”, there was the belief that Russia was developing the ability to approach, inspect, and potentially sabotage or destroy US satellites while they orbited the Earth. 

Now, it seems, Russian Federation satellites must be able to provide a picture of the situation in Ukraine. True, as stated here, Ukraine is the second largest country in Europe, but, if many will pardon this expression, in greater terms, it is smaller than the State of Texas in the US, which has been regularly, intensely surveilled by the Russian Federation as it was before by the Soviet Union due mainly to the many massive US military and NASA bases and other facilities there. De quoi s’agit-il ici? It appears that a breakdown in Russian ISR capabilities from space much as its military, naval, and intelligence capabilities generally, had occurred long before the special military operation was launched.

Having been responsible for the preparedness of the Russian Federation Armed Forces, the Russian Federation General Staff had to have known something was awry. it had to have known whether they were up to the job in Ukraine. While the Russian Federation Armed Forces’ Zapad and Vostok exercises perhaps indicated that they were ready for war, surely the Russian Federation General Staff was fully aware of how numbers of troops, actions, reports were, to be frank, falsified. The most senior commanders may not have been sure themselves what the true capabilities of the Russian Federation Armed Forces were. If they were living in an illusion about how mighty their forces were, that  Illusion was destroyed in the face of reality.

Snapshot of the initial wave of Ukrainian refugees (above). There is the possibility the commanders and planners in the Russian Federation Armed Forces may have believed there was more to gain by having a great flow of refugees pouring out of Ukraine to create problems, chaos and confusion, hostile reactions from populations of countries inconvenienced by overflows of Ukrainian refugees, and frustration among NATO, EU Member State capitals. Conceivably, the thinking from the Kremlin and subsequently the Russian Federation Armed Forces that if the roads out of Ukraine to Poland, Slovakia, Hungary, Romania, and Moldova were clogged, potentially military assistance could not get through, at least not efficiently. By weaponizing refugee flows an invasion would cause, it may have been believed a way found to split the seam between two possibilities. However, even in the best case scenario, the refugee exodus would be a temporary problem. If Western powers could not resolve the matter, they would at least be able to mitigate its immediate effects. Once the invasion began, humanitarian and refugee organizations of almost every kind jumped in feet first. The West could do more with assistance to stem the crisis than the Russian Federation could do by creating a refugee overflow crisis. As it turned out, the refugee crisis as the Kremlin might have envisioned and hoped did not materialize.

The Pitfalls of Creative Thinking

There is the possibility the commanders and planners in the Russian Federation Armed Forces may have believed there was more to gain by having a great flow of refugees pouring out of Ukraine to create problems, chaos and confusion, hostile reactions from populations of countries inconvenienced by overflows of Ukrainian refugees, and frustration among NATO, EU Member State capitals. That belief would very likely have been in following with the concept and intent disseminated from the Kremlin. The impact of a refugee surge was witnessed while war raged in Syria. During the 2015 Syrian Refugee Crisis, an estimated 1.3 million refugees seeking asylum literally jammed roads leading to Europe. European countries, especially the first ones along the refugees route that encountered them, were unable to handle their numbers immediately. Some capitals panicked. Many political, social, financial, and security issues subsequently arose. The refugee flow eventually subsided. 

The Weaponization of Refugees

Conceivably, the thinking from the Kremlin and subsequently the Russian Federation Armed Forces that if the roads out of Ukraine to Poland, Slovakia, Hungary, Romania, and Moldova were clogged, potentially military assistance could not get through, at least not efficiently. By weaponizing refugee flows an invasion would cause, it may have been believed a way found to split the seam between two possibilities. Zwei fliegen mit einer klappe schlagen. However, even in the best case scenario, the refugee exodus would be a temporary problem. If Western powers could not resolve the matter, they would at least be able to mitigate its immediate effects. Once the invasion began, the UN with its many aid organizations as well as and other international and regional intergovernmental humanitarian and refugee organizations jumped in feet first. The US would work with capitals in Europe, especially Warsaw, and encourage through diplomacy and support with its wherewithal, a multilateral effort by government aid agencies. The EU acted in a similar way. The International Federation of Red Cross and Red Crescent Societies, CARE and other international and regional nongovernmental humanitarian and refugee organizations. Nongovernmental refugee and displaced persons organizations, and a variety of humanitarian organizations from around the world made their way to Poland, Slovakia, Hungary, Romania, and Moldova to get a handle on the problem. 

As things went, the Russi­an Federation’s special military operation triggered a “regional forced displacement crisis.” By September 30, 2022, seven months after the invasion began, 7,536,433 Ukrainian refugees were registered outside of Ukraine. Reportedly, Poland and Germany received the most refugees; more than a million each. The Czech Republic took in the next highest number 438,926, followed by the US, the United Kingdom, France, Turkey, Italy, and Spain, each of which accepted from 100,000 to 300,000 refugees. Smaller numbers escaped to Hungary, Romania, Slovakia, and Moldova. 

Interestingly, and doubtlessly to the consternation of the Kremlin and Russian Federation Armed Forces, not only is military assistance flowing freely into Ukraine from Poland but so are “returnees”. Clear data that documents how many of the 7.5 million Ukrainian refugees have returned home permanently, reportedly is unavailable. However as of September 20, 2022, over 6 million cross-border movements were made back into the country. Border crossing points in Poland as well as Romania are said to be receiving most of the returnees, with nearly 4.5 million crossings from Poland and nearly 1 million from Romania. In the aggregate, one might conclude that the West could do more with assistance than Russia could do by creating a refugee overflow crisis. In the end, the refugee crisis that the Kremlin may likely have envisioned and hoped for did not materialize. Vide et credere. (See and believe.)

Where Was the GRU?

As a military matter, intelligence on the situation in Ukraine to the extent it would impact the special military operation had to be of great interest specifically to Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU  The GRU could not have missed the potential problem of resupply routes into Ukraine from Poland, Slovakia, Hungary, and Romania being set up. Perhaps the GRU was unable to convince the Russian Federation General Staff of the necessity to close the door to assistance from the West. Maybe there was at first a thought to use the same act twice with “green men” in the Western Ukraine. However, GRU planners may have been concerned about being unable to redeploy or evacuate troops placed perhaps at border crossings, highways, train junctions, road intersections, bridges, heights, airports, military airfields, and so on deep in Ukraine in large numbers if a major problem was encountered.

It was suggested in greatcharlie’s January 25, 2022 post, one could conceive that concerning Western military assistance, a special task force has been organized and assigned in advance, among other things: monitor the delivery, stockpiling of stinger, javelin, and other weapons systems to Ukrainian forces; maintain real-time knowledge of the distribution and location of those weapons; destroy those weapons systems; and, destroy or support actions by other Russian military units to destroy Ukrainian military units to which those weapons were distributed. That hypothetical task force would also likely be tasked to monitor–covertly monitor the intelligence activities and military operations of–Western countries as they relate to supplying Ukraine with special military capabilities. It would seem that suggestion made by greatcharlie then was well-off the mark. Maybe they were concerned about potential for great casualties and huge losses of materiel.

Where Was Spetsnaz?

Voyská spetsiálnogo naznachéniya (‘Special Purpose Military Units) or spetsnaz, a carry over from the days of the Soviet Union, are trained, and tasked as special forces units and fielded in wartime as part of the GRU. As is the case with special forces in most countries, the primary missions of spetsnaz are power projection (direct action), intelligence (reconnaissance), foreign internal defense (military assistance), and counterinsurgency. The GRU may have been unable to conjure up a viable plan to use spetsnaz in western Ukraine. Again, GRU planners may have been concerned about being unable to deploy or evacuate troops placed even on raids so deep without a solid means of egress. Even if it had been possible to monitor and act in the Western region from Belarus, again, distances that needed to be traversed may have been too great.

One might wonder whether the GRU had been aware that there was someone else in Western Ukraine, covert foreign forces from governments very friendly with Kyiv, already holding the most useful entrances and exits to and from Poland, Slovakia,, Hungary,, and Romania open in case of an attack. It is the sort of thing US Special Operations Units, the Special Activities Division of the US Central Intelligence Agency, the British Army’s Special Air Service, and the United Kingdom’s Secret Intelligence Service would be very capable of doing and would likely do, covertly. Surely, this idea is drawn from the realm of conjecture, however, it would be a smart move and their hypothetical presence would hardly be reported in the Western newsmedia. If, hypothetically, such forces had been there covertly since 2014, they may have been well-engaged in successful clandestine and covert activities in the region.

Perhaps what happened in Syria may have been an issue at all in GRU Headquarters. A battle between US Special Forces and Russian private military contractors from the infamous Gruppa Vagnera (Wagner Group) may have had a long-lasting educational effect in Yasenevo. Present in Syria as part of the campaign to destroy the so-called Islamic Caliphate created by the Islamic jihadist terrorist organization, the Islamic State of Iraq and Greater Syria (ISIS) that cut across iraq and Syria, US Special Forces, in self-defense at their own base, decimated a formation of Gruppa Vagnera that attacked them. Memores acti prudentes futuri. (Mindful of what has been done, aware of what will be.)

Even if commanders and military planners had been certain that spetsnaz could well-handle any foreign forces that hypothetically might have detected in the Western region of Ukraine, there imaginably would have been a wish in the Kremlin to avoid being seen as, and being accused of, attacking those foreign troops. In dubio abstinence. (When in doubt, sustain.)

Where Were the Russian Airborne Forces?

As for the Vozdushno Desantnye Voyska (Russian Airborne Forces) or VDV, surely the Ukrainians might have expected missions launched by them to hold territory in-depth. Yet, as with the GRU, commanders and planners in the VDV may have been concerned about being unable to redeploy or evacuate troops placed perhaps at border crossings, highways, train junctions, road intersections, bridges, heights, airports, military airfields, and so on deep in Ukraine in large numbers if a major problem was encountered. Maybe they were concerned about potential for great casualties and huge losses of materiel. That happened without an operation to block Western assistance coming in from the West: 50,000+ killed. 

Surely, they were made more certain that the VDV would unlikely have been able successfully operate in the Western region of Ukraine after what transpired when its units attacked Hostomel Airport in the first days of the special military operation. The VDV faced considerable troubles there. One might view the capture of an airport a sort of bread and butter target for airborne units in armies worldwide

Russian Airborne Forces landing at Hostomel Airport (above). Russian Federation Armed Forces commanders and planners may have been concerned about the potential for huge losses if a blocking operation in the West were attempted. Surely, they were made more certain that the VDV would unlikely have been able successfully operate in the Western region of Ukraine after what transpired when its units attacked Hostomel Airport in the first days of the special military operation. After securing Hostomel Airport to the extent possible, the Russian Federation Army and VDV there tried to push into the nearby town and then  advance to Bucha and Irpin. Their poorly organized movement encountered ambushes in Hostomel and Bucha which resulted in significant losses of personnel and equipment. Those in command of the Russian Federation Army and VDV troops, decided to hold their positions, digging in on the roadsides to defend themselves against Ukrainian artillery and drone strikes. They also suffered heavy casualties from night attacks by special forces units of the Ukrainian Armed Forces. On March 29, 2022, the order was given for the Russian Federation forces at Hostomel to withdraw from the Kyiv oblast. Under continuous artillery fire from Ukrainian forces, the Russians damaged equipment that had to be abandoned and made a hasty retreat.

According to reports based on what was observed, the Russian Federation Armed Forces plan of attack against Hostomel Airport included its rapid occupation, with the intention of using it as an assembly area for Kyiv’s encirclement and capture. The airport is a bit over 6 miles north of Kyiv. The Initial February 24, 2022 assault on Hostomel Airport was a success, catching its Ukrainian defenders by surprise apparently due its speed. Mi-35 and Ka-52 attack helicopters operating out of Belarus struck the airport’s defenses and opened a way for helicopter-borne VDV units in Mi-8 transport helicopters that followed. However, despite being caught off guard by the initial assault by the attack helicopters, the attack itself was ineffective as the Ukrainian defenses were left largely intact.  Without any meaningful air support–it was very likely not included in formulation of the attack plan, VDV units on the ground faced counterattacks by Ukrainian forces almost immediately.

Luckily for the VDV troops struggling with Ukrainian forces for control of the airport, Russian Federation Army units originating in Belarus broke through Ukrainian defenses near Ivankiv and rapidly drove toward Hostomel. Although the advancing Russian Federation troops faced attrition from several Ukrainian ambushes en route, they reached Hostomel Airport and assisted the VDV in securing it on February 25, 2022. The Russian Federation Army units and the VDV sought to establish Hostomel into a forward operating base from which the larger push on Kyiv could be initiated. However, it was at this juncture that the special military operation began facing fierce resistance from the Ukrainians and became stalled. Logistical problems impacted operational tempo. The most visible sign was well-televised coverage of a 40-mile-long convoy that halted due to lack of fuel. Securing Hostomel Airport to the extent possible, the Russian Federation Army and VDV there tried to push into the nearby town and then  advance to Bucha and Irpin. Their poorly organized movement encountered ambushes in Hostomel and Bucha which resulted in significant losses of personnel and equipment. Those in command of the Russian Federation Army and VDV troops, decided to hold their positions, digging in on the roadsides to defend themselves against Ukrainian artillery and drone strikes. They also suffered heavy casualties from night attacks by special forces units of the Ukrainian Armed Forces. On March 29, 2022, the order was given for the Russian Federation forces at Hostomel to withdraw from the Kyiv oblast. Under continuous artillery fire from Ukrainian forces, the Russians damaged equipment that had to be abandoned and made a hasty retreat.

A Matter of Military Science

To the extent of everything mentioned here, perhaps a hypothetical concern over sending a relatively large sized force into Western Ukraine was a matter of Russian Federation commanders and military planners remembering what they learned while studying in military educational institutions. To that extent, they wanted to avoid the circumstance faced by Allied troops during Operation Market Garden during World War II.

The story of the Battle of Arnhem, part of Operation Market Garden, a massive Airborne ground assault in from from September 17, 1944 to September 26, 1944 during World War II. remains fairly well-known, however greatcharlie will humbly seek to recount it to the extent that is pertinent here. Under the plan proposed by British Army Field Marshal Sir Bernard Montgomery, the Airborne assault would support a single drive north over the branches of the Lower Rhine River,which would  permit the British Second Army to bypass the Siegfried Line and attack the industrial Ruhr. US Airborne troops were dropped in the Netherlands to secure bridges and towns along the line of the Allied advance. Farthest north, the British 1st Airborne Division was dropped at Arnhem to capture bridges across the Nederrijn (Lower Rhine). Their assault was supported by the Glider Pilot Regiment and the 1st Polish Parachute Brigade. The British XXX Corps were assigned to reach the British-led contingent in two to three days. The division was told to expect only limited resistance from German reserve forces. However, information collected by the British Army’s 21st Army Group in Belgium and Dutch resistance that German armor units were present around Arnhem. That intelligence was supported by aerial reconnaissance. However, the commanding officer of 21st Army Group, dismissed the information. The Supreme Headquarters Allied Expeditionary Force was made aware that almost certainly two Panzer divisions were situated at Arnhem but received the information from Ultra intercepts so close to the Operation Market Garden’s launch that it chose to ignore it. Intriguingly, the First Allied Airborne Army was not made privy to information from Ultra.

The information was very accurate. German Army Generalfeldmarschall Walter Model, the commander of Army Group B, had moved his headquarters to Arnhem and was re-establishing defenses in the area and co-ordinating the reorganization of the scattered units. Thus, at the time of Operation Market Garden’s launch, several units would be present in the vicinity of Arnhem to oppose them. Most threatening among them were the II SS Panzer Corps comprising the remains of the 9th SS Panzer Division “Hohenstaufen” and  the 10th SS Panzer Division “Frundsberg”. It was the bad luck of the airborne force that both German SS divisions, during their formation, had undergone month-long anti-airborne exercises and had also spent the last 15 months studying how best to act against a parachute assault in classroom and field exercises.

The 1st Airborne Division was dropped a distance from its objectives and encountered unexpected resistance, mainly from elements of the 9th SS Panzer Division and the 10th SS Panzer Division. A small force managed to reach the Arnhem road bridge, but the advance of the main body of the division was halted on the outskirts of the town. As for XXX Corps, it was forced into a struggle at Nijmegen, and advance north was delayed. As a result, the British airborne troops were not relieved as scheduled. After four days, the small British force at the bridge was overwhelmed and the rest of the division trapped in a small pocket north of the river. Lacking reinforcement and resupply, remnants of the 1st Airborne Division, after nine days of fighting, were withdrawn in Operation Berlin. Without secure bridges over the Nederrijn and the front line stabilized south of Arnhem, the Allies were unable to advance further. The 1st Airborne Division lost almost three quarters of its strength. Battered and tattered, the division was not sent into combat again.

Concern over a Potential Panicked Response by Ukraine’s Neighbors

The Kremlin may have been uneasy about how the US, its NATO allies, and the EU would respond militarily if Russian troops landed in Western Ukraine, “danger close” to the Polish border. Even more, it may have been the case that  they were concerned political leaders in Poland, potentially panicked at observing Russian forces landing practically on its border, might have responded first by ordering Polish Armed Forces to unilaterally drive inside Ukraine border, take positions inside its Western region, and then refer the matter to NATO. Such hypothetical unilateral action might have included an armored and mechanized drive into Ukraine to create a buffer, and landing troops on border crossings, highways, train junctions, road intersections, bridges, heights, airports, military airfields, and so on before they would all fall completely into Russian Federation hands. To that extent, they would likely go after the same targets in Ukraine that the Russian Federation Armed Forces would likely want. In the worst case scenario, Polish troops could have fired heavy artillery and launched missile attacks on targets to deter air landings by the Russian Federation Armed Forces.

Where Was the Russian Air Force?

Concerning Voyska Vozdushno-Kosmicheskoy Oborony, Rossijskoj Federacii (the Russian Federation Aerospace Defense Forces, hereinafter referred to as the Russian Federation Aerospace Forces), particularly the Voenno-Vozdushnye Sily Rossii, (the Russian Air Force) element, one might have presumed commanders and planners of the Russian Federation Aerospace Forces would have organized air power assets of the force to strike strategically and tactically to make a positive difference in the war effort. Strategically, disrupting its supply of weapons from external sources and destroying Ukraine’s ability to construct weapons would likely be a priority. Tactically, a priority would likely be coordinating efforts by Russian Air Force assets with ground forces as they advanced. One might have expected that with the support of the Russian Federation’s ISR capabilities, a plan would have been in prepared for the Russian Air Force to shut the door on the transport of supplies through Ukraine, interdicting supply lines as fast as they were organized. However, that has not been the case. As the situation stands in the Ukraine campaign, the Russian Air Force has been near nonexistent relative to its size, supposed power, and the expectations of military analysts worldwide. Its best fighters and fighter-bombers have been regularly blasted out of the skies by the Ukrainian Armed Forces using both pricey sophisticated air defense weapons systems provided to Kyiv by Western powers as well as javelins and stingers, shoulder fired rockets operated by individual soldiers in the field. In response to the Ukrainian air defense threat, Russian Federation warplanes are not evading by flying sorties at 15,000 to 20,000 feet as they had over Syria. Russian aircraft are often remaining above Russian airspace and firing air launched cruise missiles into Ukraine. Since aircrews cannot identify targets across the border, airstrikes are made in areas where air intelligence reports the enemy is located. In attacking urban centers, that will always result in collateral damage in the form of civilian deaths and injury and the destruction of nonmilitary structures.

The Unwillingness to Speak Truth to Power

Commanders in all branches of the Russian Federation Armed Forces are surely unwilling to speak truth to power and inform Putin of what needed to be done in the West and that they were uncertain that their forces could achieve such an objective. One might imagine that suffering Putin’s coup de gueule would be the least of their worries. It has been a symptom common among those in service of authoritarian regimes throughout history. Skilled commanders are eventually bled dry of their strength to speak out about ill-laid military plans conjured in the minds of tyrannical leaders who are convinced of the certitude of their ideas. Many have been willing to bring reprisals against those commanders, even their best, who, for the sake of the forces they command and country, might step forward to disagree with them. It causes greatcharlie to cast its mind back to the 1981 pop song Der Kommisar“, essentially a scare story originally performed in both German and English by the Austrian artist Falco (Johann Hölzel). In the penultimate chorus of the English version, are the lyrics: “Don’t turn around, wa-uh-oh (yeah-yeah) / Der Kommissar’s in town, wa-uh-oh / He’s got the power and you’re so weak / And your frustration will not let you speak / La la la la la la.”

Commanders in all branches of the Russian Federation Armed Forces were surely unwilling to speak truth to power and inform Putin of what needed to be done in Western Ukraine and that they were uncertain that their forces could achieve such an objective. One might imagine that suffering Putin’s coup de gueule would be the least of their worries. This has been a symptom common among those in service of authoritarian regimes throughout history. Skilled commanders are eventually bled dry of their strength to speak out about ill-laid military plans conjured in the minds of tyrannical leaders who are convinced of the certitude of their ideas. Many of those leadsrs have been willing to bring reprisals against those commanders, even their best, who, for the sake of the forces they command and country, have stepped forward to disagree with them.

The Military Assistance Misread

On a more political level, perhaps Putin, his Security Council, and the Russian Federation General Staff were certainly completely wrong in their most likely conclusions about the degree of assistance the West would provide, what type of weapons and the impact they would have on the battlefield. The US has committed billions of dollars in security assistance to Ukraine since February 24, 2022. Relative to what the Ukrainians would eventually receive, what they had been provided to that point would hardly have been viewed as impressive by the Russian Federation General Staff.

Much as it had been planned by the US during the days of the Cold War, much of what would be used to repel a Warsaw Pact rampage through Western Europe would be taken from prepositioned stocks of supplies or they would be flown in and shipped in. During the Cold War, from 1969 to 1993, the annual REFORGER (Return of Forces to Germany) Exercises rehearsed that reinforcement and resupply to a great degree. It seems apparent now that thinking along the same vein in the Pentagon may have driven planning for the support of Ukraine in event of an attack. This idea would very likely be a kick-in-the-head to Russian Federation Armed Forces commanders and planners who had not have recognized the parallels as yet, never foresaw the possibility that the US and its NATO allies would essentially come at them, via the Ukrainians, in a similar way.. How obvious it all might seem now.

A Miscalculation on the Political Will of the West

Perchance Putin, his Security Council, and the Russian Federation General Staff miscalculated with regard to the degree of political will in the administration of US President Joe Biden and the US Congress to support Ukraine. Mixed messages regarding US commitment. The “No US boots on the ground” talk came a tad too early perhaps. It probably was music to ears in Moscow. It may have very well created the impression the US was pulling away or could potentially abandon Kyiv if Russia invaded. It may reasonably seem a bit of an overreach to impute to Putin and his acolytes, but one would only need to look at the varying degrees of overreach they have demonstrated with regard to the Ukraine matter.

Maybe Putin and his advisers concluded that European countries could become rankled enough to lend military support to Ukraine but perhaps they were a bit better than less concerned with the quality and quantity of their potential assistance and financial giving. They would expect the US to have the matter well-covered.

Perhaps they considered that Western European resolve to be engaged robustly, wholeheartedly in Ukraine would hinge on the resolve of the US to back its NATO allies. As for the US, much as alluded to earlier, its resolve would hinge on the success or failure of Russian forces in Ukraine, which really meant the capabilities demonstrated by the Ukrainian Armed Forces. Thereby, as long as the Russian Federation Armed Forces performed well, robust military assistance beyond javelins and stingers would not be sent into Ukraine. (Based on that suspected line of thought, one might compare how that situation for Ukraine as the invasion got underway to a degree paralleled, mutatis mutandis, the situation of the fledgling US in 1777. The decisive Battle of Saratoga in which the Continental Army defeated the British Army gave the French government the confidence to sign treaties of alliance and trade with the US government and joined its war against Great Britain.  Both countries agreed to fight the war until the US was truly independent, and neither would agree to a separate peace.)

As the efforts of the Russian Federation Armed Forces became desultory, ineffective, and proved surprisingly lacking at Kyiv and Kharkiv, it became easier for the US to give more to an Ukrainian cause with the real potential for victory and convince other NATO Allies to do the same albeit to far lesser degree. Panicked efforts by Kyiv to muster support and acquire weapons were practically wasteful as they clearly had the matter covered.

Misperceptions on Zelensky: A Force To Be Reckoned With

Of likely concern for Putin’s advisers, if not Putin, was surely Ukrainian President Volodymyr Zelensky who in the months before the invasion was already burning a bit brighter than the Kremlin expected. There were hints that he potentially could display all the qualities ascribed to great leaders. Doubtlessly, it was hoped in the Kremlin that Zelensky would find himself cutting a figure not unlike Felicia Hemans’ “Casabianca” (1826), crying out for an answer, in Zelensky’s case from Washington, that would never come and his world would go up in flames. As it was, Zelensky proved to be a lion of a man, stalwart of the Ukrainian cause, and a force to be reckoned with once the Russian Federation’s special military operation began. Western government officials and news media commentators alike would view Zelensky as having galvanized the Ukrainian people to resist Russia’s effort to swallow up their country. Zelensky also impressed with his entreaties to the world to come to the aid of his fellow countrymen in the best ways that they could. One might safely assume that his efforts influenced how countries with the wherewithal to respond to the Ukraine in its time of need, worked with him, and rapidly developed and implemented plans to provide considerable support for his country. Indeed, such positive perceptions of Zelensky, his impact, helped to attract aid groups, humanitarian volunteers, foreign fighters, helpful weapons, and financial resources to support Ukraine’s cause.

Ukrainian artillerymen fire US made and gifted M142 HIMARS (High Mobility Artillery Rocket System) (above) at Russian Federation forces holding Ukrainian territory. On a more political level, perhaps Putin, his Security Council, and the Russian Federation General Staff were certainly completely wrong in their most likely conclusions about the degree of assistance the West would provide, what type of weapons and the impact they would have on the battlefield. The US has committed billions of dollars in security assistance to Ukraine since February 24, 2022. Relative to what the Ukrainians would eventually receive, what they had been provided to that point could hardly have been perceived as impressive by the Russian Federation General Staff. Much as it had been planned by the US during the days of the Cold War, much of what would be used to repel a Warsaw Pact rampage through Western Europe would be taken from prepositioned stocks of supplies or would be flown in and shipped in. The annual Reforger (Return of Forces to Germany) Exercises rehearsed that reinforcement and resupply to some degree. It seems apparent now that thinking along the same vein in the Pentagon may have driven planning for the support of Ukraine in event of an attack.

The Distorting impact of Putin’s Kyiv Obsession

Surely, Putin’s singular emotional wants and wishes beyond what was militarily and strategically logical what drove the planning of the operation or was it formulated to the best of the abilities of trained, experienced, informed military officers in the Russian Federation Armed Forces. To Putin, everything about the government in Kyiv was anathema. Recall as aforementioned that in a very perplexing way, Putin stated in his appeal to the Ukrainian Armed Forces in his February 24, 2022 broadcast: “You swore the oath of allegiance to the Ukrainian people and not to the junta, the people’s adversary which is plundering Ukraine and humiliating the Ukrainian people.” He would go on to say: “I want to emphasize again that all responsibility for the possible bloodshed will lie fully and wholly with the ruling Ukrainian regime.” The indication s and implications of such statement are that Kyiv was indeed an obsession. To that extent, among those wants and wishes was toppling the government in Kyiv. Accomplishing that apparently became a priority with Kyiv in the planning of the invasion or whatever sufficed for its planning that distorted the picture Putin, his Security Council, and the Russian Federation General Staff of the battlespace. When examined in the context of this situation, how apposite the second quatrain of William Shakespeare’s Sonnet 116 becomes: “What wretched errors hath my heart commited, / Whilst it had thought itself so blessed never! / How hath mine eyes out of their spheres been fitted / In the distraction of this madding fever!”

If one might imagine Putin was a bit more pragmatic in his thinking and approach on Kyiv, it might be believed Putin may have thought the quickest road to victory was to cut off the head, the government in Kyiv and the command and control Ukrainian Armed Forces General Staff, from their forces in the field. If that could be achieved, Putin likely believed the mass surrender of Ukrainian troops in the field would come next. If that was the case, and what has transpired in Ukraine evinces to some degree that it was, then quite a bit of creative thinking was clearly involved in the invasion’s planning. 

However, by the time of the invasion, the government in Kyiv under Zelensky was well-tied in with its Western supporters. Thorough plans to provide escalating levels of military and financial assistance were surely already in place. Even though Zelensky initially displayed a great degree of uneasiness concerning the way in which the needs of Ukraine in the crisis would be met, it might be the case that what has come Ukraine’s way has far exceeded what he might have been reasonably expected. The shortsightedness apparent in thinking that the Kyiv government could be decapitated is stark. An informed guess is that the Ukraine enterprise was not hashed out with the best foreign and national security thinkers in Russia. One would get the idea it all was the result of the thinking of one man, certain of its roundness. Such impetuous schemes and boldness are at first sight alluring, but are difficult to handle, and in the end result in disaster.

Perhaps the real problem for Putin was not just that he relied on fortune, but was driven by blind rage and to a further extent blind ambition. Ukraine was one the bigger pieces he needed to pull together a respectable number of former republics into some simulacrum of the Soviet Union. While it may seem daylight madness for the reasonable to attempt that, for Putin, it makes perfect sense.

The Distraction of Covetous Thoughts?

As discussed in greatcharlie’s May 30, 2022 post entitled, “Putin the Protector of the Russian People or the Despoiler of Ukrainian Resources: A Look at War Causation and Russian Military Priorities in Ukraine”, long before he became the legendary Russian President that he is today, Putin was a doctoral candidate at Leningrad State University (now the University of St. Petersburg.) it was at the very end of his KGB service. (A fuller discussion of that period of Putin’s life can be found in greatcharlie’s March 31, 2017 post entitled “Book Review: Vladimir Putin, First Person: An Astonishingly Frank Self-Portrait by Russia’s President (Public Affairs, 2000)). The rector at the St. Petersburg State Mining University as of this writing, Vladimir Litvinenko, chaired the committee that awarded Russian President Vladimir Putin his doctorate in Economics in 1997. He recently stated that Putin’s thesis was titled “Strategic Planning of the Reproduction of the Mineral Resource Base of a Region Under Conditions of the Formation of Market Relations.” Putin’s economic studies, at what was then Leningrad State University, were most likely heavily doused in Marxian theory. Even more pertinent here, his research made him quite knowledgeable about the resources of countries that were formerly republics of the erstwhile Soviet Union. He would be very aware of Ukraine’s wealth in minerals, particularly in the eastern and southeastern regions. Indeed, Ukraine has a large supply of many valuable mineral and raw material resources. Ukraine in fact holds approximately 5 percent of the world’s mineral resources. Its significant mineral resources include: iron ore, coal, manganese, uranium ore, natural gas, oil, salt, sulfur, graphite, titanium, magnesium, kaolin, nickel, mercury. As for stocks of iron, manganese, titanium and uranium ore Ukraine is ranked first among European countries. As for mercury ore reserves, it is second only to Spain. Attendant to capturing sovereign territory in Ukraine, much as he grabbed Crimea eight year before, Putin may have wanted possession of its supply of many valuable mineral and raw material resources. Thinking in that direction may also have distorted his picture of what would be most important in invading Ukraine successfully. 

If this was Putin’s thinking and actions on this matter, at a more detailed level than discussed earlier, it would very much mirror that of Hitler during Nazi Germany’s invasion of the Soviet Union. As explained by the Imperial War Museum, industrialists in Germany most likely influenced Hitler’s decision to seize the Southern Caucasus in the Soviet Union and Stalingrad despite the concerns and entreaties of Oberkommando des Heeres with undertaking an operation of such distance from where the German Army was situated. As aforementioned, Operation Barbarossa, launched in June 1941, failed to achieve Hitler’s objective of decisively defeating the Soviet Union in a single campaign. German forces managed to occupy vast swathes of Soviet territory and industry. However, the audacious invasion finally ground to a halt in December 1941 on the forested outskirts of Moscow, the exhausted German Army stabilized its winter front in a line running roughly from Leningrad in the north to Rostov in the south. The strain of the harsh winter campaign upon the ill-prepared Wehrmacht, as well as the severe strain placed on the Luftwaffe in its prolonged efforts to air-supply the army’s string of city-bastions along the front, was tremendous. The Germans suffered a staggering 850,000 casualties. Interestingly, despite such considerable setbacks, the Germans believed the war was still going fairly well.

However, the following year, Hitler decided to go on the offensive. A decision by Hitler to launch a campaign in the Southern Caucasus region, south of the German front was spurred on by flawed information provided to him by economic advisers. They told Hitler that Germany would be incapable of sustaining the war without the resources in the Caucasus. North of the mountains was a center of agricultural production, which also held significant coal and metal reserves; to the south, was the region of Transcaucasia, a densely populated industrial center which produced some eighty percent of the Soviet Union’s annual oil production.Responsive to the wishes of the political leadership, by February 1942, the Oberkommando des Heeres was planning an offensive in the Caucasus region. 

On April 5, 1942, Hitler issued  Führerbefehle Nr. 41 (Fűhrer Directive No. 41), laying out the basic plan for the new offensive in the Soviet Union. The new plan would become known as Fall Blau (Case Blue). The main objectives were the major oilfields in the Caucasus and Transcaucasia: Maikop, Grozny and Baku. Senior German commanders were concerned about undertaking such a deep thrust into the opponent’s territory, fearing for the safety of their flank. Hitler’s remedy was to include in the plan the occupation of Stalingrad by Germany’s Italian, Hungarian and Romanian allies. The city would initially be taken by Germans. They would also establish a defensive line along the Don River and Volga River, which would be taken over by allies, too. Capturing Stalingrad would have the additional benefit of blocking all enemy traffic on the Volga, a crucial transport artery. To Hitler, the operation, which he deemed to be “of limited scope,” made perfect sense. Events proved otherwise.

A postage stamp from the erstwhile Deutsche Democratische Republik (German Democratic Republic, also known as the GDR or East Germany) circa 1963, that includes portraits of the Prussian military leader August Neidhardt von Gneisenau (left), Prussian field marshal Gebhard Leberecht von Blücher (right). In war, the value of a reliable, knowledgeable, skilled, and open-minded adviser who truly understands the concept and intent of his commander, cannot be underestimated. A model for interaction between a political leader or military commander with his advisers was the one between the renowned 18th century Prussian Army Marshal Gebhard Leberecht von Blücher with his chief of staff General August Neidhardt von Gneisenau. In Clausewitz: (Scarborough, 1979), author Roger Parkinson quotes von Blücher with regard to his relationship with his brilliant chief of staff as follows: “Gneisenau, being my chief of staff and very reliable, reports to me on the manoeuvres that are to be executed and the marches that are to be performed. Once convinced that he is right, I drive my troops through hell towards the goal and never stop until the desire goal has been accomplished–yes, even though the officers trained in the old school may pout and complain and all but mutiny.” Regarding an offer for von Blücher to receive an honorary degree at Oxford University following the Napoleonic War, Parkinson quotes him as saying: “Well, if I am to become a doctor, you must at least make Gneisenau an apothecary, for we two belong together always.”

Eyes Wide Shut

“A lion does not lose sleep over the opinion of sheep. ” is a quote often attributed to others, but it is very likely the words of Abū ʿAbdullāh Muhammad ibn Idrīs al-Shāfiʿī (28 August 767 — 19 January 820) was a Palestinian-Arab Muslim theologian, writer, and scholar, who was the first contributor of the principles of Islamic jurisprudence (Uṣūl al-fiqh). Often referred to as ‘Shaykh al-Islām’, al-Shāfi‘ī was one of the four great Imams, whose legacy on juridical matters and teaching eventually led to the Shafi’i school of fiqh (or Madh’hab). In his thoughts, Putin is surely completely alone. He appears indifferent to whether the rest of the world sees him as a bit out of touch or strange, apart from everything else. Outside of his super fans in Russia–many of whom have been unfortunate enough to meet their end, so very young, on fields, hills, and woods in Ukraine as questionably trained conscripts–certainly does not appear gallant or chivalrous. Putin is holding the course on Ukraine, not yielding in any way that might allow for authentic and substantive negotiations to end the conflict to begin. There still does not appear to be a line of talk available to even his closest advisers that could put a different complexion on the matter.

In war, the value of a reliable, knowledgeable, skilled, and open-minded adviser who truly understands the concept and intent of his commander, cannot be underestimated. A model for interaction between a political leader or military commander with advisers was the one between the renowned 18th century Prussian Army Marshal Gebhard Leberecht von Blücher with his chief of staff Prussian Army General August Neidhardt von Gneisenau. In Clausewitz: (Scarborough, 1979), author Roger Parkinson quotes von Blücher with regard to his relationship with his brilliant chief of staff as follows: “Gneisenau, being my chief of staff and very reliable, reports to me on the manoeuvres that are to be executed and the marches that are to be performed. Once convinced that he is right, I drive my troops through hell towards the goal and never stop until the desire goal has been accomplished–yes, even though the officers trained in the old school may pout and complain and all but mutiny.” Regarding an offer for von Blücher to receive an honorary degree at Oxford University following the Napoleonic War, Parkinson quotes him as saying: “Well, if I am to become a doctor, you must at least make Gneisenau an apothecary, for we two belong together always.”

An informed guess by greatcharlie is what has likely been a reliable intuition that had served him well along the way and allowed him a leg-up in giving subjects light were darkened with regarding parsing out the many aspects of this massive enterprise in Ukraine. Imagining Putin with his mind set on invading Ukraine come hell or high-water and refusing hear any suggestion that he delay until Russian forces were fully prepared to act, maximize every advantage and exploit the liabilities of Ukrainian forces to the fullest extent, and cope with all contingencies, if one might dare discuss such with him as noted earlier. 

One can only imagine Putin’s outward attitude and behavior at that time. The thought of it all curiously reminds greatcharlie a song sung by the renowned comic, Groucho Marx in the comedy film “Horse Feathers” (1932), not that there is anything remotely humorous about any aspect of the Ukraine War. When Marx’s  character, Professor Quincy Adams Wagstaff, is made the new head of Huxley College, and asked to offer some suggestions for his administration, the first verse of his musical response was: “I don’t know what they have to say / It makes no difference anyway / Whatever it is, I’m against it / No matter what it is or who commenced it / I’m against it.”

Putin Was Blinded by Rage

A dislike of Biden administration members inflamed the ardor of Putin and closest acolytes and they became determined to hurt Kyiv for siding with them. Imagining Putin’s mindset, he likely firmly believed before the invasion of Ukraine that he had a good understanding of the way many senior foreign and national security policy officials in the administration of US President Joe Biden, many of whom had held senior posts in the Obama administration, would respond to a move toward Ukraine. As discussed in greatcharlie’s January 25, 2022 post, Putin had experienced considerable dissatisfaction and disappointment in his dealing with Obama administration officials, particularly on Ukraine. As he may have perceived their actions in the past, they found it rather piquant to interact with him as if he were a lesser party, and given his positions and concerns no consideration. He likely believed they saw him as undeserving of respect. Communications were condescending, actions were often insulting. In an explosion of aggression, in part a response to his treatment, he grabbed Crimea with military force and fomented civil war in the Donbas. He engaged in other destabilizing efforts. Apparently, he was not completely satisfied with those actions, and held in his mind the idea of doing more. Seeing the appointment of many of those same officials in even higher posts in the Biden administration, most likely inflamed his sense with ardor to lash out violently. Everything those officials did in the Biden administration, Putin surely viewed with their past actions firmly in mind.

One might theorize that although he could not conventionally strike directly at those officials, Putin could reach the Zelensky government, members of which he may view as something worse than traitorous. He could well imagine the the fall of the Zelensky government would beset the Biden administration officials that he despised with a sense of loss and failure. Secondly, he would hope to cause torment and anguish among their “Ukrainian followers”. To that extent, perhaps it is not too fanciful to imagine that given current attitudes and behaviors of Putin, the invasion of Ukraine may also have been in part an opportunity for Putin to have a return engagement, a rematch, with former senior Obama administration officials serving in the Biden administration and settle an old score. 

Putin (seated left) during a Russian Federation Security Council meeting just days before the special military operation was launched. A dislike of senior members of the administration of US President Joe Biden likely inflamed the ardor of Putin and closest acolytes and they became determined to hurt Kyiv for siding with them. Imagining Putin’s mindset, he likely firmly believed before the invasion of Ukraine that he had a good understanding of the way many senior foreign and national security policy officials in the Biden administration, many of whom had held senior posts in the administration of US President Barack Obama, would respond to a move toward Ukraine. One might theorize that although Putin could not conventionally strike directly at those officials, he could reach the Zelensky’s government, members of which he may view as something akin to “traitorous”. He knew what anguish and loss the fall of Zelensky’s government would cause those US officials and secondly, their “Ukrainian followers”. To that extent, perhaps it is not too fanciful to imagine that given current attitudes and behaviors of Putin, the invasion of Ukraine may also have been in part an opportunity for Putin to have a return engagement, a rematch, with former senior Obama administration officials in the Biden administration and settle a score.

The Way Forward

It certainly appears to many reasonable people around the world since the Ukraine War began that currently there is a dearth of rational thinkers in the Kremlin. As is so often the case in the history of warfare, perception, better still, misperception, and not reality, drove the decisionmaking of Russian Federation Armed Forces commanders and war planners. Intriguingly, in parsing out the possibilities of this pivotal moment in the war’s planning, it would seem Putin’s special military operation did not necessarily have to turn out as it has.

Too many human lives have been lost in this war. The common wisdom is that the war never should have transpired, and no one should have died. No amount of gain in Ukraine would match the degree of loss in the cold terms of blood and treasure by Russia which started the war. Nevertheless, it will likely go on and plenty more dying will be done.

Conforming to the concept and intent of their political leader, Putin, senior commanders of the Russian Federation Armed Forces mistakenly thought that the campaign would be a short one, and that the Ukrainians would give in after suffering the shock of massive initial defeats. Being responsive to the concept and intent of their political leadership was, by their training and oath, the correct thing to do, but the very wrong thing to do at the same time. Res ipsa loquitur! Perhaps the only real hope for its end on the battlefield is Ukraine’s capture of every bit of sovereign territory, to include Crimea. As mentioned here, that is within the realm of possibility. Yet, Putin would hardly find that outcome satisfactory. If a satisfactory solution cannot be found for both sides on Ukraine, there will be good reason for the world to fear the worst from him. In the cavernous assembly halls of the Kremlin where Putin speaks before top officials of his government, the Russian Federation Duma, other key political leaders at the federal provincial and local levels–nationalists, ultranationalists, and Communists–prominent supporters of the United Russia Party, and business leaders, one will not spy happy faces, filled with optimism over the future ahead. There are mainly the morose visages of people who likely whisper among themselves that the genuine end to everything may be near. Perhaps Putin is equal to his rhetoric, and Russian Federation ICBM’s will make their way out of their kennels. His supporters would likely believe that. A solution to the Ukraine War must be found soon. Utere, non numera. (Use the hours, do not count them.)

The Russian Invasion of Ukraine: Brief Meditations on Putin and Small Suggestions That May Support Achieving Peace Through Diplomacy

Russian Federation President Vladimir Putin (above). in preceding posts, greatcharlie attempted to plunge a little deeper into Putin’s mind to better understand how he thinks and offer not just insights on decisions that he has made, but foresight on decisions he might make in the immediate future and beyond concerning Ukraine. What Western decisionmakers require is some reliable foresight into Putin’s actions. This essay will be too brief to put one in the full picture, even if greatcharlie had that faculty. The hope instead is to present glimmers of light that may stimulate thinking among readers on new lines of thought and provide kernels of ideas on how to proceed for foreign and national security policy analysts and decisionmaking.

On February 24, 2022, frightful predictions of a Russian invasion were realized as Russian forces moved into the country from several points, to include attacks from the territory of Belarus. So many had hoped that the possibility of war would remain just a possibility, and good minds in Western capitals would find some solution and reach an agreement with Moscow by which Ukraine, Russia, and NATO, and the West in general would be satisfied. Evidently, in Ukraine, many wanted to avoid war to the extent they acted as if it were an unlikely possibility. With the surprise and shock barely worn off most Ukrainians at the time of this writing, some have scrambled to move West in order to escape the oncoming death and destruction, and others have joined the Ukrainian Armed Forces or have simply taken up arms in order to be part of a planned insurgency. They are ready and regularly giving all in defense of their homeland.

Not unexpectedly, at the center of it all is Russian Federation President Vladimir Putin and his mindset. Concerning the Ukraine crisis, the matter with Putin runs deeper, more subtle than it seems many might suppose. One might be aware of this given the multitude of reports on Putin attempting to see reason in his actions. With considerable discomposure, greatcharlie states that many one sided analyses of Putin and the current crisis continue to stifle the advancement of understanding about him. That in turn may be hampering effective action and keeping diplomacy stagnated. One sided analyses fail to genuinely consider the other party’s thoughts and needs. In preceding posts, greatcharlie attempted to plunge a little deeper into Putin’s mind to better understand how he thinks and offer not just insights on decisions he has made but foresight on decisions he might make in the immediate future and beyond. To be effective, top foreign and national security policy decisionmakers need to attain a full understanding of both Putin and new situations as they begin to develop. This essay will be too brief to put one in the full picture, even if greatcharlie had that faculty. The hope instead is to present glimmers of light that may stimulate the thinking of readers on new lines of thought and kernels of ideas on how to proceed mainly for US foreign and national security policy analysts and decisionmakers, as well as analysts and decisionmakers of other Western governments, too. The word heart-wrenching marginally describes scenes viewed worldwide on broadcast and online newsmedia of Ukrainians ruined by war. One cannot look without compassion at what is happening there. With emotions about Ukraine running high, greatcharlie approaches the subject of Ukraine with caution. What comes to mind are words of the 17th century French actor and master of comedy in Western literature, Jean-Baptiste Poquelin, known as Molière. In one of his best-known dramas, “The Misanthrope” or “Le Misanthrope ou l’Atrabilaire Amoureux”, Molière writes the sardonic advisory to which greatcharlie has always paid heed: “That any gentleman should always keep in stern control this writing itch we’re seized with; That he must hold in check the great impatience We feel to give the world these idle pastimes; For, through this eagerness to show our works, ‘Tis likely we shall cut a foolish figure’.”

Putin at press conference following bilateral meeting with Hungarian Prime Minister Victor Orban on February 1, 2022 (above). Putin insists that his government invaded Ukraine for the sake of the Russian people and ethnic-Russians in Ukraine. Surely, Putin doubtlessly believes that everything he does is for the sake of the Russian people. To go a step further, Putin very likely sees himself as a sort of avenger of ethnic-Russians in Ukraine, defender of the people of Russia, and protector of the Russian Orthodox Church and all else that is Russian.

Putin’s Explanation for the War

In his February 24, 2022 televised speech on Ukraine, Putin laid out the reasoning behind his decision to invade Ukraine. Outlining his authority to invade Ukraine, in his own words, Putin explained: “In accordance with Article 51 (Chapter VII) of the UN Charter, with permission of Russia’s Federation Council, and in execution of the treaties of friendship and mutual assistance with the Donetsk People’s Republic and the Lugansk People’s Republic, ratified by the Federal Assembly on February 22, I made a decision to carry out a special military operation.” As for his reasoning for the invasion, Putin stated: “The purpose of this operation is to protect people who, for eight years now, have been facing humiliation and genocide perpetrated by the Kiev regime. To this end, we will seek to demilitarise and denazify Ukraine, as well as bring to trial those who perpetrated numerous bloody crimes against civilians, including against citizens of the Russian Federation.” As for the scope of the special military operation, Putin explained: “It is not our plan to occupy the Ukrainian territory. We do not intend to impose anything on anyone by force. At the same time, we have been hearing an increasing number of statements coming from the West that there is no need any more to abide by the documents setting forth the outcomes of World War II, as signed by the totalitarian Soviet regime. How can we respond to that?”

Boiled down, Putin stated with conviction that his government invaded Ukraine for the sake of the Russian people and ethnic-Russians in Ukraine. Surely, Putin doubtlessly believes that everything he does is for the sake of the Russian people. To go a step further, Putin very likely sees himself as a sort of avenger for ethnic-Russians in Ukraine, defender of the people of Russia, and protector of the Russian Orthodox Church and all else that is Russia. For almost every other national leader, there is no valid argument to support his choice. Most of the world would likely agree that what he has done is brustschmerzangst, strange and just wrong. In taking this dark, murderous route of invading Ukraine, Putin has sufficiently made the case, once again, that he can be a cruel monster. Few could reasonably deny that Putin cuts the figure of an immoral and cruel ethno-religious nationalist, not exactly steered spiritually by the precepts and strictures of the Russian Orthodox Church, but seemingly by obsession with his own hatred. Hardly any newsmedia commentators in the West, just to stir debate, would go through any pains to single out the points in Putin’s favor. Given choices of whom to alienate on the world stage, Putin has made the top of list. 

In Book X, Section 38 of his Meditations (161 AD-180 AD) the Roman Emperor and Stoic philosopher, Marcus Aurelius Antoninus (April 26, 121 AD-March 17, 180 AD), stated the following about the inner thinking of individuals: “Remember that what pulls the strings is the force hidden within; there lies the power to persuade, there the life,—there, if one must speak out, the real man.” In continuing its discussion on Putin, greatcharlie recognizes that many readers may not find the discussion immediately following satisfying, but it is asked that readers allow some room for maneuver on the following points.

All that has transpired in Russia since Russian President Boris Yeltsin declared the Russian Federation as a sovereign country, no longer a republic of the collapsed Soviet Union, has been the manifestation of Putin’s vigorous, and yes, masterful mind. Even the criminal mind can be regarded as masterful. Coldly exploring Putin, given his accomplishments despite his atrocious actions, it could be assessed that Putin is indeed a noteworthy individual. (The same might be said of Satan!) Perhaps some might coldly assess that Putin has been somewhat brave in the way that he spoke for what he says he believes in, brave in the way he takes on challenges presented to him and challenges he creates. He is ruled by his passions. if an Russian Orthodox Catholic priest, he would become the Primate. If a musician, he would rule the stage. None of this is not stated out of any respect or deference, but clear-headed consideration.

Within the foreign and national security bureaucracies of Western governments, formulating the best response diplomatically on Ukraine will mean better understanding Putin and how he thinks. Analyses within the US foreign and national security bureaucracies, given their access of analysts to intelligence reports, access to classified information collected by friendly foreign governments, their institutional knowledge and experience, etcetera, are understood to be a cut above that of the mainstream newsmedia. Stating this with no intention to offend, it would seem given outcomes and newsmedia reporting on the matter, that presently despite special sources, greater capabilities, and nuances, those bureaucracies are seemingly producing analyses somewhat similar to what the aforementioned newsmedia has on Putin. As a result, finding answers to cope effectively with Putin has been made far more challenging. It was once common wisdom that significant US involvement alone in earlier times would have had a steading effect. However, it does not appear to have such powers at the present. Neither promises nor “vague” threats from the US could induce Putin to pull back his forces and refrain from invading Ukraine. International law and maintaining international peace and security mean absolutely nothing to Putin any more.

The agreement Moscow signed promising not to invade Ukraine is the Budapest Memorandum. Drawn up in 1994, the Budapest Memorandum essentially states that Ukraine, having agreed to relinquish its nuclear arsenal which at the time was the third-largest in world, would be assured its sovereignty and territorial integrity by the other countries that signed the deal. Ukraine’s nuclear warheads would be transferred to Russia for decommissioning, and Ukraine would join the Nuclear Nonproliferation Treaty as a non-nuclear state. Other than then Ukrainian President Leonid Kuchma, the memorandum was signed by then US President Bill Clinton, Russian Federation President Boris Yeltsin, and the United Kingdom Prime Minister John Major. With regard to assuring Ukraine’s sovereignty and territorial integrity, Ukraine was only provided a politically binding security assurances to respect its independence and sovereignty which guaranteed its existing borders. The US was unwilling to agree to intervene then should Ukraine’s sovereignty be breached, and it clearly remains unwilling today. The government in Kyiv in 1994 very strangely put Ukraine in a wickedly precarious situation, relying too heavily on the goodwill of other countries. They did not know what the future would bring. Surely, they could not forsee or imagine the present-day Russian invasion. For Ukrainians, the deal reached in Budapest was a very bad one.

Putin interrogating the head of the Russian Federation Foreign Intelligence Service on February 21, 2022 during a Security Council meeting the Kremlin. (above). Western analysts have created the impression that they are unable to see Putin straight. CNN on March 1, 2022 reported that the US intelligence community has made evaluating Putin’s state of mind a top priority, seeking to establish how that is affecting his handling of the rapidly escalating Ukraine crisis. Although the US intelligence community has spent many years evaluating Putin, and possesses a considerable institutional knowledge about him, CNN noted that it has “a notoriously poor view into his day-to-day decision-making. The Kremlin remains what intelligence officials call a “hard target”–incredibly difficult to penetrate through traditional espionage.”

The Hopeless Search for a ‘Good Reason” for This War

Concerning the reasons for things,, the renowned “spy novelist” John Le Carre in his blockbuster work Tinker Tailor Soldier Spy (Simon & Schuster, 1972) had his main character explain reason can be founded in three ways: “reason is logic”; “reason is motive”; and, “reason is a way of life.” Among those who examine Putin regularly, some surely would find his recent decision-making very difficult to reconcile within the settled order of nature. To that extent it is worth examining because it is inexplicable. The rational part of greatcharlie insists upon it.

A common theme heard in Western foreign policy circles and newsmedia concerning Putin’s attitude and behavior before and during the first few days of the invasion was that Putin was bent on reestablishing the Soviet Union as it existed before its collapse. Standing in the way of that expansion, was his perception of alleged expansionist aims of NATO. That perceived NATO expansion into Ukraine, which remains a real “threat,” an absolutely horrifying possibility to Putin and his advisers. Boastfully, provokingly Ukrainian President Volodymyr Zelensky amplified the notion of Ukraine joining NATO before and more so right after the invasion. and before the invasion, his words likely stayed with Putin much as a song that would not get out of his head. In the fragile negotiations organized on the initiative of Ukraine and Russia since the invasion began, and endorsed by the US and other Western countries, Zelensky has back tracked on the matter, saying NATO membership is no longer an immutable position of Kyiv. However, that is due to the fact that far greater matters concerning Ukraine’s future, including the retention of its territory, are now at stake. Once a very weighty issue is now a simple bargaining chip of value yet to be fully determined at the negotiating table.

Intriguingly, US intelligence officials have made their assessments that Putin cannot be seen straight. CNN on March 1, 2022 reported that the US intelligence community has made evaluating Putin’s state of mind a top priority, seeking to establish how that is affecting his handling of the rapidly escalating Ukraine crisis. Although the US intelligence community has spent many years evaluating Putin, and possesses a considerable institutional knowledge about him as greatcharlie alluded to earlier when discuss the US foreign and national security bureaucracies, CNN noted that it has “a notoriously poor view into his day-to-day decision-making. The Kremlin remains what intelligence officials call a “hard target”–incredibly difficult to penetrate through traditional espionage.” In fact, CNN reported, based on information from an official source, that there has not been any new comprehensive assessment by the US Intelligence Community that indicates a particular change to Putin’s overall health. (It would appear that Gospodin Vladimir Vladimirovich has been terribly unhelpful concerning US efforts to evaluate him!) The fact that such a gap in knowledge and understanding about aspects of Putin’s life exist should not at all be satisfactory for the US Congress or for executives and managers within the Intelligence Community, itself.

Interestingly enough, there was also no serious discussion of Putin being off-key in the months leading to the invasion or even on February 24, 2022. In preceding posts on Ukraine, greatcharlie noted with curiosity that national leaders in the West, despite declaring Putin a violent, loathsome man, rarely if ever put into question his mental state. Thiere was no discussion of Putin’s mental state as he began the build up of Russian forces near Ukraine in 2021. On March 31, 2021, when the US European Command raised its awareness level to “potential imminent crisis” in response to estimates that over 100,000 Russian troops had been positioned along its border with Ukraine and within Crimea, in addition to its naval forces in the Sea of Azov. Indeed, European Command made it quite clear that there were signs of potential violence. An assessment of Putin’s mental state that greatly called into question his ostensible preparations to blindly inflict harm on the people of Ukraine may have changed everything for top decisionmakers in Western governments..

Observing how Putin was being perceived in Moscow, there was apparently no concern among political leaders about his mental state. indeed,, he was actually provided even greater powers by Russian political leaders to carry out his plans for Ukraine. On February 15, 2022, Russia’s parliament, the State Duma, voted overwhelmingly to ask Putin to formally recognize Donetskaya Narodnaya Respublika (Donetsk People’s Republic)or Donetsk and Luganskaya Narodnaya Respublika (Lugansk People’s Republic or Luhansk People’s Republic) or Luhansk. Before the invasion, Donetsk and Luhansk were still inhabited by somewhat large populations despite the heavy fighting between Ukrainian forces and separatists within them. According to the World Population Review, in 2021, the population in Donetsk was 899,325 and in Luhansk was 398,505. Fighting in both areas was exceedingly heavy. Eventually both movements declared their provinces independent republics. Putin took the step authorized by the Duma. The greatest concern in the West when Hi did so was the fact that it meant a formal end to Russia’s role in maintaining the integrity of the ceasefire between Ukrainian and separatist forces constructed under the Minsk Agreements. Duma Speaker Vyacheslav Volodin said on Telegram after the vote: “Kyiv does not comply with the Minsk agreements. Our citizens and compatriots living in Donbas need help and support,” He went on to state: “In this regard, [Duma lawmakers] believe the recognition of the Donetsk and Luhansk People’s Republics will create grounds for guaranteeing the security and protection of their inhabitants from external threats.”

Returning more directly to the issue of Western perceptions of Putin’s mental state, surely, there are those among US foreign and national security policy analysts who conversely would assess that his recent actions are consistent with those prior. An example provided in greatcharlie’s January 25, 2022 post entitled, Resolving the Ukraine Crisis: How Better Understanding Putin and the Subtle and Profound Undercurrent Influencing His Thinking on the West Might Help”, Putin would be willing to Russia to challenging and uncertain military operations. The prime example offered was the second on Chechnya by Russian forces in 1999. Russian forces went in depite having been unsuccessful in an operation there three years earlier. Speculation about Putin’s mental health became most popular after his broadcast address on his decision to order a special military operation against Ukraine. Reportedly, the most shocking aspect of the address for top officials was the justification he gave for the invasion. On February 25, 2022, US Senator Marco Rubio relayed on Twitter @marcorubio that Putin “has always been a killer, but his problem now is different & significant,” suggesting he was basing his assessment on intelligence briefings given to him as the vice chair of the Senate Intelligence Committee. He tweeted further: “I wish I could share more,but for now I can say it’s pretty obvious to many that something is off with #Putin.” Summing up all that he could say publicly what he gleaned from the briefing Rubio stated: “It would be a mistake to assume this Putin would react the same way he would have 5 years ago.”

CNN on March 1, 2022 noted that following the Congressional briefing that Rubio attended, the floodgates further opened regarding Putin’s mental state. Former US Ambassador to Russia Michael McFaul who served in that post during the administration of US President Barack Obama tweeted that Putin had “changed,” and sounded “completely disconnected from reality” and “unhinged.” Former Director of National Intelligence Jim Clapper, who also served under Obama, referred to Putin on CNN as “unhinged” and warned, “I worry about his acuity and balance.”

A photo from the Stasi archives in Dresden picture of Putin (second from the left) standing with a group of senior Soviet and East German military and security officers and officials. There are those who would point to Putin’s service in the Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, and emphasize that his behavior is reflective of the virtual nature of that erstwhile organization’s cold-blooded reputation, brutish methods, and the sinister mindset of its leadership. Yet, through that service, he certainly would be aware of numerous acts of sacrifice and valor by Ukrainians in the service of the KGB. It would seem remembering those KGB comrades would cause Putin pause and compel him to reflect hard on such a decision to invade Ukraine. Fraternité! However, clearly such thoughts about his KGB service provided no barrier to his actions.

When one moves into the realm of conjecture, one guess is as good as another. What may not make sense to one, might speak volumes to another. Among other, more recherché, even outré, explanations for Putin’s behavior are the following. There are those who would point to Putin’s service in the behemoth Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, and emphasize that his behavior is reflective of the virtual nature of that erstwhile organization’s cold-blooded reputation, brutish methods, and the sinister mindset of its leadership. Yet, that same KGB service surely had Putin working alongside Ukrainians who he appreciated and observed serving the service well in what was once East Germany. He certainly would be aware of numerous acts of sacrifice and valor by Ukrainians in the service of the KGB. It would seem remembering those KGB comrades would cause Putin pause and compel him to reflect hard on such a decision to invade Ukraine. Fraternité! However, clearly such thoughts about his KGB service provided no barrier to his actions. Interestingly, as Putin place much concern over the history of Ukraine in his calculus of how to proceed, he conversely would likely say thoughts of his KGB would not be relevant. What is most pertinent are circumstances as they exist today! Hearing his thoughts on the intersection of these matters would surely reveal an intriguing duality. 

Putin himself has played a active deliberate role in glazing over any prospective windows into him with staged scenes for worldwide newsmedia distribution. The truth of the moment is anyone’s guess. Putin likely has a near bottomless bag of tricks. The more recherché his behavior, the greater attention it gets and the greater its chances of retention. In the aforementioned CNN report of March 1, 2022, it is noted that one US official told the newsmedia house that US intelligence officials “have been on guard for the possibility that Putin’s strategy may well be to project instability, in an attempt to push the US and allies to give him what he wants for fear that he could do worse.” Still further, Putin, after all, is a fan of comedy. Supposedly, one of his films was “Ivan Vasilyevich Menyayet Professiyu” (“Ivan Vasilyevich Changes Profession”) (1973), a Soviet comedic film in which Ivan IV “The Terrible” is accidentally transported by time a machine in a apartment building to the present and the apartment building superintendent and a petty thief are sent to the 16th century a try to require themselves as Ivan the Terrible and a duke of his court. Absolute madness ensues. Russian cultural references, dry humor, and crni humor, is found in many of the characters’ lines. What may have tickled Putin about the film is not so much what was unexpected, but those things that were also outré. (When Putin is in a good mood, certainly unlikely the way he is today, one might speak figuratively that even the heavy planet Saturn which symbolizes maturity, responsibility, discipline, and stewardship, would laugh and leap with him. Yet, this is beside the question.) Surely, there is nothing humorous about anything Putin has done in Ukraine, but again concerning the diplomatic front and political warfare front, as mentioned the US Intelligence Community might agree, he is well-aware of the type of impact certain images, some possibly facetious, would most likely have upon Western observers.

Considering Putin’s recent behavior, perhaps it is not so much that Putin has changed, it may be the case that he has just gotten a little older, and that could have been expected. With age everything changes. Without any intention to appear ageist, greatcharlie suggests that this is an idea lost of many under 65. Of course, not every senior is the same. Some individuals actually shine brighter and find their true selves. Some do not change at all, either for the better or for the worse. Yet, perhaps it is very well the case that Putin, at 69, has entered a new era and has lost interest in what he might perceive as shoe-horning himself into Western constructs to gain some sense of attainment, sense of arrival, sense of assuring Russia a place on the world stage, the first tier. Knowing that Russia is a superpower, whether foreigners agree or not, may now be enough for him. Ukraine evinces this suggested mindset well.

While greatcharlie always senses it is moving out on shaky ground when suggesting medical causality for an individual’s behavior, but perchance Putin may have a B1 vitamin deficiency. As an odd symptom of B1 vitamin deficiency, one can become disconnected from reality, not rational, or reasonable. 

Surely, the notion that there may be something supernatural about Putin’s attitude and behavior at this time would offend all reason of most observers and analysts alike. Yet, perhaps Putin may have been put under the control of a dark shaman who has sinister intentions. Hopefully on this point, greatcharlie will not be accused of faulty humor. What would be most supportive of efforts to get to heart of the matter would be an explanation from disciplined reasoning that would be albeit more prosaic, not guesses that boil down to nonsense. As touched upon earlier, claiming that Putin is unstable and behaving irratically is not an answer. It is an expression of symptoms of observed, associates them with actions,  but that information does not explain their cause. To that extent, such assessments presumably unintentionally mask the failure to find real answers, develop useful information. National leaders and policymakers cannot neither develop worthwhile plans nor comfortably base decisions on such.

Watching the West interact with Ukraine since the collapse of the government led by his stern ally former Ukrainian President Viktor Yanukovych following the Orange Revolution and Euromaidan, Putin likely felt more and more that  remnants of the former Soviet Empire which he hoped to hold on to were being chipped away by the West, bit by bit. Surely, from his lens, the military dimension of the relationship remains at the forefront as he surely perceives it as an important feature of Western efforts expand eastward toward Russia’s border. Indeed, NATO forces are creeping closer to Russia’s border, and that the government in Kyiv has been pulled far from Moscow’s political reach. Putin might believe any reasonable observer would accept and agree with his thinking about a threat from the West, and that he has logically reached that conclusion. given Western actions.

With further regard to Euromaidan, since then, national administrations in Kyiv that came to power after the exit of Yanukovych have gambled on what they wanted and saw as a sure bet, partnership with the West, which attendantly meant the exclusion of nearly everything from Russia that they could exclude safely, reasonably. Kyiv believed Ukraine, its growing partnership with the West, seemingly formalized with the US-Ukraine Strategic Security Pact along with existing agreements such as the Budapest Memorandum, the Minsk Agreements, meant greater security for Ukraine. Kyiv took a considerable risk taking that approach, and it lost. Although it should not have happened, but nonetheless did happen, Putin responded. He figuratively closed the casino and all the winnings on the tables. By tethering itself to the West, Ukraine surely did not become more secure. Perhaps the real issue is that Putin sees Ukraine as a whole-minus the Luhansk People’s Republic and Donetsk People’s Republic–traitorous, since Kyiv, under its present leadership, for all intents and purposes, has turned its back to Russia immutably. Ukraine had become the object of Putin’s pain.

One might consider that Putin’s most recent behavior and choices may possibly be part of a pattern of expression and actions seemingly given too little serious attention in not just the run up to the invasion but years before. Indeed, for greatcharlie, an reliable undemanding, uncomplicated way to develop an understanding of Putin’s perspectives on Ukraine would be to thumb through his expressions on the Ukraine matter. There have been numerous reports and transcripts of chief executive level telephone conversations, speeches, statements, and declarations that should not have left anyone in doubt that he was coming for Ukraine at some point if the matter were not addressed in some fulsome way beforehand. A brief sampling of pertinent expressions by Putin, to avoid being “too prolix,” reveals his concerns, sense of vulnerability to the West and that these expressions were both persistent and consistent.

US President Barack Obama during a 90-minute phone call with Putin from Washington on March 2, 2014 (above). One might consider that Putin’s most recent behavior and choices may possibly be part of a pattern of expression and actions seemingly given too little serious attention in not just the run up to the invasion but years before. There have been numerous reports and transcripts of chief executive level telephone conversations, speeches, statements, and declarations that should not have left anyone in doubt that he was coming for Ukraine at some point if the matter were not addressed in some fulsome way beforehand. During their March 2014 call, Putin told Obama that the US-backed interim Ukraine administration was threatening “the lives and health of Russian citizens and the many compatriots” in Crimea. Putin declared, “Russia retains the right to protect its interests and the Russian-speaking population of those areas.”

2014 Telephone Conversation with Obama

Reportedly, during a 90-minute phone call with Putin from Washington on March 2, 2014, Obama warned that Russia could face “serious repercussions” unless it halted military operations in Ukraine. Obama further stated to Putin that his actions were a “clear violation of Ukrainian sovereignty and territorial integrity, which is a breach of international law.” Obama additionally urged Putin to pursue “direct engagement with the government of Ukraine” and support the “dispatch of international observers under the auspices of the United Nations Security Council or the Organisation for Security and Cooperation in Europe (OSCE). In a reported statement from the Kremlin, Putin told Obama, bluntly, that the US-backed interim Ukraine administration was threatening “the lives and health of Russian citizens and the many compatriots” in Crimea. Putin reportedly went on to say, “In the case of any further spread of violence to eastern Ukraine and Crimea,” and he warned, “Russia retains the right to protect its interests and the Russian-speaking population of those areas.” However, in an official statement from the Kremlin concerning the telephone call Putin had Obama on March 2, 2014, it was declared that “in reply to Obama’s concern over the possibility of the use of Russian armed forces on the territory of Ukraine, Vladimir Putin drew his attention to the provocative and criminal actions on the part of ultranationalists who are in fact being supported by the current authorities in Kiev.” The Kremlin statement further noted that “The Russian President spoke of a real threat to the lives and health of Russian citizens and the many compatriots who are currently on Ukrainian territory. Vladimir Putin stressed that in case of any further spread of violence to Eastern Ukraine and Crimea, Russia retains the right to protect its interests and the Russian-speaking population of those areas.” Themes from the Russian side of that conversation still heard today were the threat of ultranationalists (neo-Nazis) and threat to the lives and health of Russian citizens and compatriots who were in Ukraine. Notably, Putin deliberately describes Ukraine, a sovereign country as a territory. It was a subtle utterance Obama might have missed the significance of.

Putin’s Speech at the State Duma on March 18, 2014

One of Putin’s greatest expressions of vulnerability in his March 18, 2014 speech declaring Russia’s annexation of Crimea. In the official Kremlin transcript of that speech, Putin is quoted as stating the following on Ukraine and the rise of ultranationalists: I would like to reiterate that I understand those who came out on Maidan with peaceful slogans against corruption, inefficient state management and poverty. The right to peaceful protest, democratic procedures and elections exist for the sole purpose of replacing the authorities that do not satisfy the people. However, those who stood behind the latest events in Ukraine had a different agenda: they were preparing yet another government takeover; they wanted to seize power and would stop short of nothing. They resorted to terror, murder and riots. Nationalists, neo-Nazis, Russophobes and anti-Semites executed this coup. They continue to set the tone in Ukraine to this day. On the matter of ethnic-Russians in Ukraine, to which Putin refers directly as Russians, he stated: “The new so-called authorities began by introducing a draft law to revise the language policy, which was a direct infringement on the rights of ethnic minorities. However, they were immediately ‘disciplined’ by the foreign sponsors of these so-called politicians. One has to admit that the mentors of these current authorities are smart and know well what such attempts to build a purely Ukrainian state may lead to. The draft law was set aside, but clearly reserved for the future. Hardly any mention is made of this attempt now, probably on the presumption that people have a short memory. Nevertheless, we can all clearly see the intentions of these ideological heirs of Bandera, Hitler’s accomplice during World War II.” Putin would add further in the speech: “Those who opposed the coup were immediately threatened with repression. Naturally, the first in line here was Crimea, the Russian-speaking Crimea. In view of this, the residents of Crimea and Sevastopol turned to Russia for help in defending their rights and lives, in preventing the events that were unfolding and are still underway in Kiev, Donetsk, Kharkov and other Ukrainian cities.” As for the legitimacy of the government in Kyiv and attendantly the sovereignty of Ukraine itself, Putin explained: “It is also obvious that there is no legitimate executive authority in Ukraine now, nobody to talk to. Many government agencies have been taken over by the impostors, but they do not have any control in the country, while they themselves – and I would like to stress this – are often controlled by radicals. In some cases, you need a special permit from the militants on Maidan to meet with certain ministers of the current government. This is not a joke – this is reality.” Then, declaring his authority to act of what he perceived as a dangerous situation, Putin stated: “Naturally, we could not leave this plea unheeded; we could not abandon Crimea and its residents in distress. This would have been betrayal on our part.” The same the three elements were repeated in the speech as in the telephone call with tge March 2014 Obama telephone call, Ukraine was a base for neo-Nazis, ethnic-Russians lives were endangered, and Ukraine’s sovereignty was questionable.

Concerning Putin’s sense of vulnerability to the West, it was laid out in the open for all to hear. To summarize, Putin vented his anger at the US and EU, enumerating Western actions that fostered his contempt. He mentioned: Russia’s economic collapse, which many Russians recall was worsened by destructive advice and false philanthropy of Western business and economic experts that did more to cripple their country; the expansion of NATO to include members of the Soviet Union’s own alliance, the Warsaw Pact; the erroneous Russian decision to agree to the treaty limiting conventional forces in Europe, which he referred to as the “colonial treaty”; the West’s dismissal of Russia’s interests in Serbia and elsewhere; attempts to bring Georgia and Ukraine into NATO and the EU; and, Western efforts to instruct Russia on how to conduct its affairs domestically and internationally. Doubtlessly, the aggregate of US moves eastward in Europe over time so inflamed Putin’s sense of ardor to respond militarily.

Putin’s July 2021 Essay on Ukraine

During the Summer of 2021 and more so during the run up to the invasion, many passed their eyes over Putin’s July 12, 2021 essay entitled, “On the Historical Unity of Russians and Ukrainians” All in all, it is very interesting as a piece of history but has little to do with the present realities in the minds of reasonable thinkers and could hardly be the sort of thing that civilized, technologically advanced, industrial societies would go to war over. In greatcharlie’s view, it is essential to take note of Putin’s understanding of the matter to discern his true mindset lies, how his thinking works on the matter. It will doubtlessly have an impact on how he may settle on the matter as events take shape on the battlefield. 

Although Putin goes as far back as the odyssey of the Ancient Rus, dwells in the history of the 14th, 15th, and 16th centuries and moves more expediently through the 17th and 18th centuries, to explain the historical ties and the bond between Ukrainians and Russians, perhaps most relevant to his view of Ukraine’s place as a sovereign country starts with the Bolsheviks. Boiled down what can be gathered by greatcharlie from the essay as concisely as possible, greatcharlie recounts the following highlights from the essay. Putin explains that following the February Revolution, in March 1917, the Central Rada was established in Kiev, intended to become the organ of supreme power. In November 1917, in its Third Universal, it declared the creation of the Ukrainian People’s Republic (UPR) as part of Russia. In December 1917, UPR representatives arrived in Brest-Litovsk, where Soviet Russia was negotiating with Germany and its allies. At a meeting on 10 January 1918, the head of the Ukrainian delegation read out a note proclaiming the independence of Ukraine. Subsequently, the Central Rada proclaimed Ukraine independent in its Fourth Universal. Putin then explains that Ukrainians after signing a separate treaty with German bloc countries  Rada delegates signed a separate treaty with the. Germany and Austria-Hungary which needed Ukrainian bread and raw materials. In order to secure large-scale supplies, they obtained consent for sending their troops and technical staff to the UPR. Putin states that in fact, this was used as a pretext for occupation, by 1918, Ukraine was in his view essentially under German protectorate. Following the revolutionary events in Germany and Austria-Hungary in 1918, Ukrainian nationalists proclaimed the West Ukrainian People’s Republic (WUPR) and, in January 1919, announced its unification with the Ukrainian People’s Republic. 

Putin goes on to explain that in July 1919, Ukrainian forces were crushed by Polish troops, and the territory of the former WUPR came under the Polish rule. According to Putin, in April 1920, Symon Petliura signed a secret conventions on behalf of the UPR Directorate, giving up–in exchange for military support–Galicia and Western Volhynia lands to Poland. In May 1920, Petliurites entered Kiev in a convoy of Polish military units. Yet, as early as November 1920, following a truce between Poland and Soviet Russia, the remnants of Petliura’s forces surrendered to those same Poles. Putin, however, also reflects back to note that in early 1918, when the Donetsk-Krivoy Rog Soviet Republic was proclaimed, it asked Moscow to incorporate it into Soviet Russia. This was met with a refusal. During a meeting with the republic’s leaders, Soviet Premier Vladimir Lenin insisted that they act as part of the pre-existing Soviet Ukraine. On 15 March 1918, the Central Committee of the Russian Communist Party (Bolsheviks) directly ordered that delegates be sent to the Ukrainian Congress of Soviets, including from the Donetsk Basin, and that ”one government for all of Ukraine“ be created at the congress. The territories of the Donetsk-Krivoy Rog Soviet Republic later formed most of the regions of south-eastern Ukraine. 

Putin explains that under the 1921 Treaty of Riga, concluded between the Russian SFSR, the Ukrainian SSR and Poland, the western lands of the former Russian Empire were ceded to Poland. However, he reminds that in 1939, the USSR regained the lands earlier seized by Poland. A major portion of these became part of the Soviet Ukraine. In 1940, the Ukrainian SSR incorporated part of Bessarabia, which had been occupied by Romania since 1918, as well as Northern Bukovina. In 1948, Zmeyiniy Island (Snake Island) in the Black Sea became part of Ukraine. Imaginably, poignant to Putin was relaying the fact that in 1954, the Crimean Region of the RSFSR was given to the Ukrainian SSR, in gross violation of legal norms that were in force at the time. Putin’s reality on that matter founded his action to capture Crimea in 2014. It may be enough to comment on the this part of essay by quoting the 20th century US financier and statesman, Bernard Baruch, who remarked: “Every man has a right to his opinion, but no man has a right to be wrong in his facts.”

As for the Ukrainian identity, Putin explained that “In the 1920’s-1930’s, the Bolsheviks actively promoted the ”localization policy“, which took the form of Ukrainization in the Ukrainian SSR. Symbolically, as part of this policy and with consent of the Soviet authorities, Mikhail Grushevskiy, former chairman of Central Rada, one of the ideologists of Ukrainian nationalism, who at a certain period of time had been supported by Austria-Hungary, was returned to the USSR and was elected member of the Academy of Sciences. Putin emphasized that “The localization policy undoubtedly played a major role in the development and consolidation of the Ukrainian culture, language and identity. At the same time, under the guise of combating the so-called Russian great-power chauvinism, Ukrainization was often imposed on those who did not see themselves as Ukrainians.”

The decision of the Ecumenical Patriarch of Constantinople Bartholomew I to allow a separate Ukrainian Orthodox Catholic Church from the Russian Orthodox Church for many in Russia may have oddly validated Putin’s concern that West was using its influence to pull Ukrainians away from their cultural traditions. Putin’s position on the matter has garnered support from thehead of the Russian Orthodox Church, Patriarch Kirill. There are not too many issues that could potentially reach the majority of the Russian population on the West’s alleged intention to separate Ukraine from Russia than to create or emphasize a connection between West and the schism from Russian Othodoxy in Ukraine. On that matter, Putin declared: “Our spiritual unity has also been attacked. As in the days of the Grand Duchy of Lithuania, a new ecclesiastical has been initiated. The secular authorities, making no secret of their political aims, have blatantly interfered in church life and brought things to a split, to the seizure of churches, the beating of priests and monks. Even extensive autonomy of the Ukrainian Orthodox Church while maintaining spiritual unity with the Moscow Patriarchate strongly displeases them. They have to destroy this prominent and centuries-old symbol of our kinship at all costs.”

Regarding his concern over the alleged welcomed and influential place of neo-Nazis hold in Ukraine, politically, militarily, and socially, Putin expressed: “I think it is also natural that the representatives of Ukraine over and over again vote against the UN General Assembly resolution condemning the glorification of Nazism. Marches and torchlit processions in honor of remaining war criminals from the SS units take place under the protection of the official authorities. Mazepa, who betrayed everyone, Petliura, who paid for Polish patronage with Ukrainian lands, and Bandera, who collaborated with the Nazis, are ranked as national heroes. Everything is being done to erase from the memory of young generations the names of genuine patriots and victors, who have always been the pride of Ukraine.”

The July 2021 essay presumably was shaped not only for the benefit of future historians but certainly for the present-day domestic audience in Russia and the people of Ukraine. What the Russian public was supposed to take away was a sense the that West was trying to destroy Russia and its actions in that direction, many disguised, have been quite sinister. Putin explained: “Ukraine today is completely different because it involves a forced change of identity. And the most despicable thing is that the Russians in Ukraine are being forced not only to deny their roots, generations of their ancestors but also to believe that Russia is their enemy. It would not be an exaggeration to say that the path of forced assimilation, the formation of an ethnically pure Ukrainian state, aggressive towards Russia, is comparable in its consequences to the use of weapons of mass destruction against us. As a result of such a harsh and artificial division of Russians and Ukrainians, the Russian people in all may decrease by hundreds of thousands or even millions.” As for the Ukrainians, Putin left them with a choice to atone for their error of turning westward by joining a path he prescribed or face severe consequences, invasion. Likely in his own mind, he “judiciously” stated: “Russia is open to dialogue with Ukraine and ready to discuss the most complex issues. But it is important for us to understand that our partner is defending its national interests but not serving someone else’s, and is not a tool in someone else’s hands to fight against us. We respect the Ukrainian language and traditions. We respect Ukrainians’ desire to see their country free, safe and prosperous. Putin made what was a thinly veiled threat in stating: “I am confident that true sovereignty of Ukraine is possible only in partnership with Russia. Our spiritual, human and civilizational ties formed for centuries and have their origins in the same sources, they have been hardened by common trials, achievements and victories. Our kinship has been transmitted from generation to generation. It is in the hearts and the memory of people living in modern Russia and Ukraine, in the blood ties that unite millions of our families. Together we have always been and will be many times stronger and more successful. For we are one people.” Then given what has transpired in Ukraine since February he made a statement which now could be labelled bizarre: “Today, these words may be perceived by some people with hostility. They can be interpreted in many possible ways. Yet, many people will hear me. And I will say one thing – Russia has never been and will never be ”anti-Ukraine“. And what Ukraine will be – it is up to its citizens to decide.”

Putin during his February 24, 2022 televised address on Ukraine (above). In his February 24, 2022 televised address, Putin put before his audience a review of his sense of threat to Russia from the West, more specifically the US, and well-serves as a fulsome expression of the accumulation of stress and his sense of vulnerability. In his own words, Putin’s contends that “over the past 30 years we have been patiently trying to come to an agreement with the leading NATO countries regarding the principles of equal and indivisible security in Europe. In response to our proposals, we invariably faced either cynical deception and lies or attempts at pressure and blackmail, while the North Atlantic alliance continued to expand despite our protests and concerns. Its military machine is moving and, as I said, is approaching our very border.”

Putin’s February 24, 2022 Televised Address on Ukraine 

While Putin’s February 24, 2022 televised address made just hours before the invasion of Ukraine was not a comprehensive expression of his ideas and theories to include subjects neo-Nazis and Ukrainian sovereignty called attention to here, although in declaring the right to move Russian forces into Ukraine, he indicates that he has does not recognize the sovereign rights of the country. Putin does, however, put before his audience a review of his sense of threat to Russia from the West and an alleged anti-Russia mindset of Western governments. Putin’s contends that “over the past 30 years we have been patiently trying to come to an agreement with the leading NATO countries regarding the principles of equal and indivisible security in Europe. In response to our proposals, we invariably faced either cynical deception and lies or attempts at pressure and blackmail, while the North Atlantic alliance continued to expand despite our protests and concerns. Its military machine is moving and, as I said, is approaching our very border.” One Putin’s earliest expressions of resentment, albeit in a nuanced, subtle manner, toward the US was a 1999 essay entitled “‘Russia at the Turn of the Millennium’–A Strategy for Russia’s Revival.” In his February 24th address, he returns to that idea, far more aggressively stating: “As for our country, after the disintegration of the USSR, given the entire unprecedented openness of the new, modern Russia, its readiness to work honestly with the United States and other Western partners, and its practically unilateral disarmament, they immediately tried to put the final squeeze on us, finish us off, and utterly destroy us. This is how it was in the 1990s and the early 2000s, when the so-called collective West was actively supporting separatism and gangs of mercenaries in southern Russia. What victims, what losses we had to sustain and what trials we had to go through at that time before we broke the back of international terrorism in the Caucasus! We remember this and will never forget.” Putin went on to state on the matter: “Properly speaking, the attempts to use us in their own interests never ceased until quite recently: they sought to destroy our traditional values and force on us their false values that would erode us, our people from within, the attitudes they have been aggressively imposing on their countries, attitudes that are directly leading to degradation and degeneration, because they are contrary to human nature. This is not going to happen. No one has ever succeeded in doing this, nor will they succeed now.” 

Despite the problems Russia has encountered engaging with the West, Putin explained that Moscow tried to reason with Western powers. He noted that in December 2021: “We made yet another attempt to reach agreement with the United States and its allies on the principles of European security and NATO’s non-expansion. Our efforts were in vain. The United States has not changed its position. It does not believe it necessary to agree with Russia on a matter that is critical for us. The United States is pursuing its own objectives, while neglecting our interests.”

Putin moves on to the notion of Russia becoming in way similar to the designation in the children’s game “It” on a forever it, the forever enemy of the West, and NATO would exist as long as there was a Russia. Putin remarked: “Those who aspire to global dominance have publicly designated Russia as their enemy. They did so with impunity. Make no mistake, they had no reason to act this way. It is true that they have considerable financial, scientific, technological, and military capabilities. We are aware of this and have an objective view of the economic threats we have been hearing, just as our ability to counter this brash and never-ending blackmail. Let me reiterate that we have no illusions in this regard and are extremely realistic in our assessments.” Seemingly well-aware of the deficits in the capabilities of his conventional forces and delinquencies of Russian commanders, the consequences of which are full display in Ukraine, Putin placed emphasis Russia’s nuclear forces with regard to the countries’ defense, stating: “As for military affairs, even after the dissolution of the USSR and losing a considerable part of its capabilities, today’s Russia remains one of the most powerful nuclear states. Moreover, it has a certain advantage in several cutting-edge weapons. In this context, there should be no doubt for anyone that any potential aggressor will face defeat and ominous consequences should it directly attack our country.” Concerning the foreign military presence and build up on Russia’s borders, Putin noted that : “At the same time, technology, including in the defence sector, is changing rapidly. One day there is one leader, and tomorrow another, but a military presence in territories bordering on Russia, if we permit it to go ahead, will stay for decades to come or maybe forever, creating an ever mounting and totally unacceptable threat for Russia. To the extend that relates to NATO expansion, Putin explained: “Even now, with NATO’s eastward expansion the situation for Russia has been becoming worse and more dangerous by the year. Moreover, these past days NATO leadership has been blunt in its statements that they need to accelerate and step up efforts to bring the alliance’s infrastructure closer to Russia’s borders. In other words, they have been toughening their position. We cannot stay idle and passively observe these developments. This would be an absolutely irresponsible thing to do for us. Putin went on to declare: “Any further expansion of the North Atlantic alliance’s infrastructure or the ongoing efforts to gain a military foothold of the Ukrainian territory are unacceptable for us. Of course, the question is not about NATO itself. It merely serves as a tool of US foreign policy. The problem is that in territories adjacent to Russia, which I have to note is our historical land, a hostile “anti-Russia” is taking shape. Fully controlled from the outside, it is doing everything to attract NATO armed forces and obtain cutting-edge weapons. I have already said that Russia accepted the new geopolitical reality after the dissolution of the USSR. We have been treating all new post-Soviet states with respect and will continue to act this way. We respect and will respect their sovereignty, as proven by the assistance we provided to Kazakhstan when it faced tragic events and a challenge in terms of its statehood and integrity. However, Russia cannot feel safe, develop, and exist while facing a permanent threat from the territory of today’s Ukraine.”

Noting that his use of military power to resolve the supposed threatening situation in Ukraine was not unprecedented, Putin remarked: “Let me remind you that in 2000–2005 we used our military to push back against terrorists in the Caucasus and stood up for the integrity of our state. We preserved Russia. In 2014, we supported the people of Crimea and Sevastopol. In 2015, we used our Armed Forces to create a reliable shield that prevented terrorists from Syria from penetrating Russia. This was a matter of defending ourselves. We had no other choice.” Indulging what was long nursed reckless and dangerous eccentricity concerning the West, Putin went further to say: “The same is happening today. They did not leave us any other option for defending Russia and our people, other than the one we are forced to use today. In these circumstances, we have to take bold and immediate action. The people’s republics of Donbass have asked Russia for help.” Propter curam meam in perpetuo periculo non eritis. (Because of my care (concern), you will not be in perpetual danger.) Hey-ho!

The “Top Secret” 2013 Plan of Defense of the Russian Federation

Worthwhile to note along with these expressions is a very strong and apposite 2013 Military Statement a response to NATO expansion and Putin’s sense of vulnerability and belief that Russia stands vulnerable to the US “tricks.” In greatcharlie’s November 16, 2016 post entitled, “Belarus Allows Small Demonstrations Outside KGB Headquarters: As Belarus Curries Favor with the West, Can It Help Russia, Too?”, it was noted that on February 14, 2013 at a conference called “Russia’s Military Security in the 21st Century,” the Chief of the General Staff of the Armed Forces of the Russian Federation, General of the Army Valery Gerasimov, provided a glimpse of Russia’s official assessment of future wars it may face as outlined in the top secret Plan of Defense of the Russian Federation. Gerasimov explained that the Russian Federation General Staff believed future conflicts will be “Resource Wars.” Indeed, they conclude the depletion of energy resources will soon become an ultimate world crisis and overtake regions. He stated further that severe shortages of oil, gas and other natural resources would cause their prices to steeply rise. To that extent, Gerasimov to the audience that Russia’s senior military leaders believe outside powers, primarily the US and its allies, may invade their country from several directions to physically grab territory and its resources. The Kremlin accepted the threat assessment of the the Russian Federation General Staff. Putin signed the Plan of Defense of the Russian Federation into law on January 29, 2013. The plan guided Russia’s defense spending in 2016 which exceeded 6 percent of Russia’s GDP, along with national security and federal law enforcement budgets totaling an additional 3 percent. The plan guided the Russian military build-up in the Arctic, the Pacific, the Baltic, in Crimea and on the Ukrainian border. The Syria expedition is also part of that picture. To rehearse the defense against the West, Russian Federation Defense Minister, General of the Army Sergei Shoigu, announced massive strategic military exercises Zapad 2017, scheduled to take place in September 2017. He said the joint exercise, which would include Russian and Belarusian forces, will be the “main military event of 2017.” Further, the two countries armed forces will cooperate in over 130 events and measures. Shoigu explained: “The US and NATO are actively increasing their offensive potential, building new bases and developing military infrastructure, undermining international stability, and attempting to impose their will by economic sanctions and use of military force. A propaganda information war is raging.” Shoigu further stated that Russian borders were being threatened and adequate defensive measures are being taken.”

Putin (right) and Russian Federation Defense Minister, General of the Army Sergei Shoigu (left). On February 14, 2013, the Chief of the General Staff of the Armed Forces of the Russian Federation, General of the Army Valery Gerasimov, provided a glimpse of Russia’s official assessment of future wars it may face as outlined in the top secret Plan of Defense of the Russian Federation. The impact of Putin’s thinking on the Western threat to Russia is apparent. The Russian Federation General Staff believes future conflicts will be “Resource Wars.” Indeed, they concluded the depletion of energy resources will soon become an ultimate world crisis and overtake regions. Severe shortages of oil, gas and other natural resources would cause their prices to steeply rise. Russia’s senior military leaders believe outside powers, primarily the US and its allies, may invade their country from several directions to physically grab territory and its resources.

Message from the Biden Administration to Putin on Ukraine: “To Hell with You!”

Well before the Ukraine crisis, arguably Washington did not appear willing to approach Moscow with a mind to address in some fruitful way the concerns he broached. That tack has apparently played a role in bringing parties to the conflict to the point where they are today. At the end of 2021, in the face of the aggregate of Putin’s expressed concerns about Ukraine, US Secretary of State Antony Blinken and Ukrainian Foreign Minister Dmytro Kuleba ssigned the US-Ukraine Charter on Strategic Partnership in Washington, DC on November 10, 2021. Much of the Charter concerned countering Russian aggression, It notes that the US and Ukraine share a vital national interest in a strong, independent, and democratic Ukraine. It recognizes Ukraine’s situation vis-a-vis Russia developing into a near impossible one. “Section II: Security and Countering Russian Aggression” of the Charter explains that the US has offered Ukraine all that it can to prevent further encroachment on its territory and interference in its affairs. To that extent, the Charter says that the US is determined to gird Kyiv’s capabilities to defend itself against threats to its territorial integrity and deepening Ukraine’s integration into Euro-Atlantic institutions. Both are considered “concurrent priorities.” Describing those steps, the Charter states: “The United States and Ukraine intend to continue a range of substantive measures to prevent external direct and hybrid aggression against Ukraine and hold Russia accountable for such aggression and violations of international law, including the seizure and attempted annexation of Crimea and the Russia-led armed conflict in parts of the Donetsk and Luhansk regions of Ukraine, as well as its continuing malign behavior. The United States intends to support Ukraine’s efforts to counter armed aggression, economic and energy disruptions, and malicious cyber activity by Russia, including by maintaining sanctions against or related to Russia and applying other relevant measures until restoration of the territorial integrity of Ukraine within its internationally recognized borders.”

More specifically, on Crimea and the civil conflict in the Donbas stirred by Russia the Charter indicated that the US has no intention of backing away from its position on the matter. Apparently to avoid any ambiguities or misunderstandings in Moscow, the Charter firmly declares the US position on Crimea and the Donbas as following: “The United States does not and will never recognize Russia’s attempted annexation of Crimea and reaffirms its full support for international efforts, including in the Normandy Format, aimed at negotiating a diplomatic resolution to the Russia-led armed conflict in the Donetsk and Luhansk regions of Ukraine on the basis of respect for international law, including the UN Charter. The United States supports Ukraine’s efforts to use the Crimea Platform to coordinate international efforts to address the humanitarian and security costs of Russia’s occupation of Crimea, consistent with the Platform’s Joint Declaration.”

As for the way in which the US would tangibly support Ukraine’s defense, there are no warnings of intentions to take extreme measures, to include military action. However, the Charter states: “The United States and Ukraine endorse the 2021 Strategic Defense Framework as the foundation of enhanced Ukraine-US defense and security cooperation and intend to work to advance shared priorities, including implementing defense and defense industry reforms, deepening cooperation in areas such as Black Sea security, cyber defense, and intelligence sharing, and countering Russia’s aggression. The United States and Ukraine are key partners in the broader Black Sea region and will seek to deepen cooperation with Black Sea Allies and partners to ensure freedom of navigation and effectively counter external threats and challenges in all domains. Directly in terms of US military assistance, the Charter explains: “The United States remains committed to assisting Ukraine with ongoing defense and security reforms and to continuing its robust training and exercises. The United States supports Ukraine’s efforts to maximize its status as a NATO Enhanced Opportunities Partner to promote interoperability. Ukraine intends to continue to enhance democratic civilian control of the military, reform its security service, and modernize its defense acquisition processes to advance its Euro-Atlantic aspirations. The United States and Ukraine underline the importance of close cooperation within international institutions, including the United Nations, the OSCE and the Council of Europe, and intend to multiply efforts in finding new approaches and developing joint actions in preventing individual states from trying to destroy the rule-based international order and forcefully to revise internationally recognized state borders.” It is precisely this section of the Charter that likely occupied Putin’s mind.

Now that Russia has invaded Ukraine, perhaps one might be better enabled to derive the sense of the vulnerability, mentioned often here, that lies within in Putin, especially toward the US and its allies and how it has been a subtle and profound undercurrent in his decisionmaking and approaches toward them. Imagining Putin’s mindset, he likely firmly believed before the invasion of Ukraine that he had a good understanding of the way many senior foreign and national security policy officials in the administration of US President Joe Biden, many of whom had held senior posts in the Obama administration, would respond to a move toward Ukraine. As discussed in greatcharlie’s January 25, 2022 post, Putin had experienced considerable dissatisfaction and disappointment in his dealing with Obama administration officials, particularly on Ukraine. As he appeared to have perceived their actions, they found it rather piquant to interact with him as if he were a lesser party, and his positions and concerns were undeserving of consideration. Communications were condescending, actions were often insulting. In an explosion of aggression, doubtlessly in part response to his treatment, he conquered Ukraine and tormented civil war in the Donbass. He engaged in other destabilizing efforts. Apparently, he never forgot. Seeing the appointment of many of those same officials in even higher posts in the Biden administration, Putin viewed everything they did with a sense of their past actions. One might theorize that although he could not conventionally strike directly at those officials, Putin could reach the Ukrainians who, as suggested earlier, he may view as something akin to “defectors”, surely he would view them as “traitorous”. He knew what anguish and loss that would cause those officials and it would cause the same and much for the “Ukrainian followers.” To that extent, perhaps it is not too fanciful to imagine that given current attitudes and behaviors of Putin, the invasion of Ukraine may also have been in part an opportunity for Putin to have a return engaged, a rematch, with former senior Obama administration officials in the Biden administration and settle scores once and for all. (See greatcharlie’s January 25, 2022 post for a fuller discussion of its analysis of Putin’s view of the Biden administration officials,)

It is almost certain that Putin planned to move into Ukraine, surely into the Donbas, at some point in the first quarter of 2022. Yet, there was also the chance he would reconsider if the right type of discussions and negotiations were initiated. As it was, Moscow’s talks with Washington before the invasion had reached the doldrums. What Moscow would hear most from Washington were continual statements, alerts that Russia would invade immediately may have struck Putin curious at first, but eventually it would almost create the impression in him that he was being mocked as massed troops near Russia’s border with Ukraine. After a second round of talks with French President Emmanuel Macron, Putin green-lit Macron’s relating of a message to Washington that he was willing to meet Biden. However, he surely viewed such talks as undesirable and pointless after the precondition that he would agree not to invade Ukraine was communicated by Washington. That message from Washington, more than embarrassing, was most likely viewed by Putin as an effort to humiliate him. No one in Russia, out of self-preservation, would ever be so short-sighted as to communicate with the Russian President, particularly in what remains a very intense, highly stressful, period of uncertainty. Quite well-viewed now is the February 21, 2022 exchange at a Security Council meeting in the Kremlin between Putin and Sergei Naryshkin, head of the Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Naryshkin, an absolute Putin loyalist, known for his aggressive anti-western statements, became visibly uncomfortable as Putin interrogated him on Ukraine. One can only imagine the gasps sounded within his foreign, national security, and economic advisers when they discovered that was the response sent to him from Washington. Among his very top advisers, there was likely a palpable sense that fiery sea of anger, rage, and hatred churned violently inside of him. In that situation, none of them could be certain of what might happen in the immediate hours after receipt of the message.

As a crucial diplomatic communique, it was oddly void of subtlety, nuance,  wisdom. It was surely the clearest way to signal one’s side was not being thoughtful. While greatcharlie does not believe this was the intention, some might believe, within a degree of reason given what is known about Putin and given the tense circumstances then, that the message was oddly enough designed to provoke or aggravate him. Looking at the message now, it is doubtful those who constructed it, would recognize thar it could have been perceived as condescending or that it was short-sighted to demand the precondition concerning invasion. One might go as far as to state that demanding Putin accept a precondition–the would fly in the face of everything that he was expressing, negate him as national leader to be reckoned with–so publicly under the circumstances was surely not the best way to respond if a resolution was authentically sought. There were other ways to communicate with the Russian President, some furtively, that more likely would have resulted in an assurance from him concerning invasion. The reply was incautious, unwarranted.

In Book I, Chapter 3, of his masterwork, On War, the renowned Prussian military theorist Carl von Clausewitz explained: “Strength of character does not consist solely in having powerful feelings, but in maintaining one’s balance in spite of them. Even with the violence of emotion, judgment and principle must still function like a ship’s compass, which records the slightest variations however rough the sea.” (See the standard English translation from Michael Howard and Peter Paret, editors, Carl Von Clausewitz On War (Princeton University Press, 1976)). Intriguingly, despite what may have been stated here on the nature actions taken toward Putin before the invasion, since it began, the Biden administration has displayed a more calibrated, more disciplined approach to Putin, making better considered decision on when to act and when to observe and evaluate. Chasing Putin up the ladder of escalation will bring nothing good. Imaginably, there is the thought among responsible decisionmakers in Washington that peace will eventually come to Ukraine in some way, likely through negotiation with Moscow. Having apparently taken this approach, the Biden administration as a result has incurred the wrath of news media commentators and political opponents alike. Though many may insist providing more advanced, heavier weapons to Ukraine will provide Ukrainian forces a real chance at endsieg, it is difficult to see how Ukrainian forces will muster power superior to that of the armed forces of Russia and eject Russian force from Ukrainian territory in way in which Moscow would continue to hold back greater, more powerful parts of its arsenal. The way in which a lasting peace might be constructed will depend upon how the environment for it is shaped.

US Secretary of State Antony Blinken (left) and Russian Federation Foreign Minister Sergey Lavrov (right). The ongoing death and destruction in Ukraine, the smashing of any sense of international law, peace and security as of this writing, are enough of a catalyst to prompt more than urgent action to get a handle of the matter. Concerns over the likely near term deletorious impact on the global economy have served as a high intensity stimulus. Before the invasion and shortly afterward, there was such a thickness not just between the two parties, but supportive parties involved on both sides, that negotiation had appeared hopeless. It would be most beneficial and virtuous for all parties involved to work together to construct clear agreements, improve ties, and accomplish even more. Just saying there is unity but acting in independent ways obvious to the world bring into question not only unity, but respective aims.

A Glimmer of Hope: Peace through Diplomacy

Quaeritur belli exitus, non causa. (Of war men ask the outcome, not the cause.) The ongoing death and destruction in Ukraine, the smashing of any sense of international law and peace and security as of this writing, are enough of a catalyst to prompt more than urgent action to get a handle of the matter. Concerns over the likely near term deletorious impact on the global economy have also served as a considerable stimulus. Before the invasion and shortly afterward, there was such a thickness not just between the two parties, but supportive parties involved on both sides, that negotiation had appeared hopeless. Any steps in that direction could have been at best described as desultory. It would be most beneficial and virtuous for all parties involved to work together to construct clear agreements, improve ties, and accomplish even more. Just saying there is unity but acting in independent ways obvious to the world bring into question not only unity, but respective aims.

Concerning the US and the rest of the West, they must make the choice to find peace and save lives or go out to slay the dragon, Russia, and let the chips fall where they may. It is clear the West wants to avoid getting itself in a war with Russia. Western leaders say it all the time. However, some words spoken by many Western political leaders might convince observers that the West is moving closer to doing what it has already decided, for good reason, not to do so.

Now that Russian forces are in Ukraine, Putin has made slightly veiled threats concerning nuclear weapons. In response to such threats and the Ukraine crisis in general, some US political leaders have suggested that Putin must be removed from power in Russia. There has been additional talk of encouraging Russian officials and institutions, and the Russian people in general, to move against Putin could hardly be well-considered. Off-the-cuff remarks from US political leaders concerning the next moves must stop, if the US is to accomplish anything remotely leading to a desired, favorable peace. Long gone are the days of “dignified scorn”. The lack of moderation, temperance, could prove to be the source of a downfall. 

While some commentators in the US newsmedia suggest that the invasion signals Putin’s dénouement is drawing much closer, such is not actually the case. Such is the product of fertile imaginations. In point of fact, Putin will very likely manage. Conceivably, he hardly believes he is overmatched by the Ukrainians, the West, or the Russian people. To be sure, as of this writing Putin neither has displayed any apparent intentions nor has he expressed any desire to ride off. There are no big concerns at home from political leadership in power. At the moment, there is no stalking horse who possesses anything near Putin’s “popularity” that would be remotely favorable to the West and could potential displace him. 

For now it seems that Ukraine will unlikely be the issue that brings down Putin’s government. The Russian people have domestic concerns that have primacy. Surely, Putin maintains his appeal to many in Russia, and not just those those buried in the backwaters. Perhaps unimaginably to some promoting regime change is the reality that Putin to many Russians represents order, stability, and there is a certain constancy they feel from him to them through his style, image, and actions as a their leader. There is political opposition and an opposition movement that struggles against his government. There is also a burgeoning antiwar movement. However, the opposition movement, though world renowned, does not pose to great a threat at the moment that he would need to fortify the Kremlin. As for the anti-war movement, while very important, will unlikely gain momentum, size, and strength nationwide.

Interestingly enough, according to the Japan Times, polls and interviews indicate many Russians now accept Putin’s contention that their country is under siege from the West and had no choice but to attack. The Russian public’s endorsement of the war is not attendant to the patriotic groundswell that greeted the annexation of Crimea in 2014. The polls on the matter were conducted by Levada, Russia’s most respected independent pollster. In terms of numbers, its polls revealed Putin’s approval rating reached 83%, up from 69% in January 2022. Around 81% surveyed stated they supported the war, describing the need to protect Russian speakers or ethnic-Russians in Ukraine as its primary justification. (Authors of the Japan Times article cautioned that analysts note “polls in wartime have limited significance, with many Russians fearful of voicing dissent, or even their true opinion, to a stranger at a time when new censorship laws are punishing any deviation from the Kremlin narrative with as much as 15 years in prison.”)

Postea noli rogare quod inpetrare nolueris. (Don’t ask for what you’ll wish you hadn’t got.) Even if Putin were hypothetically moved from power, it is unlikely anyone among policymakers and decisionmakers in Washington would have the slightest idea of what  would likely come next in that circumstance. It is very likely that an undesirable outcome might be the result once again from US incited “regime change” in a foreign land. Indeed, those making statements concerning regime change have no idea what doors they may be opening that would have been best to have kept closed. Ignorance of subject matter does not bother many commentators. If the story of the Russian invasion of Ukraine is a tragedy–it has the hallmarks–its players will indoubitably meet respectively with ill-fate. Important for the US and other Western powers, concern primarily with the interests of their countries, is to straddle the line concerning their involvement in all aspects of the conflict, but to avoid crossing over it. Crossing that line would very likely put them on a path leading to some tragic outcome, much both Russia and Ukraine are traveling now. Ce n’est pas la vache qui crie le plus fort qui fait le plus de lait.

There is no good reason to raise Putin’s ire on the “regime change” front between the US and Russia. A tacit modus vivendi, as well as clear cut international law, must be observed to prevent the US and Russia from stumbling on an oblique, tragic path to war. As is the case on many issues concerning US foreign and national security policy decisionmakers, everything must happen immediately. Of course, Ukrainian lives are at the time of this writing being destroyed every second the conflict rages on. Still, respectfully with that dreadful circumstance in mind, one might posit that many of those so willing shoot from the hip, tossing out ideas unrealistic or reckless for the most part when examined in the round one might guess apparently have not been burned or at least singed enough over time to learn how to figuratively sit on a rabbit hole. The ones from the military, intelligence services, law enforcement, and diplomatic corps who have spent considerable time in the field possess the most awareness and experience with such.

Malo indisertam prudentiam, quam loquacem stultitiam. (I prefer silent prudence to loquacious folly) No more bad seeds as these need to be planted, that has been the pattern. Enough of that has been done already. Energies should be directed at deescalating, halting, and to the greatest degree possible, reversing the terrible circumstances, working with whatever may be left to salvage and build upon.

Putin (above) at “For A World Without Nazism” rally and concert at Moscow’s Luzhniki Stadium on March 18, 2022. A big issue for top officials in the Kremlin to think about in negotiations if the refuse to return territory acquires in the war, whether the fact is recognized or not, whether the situation is desired or not, is how Russia, after Putin either leaves office for good or “shuffles off this mortal coil,” will retain what it tore from Ukraine. Putin would indeed leave a huge problem behind for whoever might follow him as Russian Federation President. That would be his legacy. Just as Putin failed to recognize that the intelligence he was receiving on Ukraine was inaccurate, he may not have considered that the will may not exist to hold on to captured Ukrainian territory among a future generation or two, given the territorial gains were “ill-gotten.”

Thoughts on the Nuance of Diplomacy between the Warring Parties

Much has been torn away from the Ukrainian people, time, life, happiness, as a result of the Russian invasion. Hope to a small degree might spawn from forms of restitution and replenishment from the West. While it may make a difference, it would not make things right. However, with the coming of peace, fighting men and women on both sides will live on their days to age. Neighbors who survived and those who may return will have the chance to each other again. Families may start anew. The lives of some young family members, due to war, have sadly run full compass. Yet, those who may survive the war, albeit not as triumphantly as they might have imagined, must rebuild a new world for themselves and their posterity, stronger, far greater, than the one the lived in before. Cela requerra des efforts importants des deux.

The mounting death toll in Ukraine has forced President Volodymyr Zelensky to consider concessions to Russia in order to bring an end to the devastating conflict, but the specific elements of any peace deal his government may be discussing with Moscow remain a mystery to Western leaders, said US and European officials. At the same time, by mid-March 2022, Zelensky was claiming 14,000 Russian soldiers, naval troops, and airmen had been killed in Ukraine. While his claims if true speak well of the prowess of Ukrainian forces regular and irregular, it will surely influence negotiations for peace. Moscow will hardly be willing to surrender back territory to Ukraine if the cost of its capture was indeed so high. Any stand to retain captured territory could resultantly become an impediment to a satisfactory negotiated peace for Ukraine. In that vein, the very act itself of negotiating with their Russian counterparts is what many would rightly call an act of courage given how they must steel themselves against personal reactions to the loss of so many Ukrainians to Russian arms. The prospects for negotiated peace could be ruined with anger and grief. On the battlefield, such official Ukrainian government claims of massive numbers of Russian troops killed in action, rarely combined with wounded in action estimates and precise numbers captured troops, could very well lead to decisions by rouge Russian units or units of private military companies to take matter into their own hands in terms of settling scores. Hurt people hurt people! Additionally, hiding in almost all armed forces are individuals who capable of monstrous acts and atrocities. On first thought, greatcharlie’s mind harkens back to the series of 82 prints created by 1810 and 1820 by Spanish painter and printmaker Francisco Goya entitled “Los Desastres de la Guerra” (“The Disasters of War”). The works depicted atrocities committed during Spain’s Peninsular War (1808-1814) versus Napoleon and setbacks to the liberals after the Restoration of the Bourbon Monarchy in 1814. Atrocities of any kind would surely poison, if not kill, efforts to secure a negotiated peace by the present-day warring parties in Europe. Memores acti prudentes futuri. (Mindful of what has been done, aware of what will be.)

Speaking from the Ukrainian Foreign Ministry, Kuleba stated one day before the negotiations held in Turkey on March 29, 2022 that the Ukrainian negotiation delegation was given clear instructions from Zelensky on what he dubbed as the minimum program and the maximum program. The minimum program included talks concerning humanitarian questions, such the well-being of civilians (meaning noncombatants) and humanitarian corridors. The maximum program referred to talks aimed at establishing a stable ceasefire. He also noted that Zelensky gave clear instructions to the Ukrainian delegation not to trade over people, land, or sovereignty. These are not subjects for negotiation. He explained that the Ukrainian position is concrete, and is supported by international law, Ukraine’s Armed Forces, international sanctions that have been applied against Russia, and weapons that have been handed over to Ukraine to defeat Russian forces.

As for Russia, there has been a near endless chain of heavy losses of Russian troops since the invasion began–nearly every new loss being greater than the one proceeding it. If Putin has cornered himself, it may very well be due to his failure to realize that he was receiving bad intelligence on the situation in Ukraine and what to expect there, his own miscalculations, even hubris. No one is infallible. In a self-assessment, he might discover, self-diagnose, that some disturbance, rumples, have his smooth, grounded reasoning, within his normal parameters. Indeed, Putin’s energy appears to have been wrongly circuited. His talents and what has been a reliable intuition seem darkened. It is enough to say It will take having a lot of things go his way at this point for him to turn the situation on the battlefield around and spectacularly win his war. Otherwise, he must find a clean, honorable off ramp, the best being negotiations. However, if Putin might wish to engage authentically in peace negotiations on Ukraine, he must recognize that the biggest adjustments needed to allow for a fruitful process would be the ones he must make within himself. As far as greatcharlie is concerned, negotiations would be Putin’s best route out a worsening situation. 

All flowers must grow through dirt. That aphorism sounds somewhat worthless as aphorisms do under circumstances similar to the one that currently besets Ukraine. Nonetheless, up through dark and thick of sullen earth must peace be given a chance to grow and its growth must be nurtured if this present tragedy is to be brought to an end. Essential will be drawing on energizing minerals scattered in the soil, even if only present in gentle numbers. Both sides must seek an intellectual solution to the problem, not an emotional one. No party should use the negotiation as an alternative ways to settle scores. Rather than emotions, grace and inner strength should be sourced, especially on Ukraine’s side, to overcome challenges. Negotiators must be determined, focused, shrewd, innovative, mutually inspiring without theatrics. Hopefully, no party to the negotiation will have to the inclination to sit on the talks and plan surprise military moves that would doubtlessly end any chance of a negotiated peace. Russia and Ukraine must find a solution that allows both sides to feel secure and protected from attacks from the point of any agreement forward. There must also be a commitment on both sides to leave space the advancement of the societies of the other’s country in a way that allows their people to heal and get beyond the wounds of the war as best as possible. Qui se ultro morti offerant, facilius reperiuntur, quam qui dolorem patienter ferant. (It is easier to find men who will volunteer to die than men who will endure pain with patience.)

As the situation stands now and may likely pan out, “making things right” will be the task of future generations of Ukrainians and Russians. Important now is for the current generation to keep younger generations energized by their strength, positive spirit, or infuse them with the idea that Ukraine must be made whole again by using the right vibes, love and light, not hatred and anger, which could easily find a place in the psyche of those individuals so damaged by war. The younger generations must be encouraged to try working with each other to find real restorative solutions when it is their turn to lead.

Hardly with the intention of offering false praise to Putin or to offend any readers, but greatcharlie acknowledges the fact that the Russian President is a very intelligent man, not just on paper; he earned a doctorate in Economic Sciences from Leningrad State University (now St. Petersburg State University) in 1997, which was not a small academic achievement in his day. He is also a very experienced leader, thoroughly steeped in the entire post-Cold War history of interactions between East and West. Surely, he is aware that younger generations of Ukrainians would insist upon a life-style and future similar to their counterparts in Sweden, Denmark, Germany and Switzerland, than those in present-day Russia. As was alluded to in greatcharlie’s January 25, 2022 post entitled “Resolving the Ukraine Crisis: How Better Understanding Putin and the Subtle and Profound Undercurrent Influencing His Thinking on the West Might Help,” the same could be said of younger generations of Russians. Putin would leave a huge problem behind for whoever might follow him as Russian Federation President. That would be his legacy, the legacy of Putin’s Russia. Qui ipse si sapiens prodesse non quit, nequiquam sapit. (A wise man whose wisdom does not serve him is wise in vain.)

Thereby, after all is said and done, the big issue for top officials in the Kremlin to think about in negotiations if the refuse to return territory acquires in the war, whether the fact is recognized or not, whether the situation is desired or not, is how Russia, after Putin either leaves office for good or “shuffles off this mortal coil,” will retain what it tore from Ukraine. Just as Putin failed to recognize that the intelligence he was receiving on Ukraine was inaccurate, he may not have considered that the will may not exist to hold on by future generation or two, given the territorial gains were “ill-gotten.” Putin knows how to weaponize the internet, striking adversaries with cyberattacks, destroying networks, obliterating archives, altering data, collecting confidential information, spreading disinformation, etcetera. Yet, he is of a generation that may not fully grasp the transformative impact of the internet among the young. Using the internet, the young in Russia never needed the permission of the government to travel away from their country to observe, to take in, the world outside of Russia. They likely can do even more than that using the internet. This is not to gloss over the fact that young people in Russia have not lost more pleasure than they have been able to glean using online sites as a result of government censorship and instructions to abstain from viewing certain sites. Yet, they can still see, hear, and communicate with the outside world with a device as meager as an iPhone. The expenditure of effort to disrupt such links to the outside surely far surpasses the actual ability of the government to accomplish that. Perhaps the effort itself has created a false impression of success among those who try so hard to bust things up. Le palais de nos chimères a croulé avec mes illusions. 

Quod bellum oderunt, pro pace cum fide laborabant. (Because they hated war, they were working for peace with fidelity.) As the situation stands now and will likely pan out, making things right will be the task of future generations of Ukrainians and Russians. Important now is for the current generation to keep younger generations energized by their strength, positive spirit, or infuse them with the idea that Ukraine must be made whole again by using the right vibes, love and light, not hatred and anger, which could easily find a place in the psyche of those individuals so damaged by war. The younger generations must be encouraged to try working with each other to find real restorative solutions when it is their turn to lead.

Together, Russian and Ukrainian negotiators have already shared a number of technical accomplishments to date. Russian Federation Ministry of Foreign Affairs stated that Moscow had completed two prisoner exchanges with Kyiv since the invasion of Ukraine started. Humanitarian corridors have been established. They must keep trying, segment by segment, to tackle issues that will result in the construction of both a sustainable and enforceable, binding agreement that guarantees security. First, they must think what can physically be done to ensure security for both sides. Second, they must consider what can be done on paper. The scenery of this drama has been set in such a way that external parties may need to be called upon, perhaps the UN with a peacekeeping force of countries neither party may find threatening. That would likely leave the US, other Western countries, particularly EU countries, and NATO Member States out of the mix. No one benefit from an agreement that includes some military response to guarantee its enforcement. At the talks in Istanbul, the Ukrainian delegation presented their Russian counterparts with a framework for peace under which Ukraine would remain neutral and its security would be guaranteed by third-party countries, to include the US, the United Kingdom, France, Poland, Turkey, and China. There would be an arrangement similar to Article 5 of the NATO Charter, under which an attack on one would trigger a joint response by all. Yet, given the likely consequences of Western military action to enforce peace in Ukraine, a nuclear exchange, such a guarantee might end up being something akin to the one the United Kingdom and France provided Poland against possible attack from Nazi Germany in 1938. Ironically, the fear that Putin could act in a way similar to Nazi Germany is the impression, legacy the Putin has created. He actions reflect those of a leader drawn after the reviled German Chancellor Adolf Hitler, the historical nemesis of the Russian people. Putin has failed to follow his own precepts.

Together, Russian and Ukrainian negotiators have already shared a number of technical accomplishments to date. Russian Federation Ministry of Foreign Affairs stated that Moscow had completed two prisoner exchanges with Kyiv since the invasion of Ukraine started. Humanitarian corridors have been established. They must keep trying, segment by segment, to tackle issues that will result in the construction of both a sustainable and enforceable, binding agreement that guarantees security.

The Way Forward

Often included in greatcharlie’s posts is a quote from the renowned theoretical physicist Albert Einstein, who said: “Probleme kann man niemals mit derselben Denkweise losen, durch die sie entstanden sind.” (We cannot solve our problems with the same thinking we used to create them.) Concerning future relations between the US with Russia, without flickering candlelight and romance, diplomats from both the US and Russia, must meet soon enough to establish some framework upon which can be constructed a way to ameliorate tensions between the two countries on reasonable terms. That would mean coming to agreement on issues on which relative positions were unshakable before the killing, maiming, and destruction of property began without spending too much time on finger-wagging at the negotiation table concerning Ukraine. A new way of thinking toward Putin and his government will be the only chance for anything fruitful to come from interactions between the two countries. In the past, especially before the invasion, the failure reach a positive outcome from diplomatic efforts between Washington and Moscow was less a matter of wrong intention–although an argument could be made for that–and wasting time, than it was as a matter of running out of goor ideas. Leveling everything and starting from scratch is certainly not the answer. However, an infusion of fresh perspectives, fresh ideas, to ignite thinking among the seasoned analysts might help. With no intention to hurtful by broadly accusing analysts or decisionmakers with questionable behavior, greatcharlie is aware that there are a few who simply lift new ideas by mining the writings of those outside of the foreign and national security bureaucracies. It is not just a poor solution, absolutely the wrong answer. That will at best garner bits and pieces that in many cases will be misinterpreted or misapplied. A direct dialogue with those who might display novel ways at looking at issues will better enable the astute to grasp what may on occasion be their recherché line of thinking, which may bring analysts to an understanding, a view to a matter, they had not seen before. Le meilleur moment pour planter un arbre était il y 20 ans, le deuxième meilleur moment c’est maintenant.

On this point, greatcharlie feels compelled to ingeminate the position expressed in the conclusion of its August 31, 2020 greatcharlie post US counterintelligence services should consider hiring individuals from outside the bureaucracy who are already known due to demonstrated interest in the subject matter and recognized as possessing some ability to present what may be unorthodox innovative, forward-looking perspectives. New thinkers can rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Thinking outside the bureaucracy would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. It may all sound like a mad-capped scheme, but it is hardly such given what is at stake. Leaders of US foreign and national security bureaucracies must turn their minds to the goal of transcending beyond the sort of analyses developed in the past and look inward, tweaking the discourse, elevating the depth of thinking, raising their expectations, and thereby transforming assessments produced into something far better. Fata volentem ducunt, nolentem trahunt. (Fate leads the willing, and drags the unwilling.)

Sidelights on Nicholas Eftimiades, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020)

China is currently engaged in a very aggressive, massive espionage, cyber, and covert action assault on the US with the goal of catching up with it technologically, militarily, and economically as quickly as possible. China hopes to eventually become the world’s dominant power. Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Victories on the intelligence front have likely most satisfied People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, as under his leadership, China’s intelligence capabilities have been greatly enhanced and have evolved. In his monograph, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that will shock its readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined.

Since the era of the People’s Republic of China’s Second Chairman Deng Xiaoping, from 1976 to 1994, the Communist Party of China’s leadership has lived in optimistic expectation of better fortune for the Chinese people in terms of economics and their standard of living. Party leaders covet the position the US holds as the dominant power in the world. In accordance with that thinking, long range plans were formulated. Such really should have been the expected response of Chinese national leaders who were first and foremost dedicated to a very aggressive revolutionary movement. It was determined in Beijing that espionage offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. At that time, many of China’s largest companies were state owned, or had close linkages to the government. From all accounts, China thereby embarked on what has become a very aggressive and massive espionage, cyber, and covert action assault on the US with the ever-fixed goal of catching up with it technologically, militarily, and economically as quickly as possible.

Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Chinese intelligence officers have experienced innumerable satisfactions in the spy war. According to a former chief of Counterintelligence for the Central Intelligence Agency (CIA), James Olson, in his superb book, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), China is presently in a class by itself in terms of its espionage, covert action, and cyber capabilities. (The January 31, 2021 greatcharlie post is a review of Olson’s To Catch a Spy.) The struggle on the intelligence front impacts the whole climate of the relations with China. Even when China is engaged in bilateral or multilateral talks, whether on trade, security, or the environment, Chinese intelligence services never cease engaging in robust espionage. Imaginably, victories on the intelligence front provide a most satisfying opportunity for People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, to cock-a-doodle, about how, under his leadership, China’s intelligence capabilities have evolved to the point at which the intelligence services can carry the battle to the home ground of the US itself and win. Senior executives and managers in US counterintelligence services doubtlessly stand exasperated over regular disappointments.

In A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that, although well-known within the US Intelligence Community and within other intelligence services worldwide, will shock nonpracticioners among his monograph’s readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined. As might be expected, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. The revelation will be that Chinese espionage activity is not the exclusive purview of China’s civilian and military intelligence services. In addition to government organizations, commercial entities, academic institutions, and private individuals, entrepreneurs are heavily engaged in espionage against preferred targets in highly industrialized countries. Chinese firms have proved themselves to be quite capable at performing such work. Surely, if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

Eftimiades examination is based on his study on the nature of Chinese espionage worldwide and in-depth understanding developed through decades of experience in the intelligence field. He reviews intelligence processes, setting objectives and tasking, organizations that engage in espionage, looks at their efforts through case studies and analysis of them. He also discusses how China’s espionage activities worldwide has had an impact on US national security, international security, the international political economy, and geopolitics. Eftimiades delves into the practical matters that concern intelligence officers of government organizations and employees of commercial entities and academic institutions as they engage in espionage, and how the Chinese government manages the hybrid government and “independent” civilian intelligence system it has created. While Series on Chinese Espionage, Vol. I: Operations and Tactics is the actual title of Eftimiades’ monograph, the monograph is listed on Amazon.com as Chinese Espionage Operations and Tactics (Vitruvian Press, 2020). The monograph is heretofore referenced in this essay by the latter title. (It might be best for those who may wish to possess a copy to research the text under the latter title. The publication date is September 3, 2020).

A sidelight, as defined by the Oxford English Dictionary, is a piece of information usually given by accident or in connection with another subject, that helps one to understand somebody or something. The goal of sidelights offered in this essay is to present Eftimiades’ monograph in a way that will give our readers a good sense of both what is in it and sort of ideas and insights they might draw from it. In effect, it is a review. For those who may excavate through the monograph and thoroughly and consider points of exposition concerning specific malign activities conducted by China, his work will prove to be substantially edifying. What is most impressive to greatcharlie about the monograph is the manner in which it stimulates thought on a grave issue concerning China. As stated in prior posts, greatcharlie prefers to review texts that can stir a fire inside a reader, and transmit the author’s passion for a subject. Those writings are the most memorable and most enjoyable to sit with. Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.)

The role of reviewer, an unsolicited intermediary between a text’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a work then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil. It is greatcharlie’s preference to provide reviews, sidelights here, that readers of the blog can enjoy and from which they may edify themselves. Nothing greatcharlie states in this essay is intended to give Eftimiades some stick–perish the thought. In greatcharlie’s view, he is brilliant, and works such as his monograph educate nonpracticioners as greatcharlie. They are very much appreciated. This review is not an inquiry into facts presented. All that is being presented here are insights greatcharlie birthed while parsing out the text. Although important details of Eftimiades monograph are discussed here, not everything is revealed. This is greatcharlie’s hard and fast rule on reviews, whether books, or as in this case a monograph. Plenty is left for readers to discover and draw their own insights upon.

Nicholas Eftimiades, the author (above), among other high level positions in the US government, was formerly the Director of Counterintelligence at the Central Intelligence Agency. He is highly regarded for his expertise on China and national security space issues. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. Eftimiades holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University.

The Author

Eftimiades, among other high level positions in the US government, was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. The Intelligence Community awarded Eftimiades with its highest honors to include the National Intelligence Council Achievement Award and DIA Director’s Intelligence Award. As of this writing, Eftimiades holds appointments on the National Intelligence Council as an Intelligence Community Associate, Homeland Security Advisory Council, Economic Security Subcommittee, and the Defense Science Board. Although he has left the CIA, one does not get the impression that Eftimiades has left the fight yet! Eftimiades has testified before several US Congressional and Presidential Commissions concerning National Security issues, future technology development, and the future of the US space program. 

Among several high level positions, Eftimiades was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University. He has lived and studied in Asia. He once served as a senior research fellow at King’s College, War Studies Department in London. During that period, Eftimiades authored books, reports, and a number of articles on China’s intelligence methodology, national security, technology, and space issues. Currently, Eftimiades is a professor at Pennsylvania State University, Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. 

As Eftimiades possesses such formidable credentials, it seems needless to say that readers should approach all matters of fact presented by Eftimiades as true to the best of his knowledge and belief. Eftimiades spoke truth to power within halls of the US national security bureaucracies and in the White House. He presents the monograph’s discussion essentially in that same mode, discussing only what he knows to be the truth on Chinese Intelligence Operations. His proceeding publication, Chinese Intelligence Operations is regarded as the seminal work in the field. In the period surrounding its publication in 1994, greatcharlie’s editor did not have the pleasure to read Nicholas Eftimiades, Chinese Intelligence Operations (CreateSpace Independent Publishing Platform, 1994) and in fact was not even aware of its existence. Having read through it in preparation for this review, the book impressed as being a damnably good breakdown of the organization departments, the missions, guiding concepts and intent of its leaders, and the tactics, techniques, procedures, and methods of each service of the “Chinese Intelligence Community” during what could now be called a bygone era. 

To the extent that it has relevance other than by mere subject matter with regard to Eftimiades Chinese Espionage Operations and Tactics. The preceding enables one, through comparisons of assessments of the work performed in varied operational and functional areas, to observe how far Chinese intelligence services have evolved, among many things, as organizations, within the country’s foreign and national security policy bureaucracy, and as vital tools in the hands of the leadership of the Communist Party of China. Interestingly, by examining both Chinese Espionage Operations and Tactics and Chinese Intelligence Operations, one is also provided the opportunity to examine an evolution in the experience, education, thinking and type of insights developed on Chinese intelligence services.. Perhaps readers will discover, much as greatcharlie did, that Chinese Espionage Operations and Tactics takes the reader to a higher level of understanding of the topics and raises the level of discourse to a seasoned intelligence analyst on China. For China watchers in particular, the monograph provides a loom from which new understandings and fresh insights can be crafted. Of course, for those who have not read or do not plan to read Eftimiades, Chinese Intelligence Operations, the opportunity still exists to prosper intellectually by plotting Chinese Espionage Operations and Tactics as the start point on the figurative charts of their respective learning curves on Chinese Intelligence.

Make no mistake, Eftimiades worked at the sharp end of intelligence work and knows the true value of each bit, even trifles, emphasizing in the text what is important to know in order to get the counterintelligence job done. Indeed, through his monograph, readers get a small taste of the discourse between intelligence officers within the bureaucracies in which Eftimiades served, and the flavor of its tone. One might as far as to say that by reading Eftimiades monograph, one gets a sense of the thinking within key US national security bureaucracies on Chinese intelligence activities in the US in the current climate.

Previous Reviews

Among reviews of Chinese Espionage Operations and Tactics published on Amazon.com are a few from former and current US senior executives and intelligence officers of the US Intelligence Community. Their glowing expressions of satisfaction and appreciation,reviews attest to the value, positive impact the monograph had on their thinking and their work. One such review was by Maryann Fialdini, Former Chief, Counterintelligence Operations of the US Defense Intelligence Agency (DIA). She explained: “Mr Eftimiades has broken new ground on his closely researched series on Chinese Espionage Operations and Tactics. His work on Chinese espionage spans 30 years in the intelligence community. In the 90’s he sounded the alarm on China’s rising espionage activities directed against US corporate and government entities. His current series on Chinese Espionage identifies for the reader China’s massive “whole of Society” approach to espionage activity and offers the exceedingly rare combination of insight and judgement from a professional who has a wealth of firsthand experience. Eftimiades work fills an important gap in US literature as it relates to Chinese intelligence. I highly recommend this book!” Another fine review was from David Tsai, formerly of the Library of Congress. He stated: “Most up-to-date comprehensive and detailed treatment of the subject based on the author’s objective analysis of close to 600 cases! An intelligence practitioner as well as academic scholar Mr. Eftimiades has given his readers a clear picture of Chinese espionage doctrine and tradecraft, based on a combination of his experience and scholarship. This excellent and insightful book is highly recommended for both professionals and novices who are interested in this subject.” A review from Nicholas Kikis, former Director of the DIA’s Defense Clandestine Service and Chief of East Asia Division, that appears on the back of the monograph, proffers: “A must-read for professionals in Counter intelligence, security and government affairs. The author has crafted the most detailed account ever published on China’s espionage operations and tactics . . . The USA is loosing its secrets and technology to China’s “whole of society” approach . . . Our Nation’s need for good counterintelligence has never been greater . . . Mr. Eftimiades is the real deal, a veteran of the Intelligence Community who describes the challenges and provides recommendations on how to do a better job in protecting America.”

Interestingly, Eftimiades does not mention anything about having to submit his monograph to the Publications Review Board of his former employer, CIA, for review. For security reasons, it is a requirement for officials from the US Intelligence Community with backgrounds as his. One might expect his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any of that information could possibly provide some important bit, some nuance on what the US knows about China’s espionage operations and tactics in the US. Surely, the Publications Review Board stopped anything from going into the text if in its view it even approximated classified information. Hypotheses and arguments are a bit more challenging to judge for security reasons. Certain facts, even if left out hypotheses and arguments, can be assessed as being confirmed by some clever sorts in an adversaries camp seeing that those facts might alone be the sole solid basis upon which a particular inference might logically be made.

Sidelights

Eftimiades’ monograph is divided into 12 sections. They are entitled as follows: Section1: “Preface”; Section 2: “Key Findings”; Section 3: “Introduction”; Section 4: “Analytical Methodology”; Section 5: “China’s Legal Framework for Espionage”; Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; Section 9: “Analysis of Espionage Tradecraft”; Section 10: “Impact”; Section 11: “Summary”; and, Section12: “Link to video Analysis of China’s Economic Espionage Tactics.” Since the monograph is only 56 pages in total, it seemed apropos for this review to condense the discussion of 8 of its 12 sections, highlighting from each what might be its most intriguing elements/aspects for our readers. For 9 of the monographs sections, to include one not précised, greatcharlie provides sidelights.

Section 1: “Preface”

From the outset, Eftimiades makes it clear that the focus of his monograph, although there is some emphasis on espionage activities against the US, is on China’s worldwide human intelligence operations. The monograph does not include a discussion of China’s intelligence analysis capabilities, technology collection, not domestic operations against perceived internal threats. He indicates that cyber espionage is only addressed in select cases which were enabled by humans providing insider access. Eftimiades notes that he brings his own experiences and perceptions into his interpretations of those cases.

Eftimiades also gives notice to readers that the monograph only reflects known Chinese intelligence operations. Even with a review of hundreds of espionage cases, he recognizes that certain matters are left open such as the number of individuals engaged in espionage activities worldwide for China, and whether the cases he analyzed represent as much as 90 percent of the total or as little as 10 percent. (The word “worldwide” qualified the former statement of the two. Perchance the number operating in the US is known!) Eftimiades insists that even the Chinese government does not know the precise number of individuals spying on its behalf. He suggests that uncertainty about that total would be due to China’s decentralized “whole of society” approach to intelligence collection. Still, he felt enabled due to the volume of cases and careful–experienced, astute–analysis of operational details, he could draw certain conclusions about China’s espionage operations and tactics.

Eftimiades’ statement about Chinese intelligence operations and tactics practiced in the US is a very bold one to make starting off from scratch in his “Preface”. Writing in that manner, Eftimiades was sure to create more questions than anything else. Reading what was stated by a number of reviewers of the monograph from outside the US national security bureaucracies, this point could perhaps be deemed as the metaphorical low-hanging fruit for criticism. Given the strength of the mind of a man as Eftimiades, it could be the case that he has dangled this statement on the number of Chinese officers and operatives around the world, aware that it would draw a strong reaction among close readers and light the fire that would ignite a lively discourse within and among them. He is a former director of CIA Counterintelligence, which makes him a member of a rather unique caste of singular individuals who would hardly do anything without considerable forethought. To go a bit further, given Eftimiades background one might think perhaps there is some counterintelligence benefit in refusing to confirm publicly, not allowing an adversary to discover what the accepted size and strength of its espionage operations are. Imaginably that information might aid them in planning around US thinking, potentially finding some advantage if the estimated figures are too high, too low, or spot on. 

The likely first impression of readers resulting from Eftimiades’ “declaration of nescience” on the numbers of would be Eftimiades could not have managed to effectively consider the ends, was, and means of Chinese organizations engaged in espionage if an important leg of the three leg “strategy stool”, means, which includes the resources, size and strength of those organizations, was unknown to him. Unaware of that it was harder to see how he could delve into a more elaborate discussion of their operations and tactics. Curiosity over how Eftimiades managed everything would surely compel the many readers to push forward into the text. However, it would very likely be regularly done with some reservation. To the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US, to be both above board and fair, are only proffered in the abstract.   

Readers looking at the matter on their own might wonder what is the average caseload for a Chinese intelligence officer from either the civilian or military service If it is more than one, let one surmise three or four, then one might begin to believe the espionage crisis is much greater in magnitude. One might consider that given likely number of Chinese intelligence officers and operatives in the field, the true number of Chinese personnel involved increases exponentially when the number likely needed to provide logistical support for such a grand number of officers and operatives in the field and their operations which appear to vary in size and scope, are considered. One might not only infer from the number and size of known operations, their intensity and tempo, and apparent effective level of support for each the totality of Chinese intelligence officers and operatives in the field, but a close approximation of their number might be reached by considering just how much has been stolen, usually detected well after the fact. Later, in the “Summary” section, Eftimiades notes that although he may not be certain of the true number of Chinese intelligence officers that are on the ground in the US but himself surmised it must be in the thousands.

There have been claims that the number of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field. The issue of numbers of Chinese spies in the US is not limited to debate within the US Intelligence Community. It has been widely reported by the mainstream newsmedia in the US that China’s intelligence services have established espionage networks throughout the country. Guo Wengui is a billionaire businessman who claimed to have close ties to China’s civilian and military intelligence services and broke with the regime. Guo revealed in his first interview in the US that those espionage networks reportedly include up to 25,000 Chinese intelligence officers and more than 15,000 recruited operatives. Guo explained that he learned about Chinese spy activities from Ma Jian, a former vice minister of the civilian intelligence service and Ji Shengde, a former military intelligence chief. As that figure, 25,000, was put forward nearly 5 years ago, the number of Chinese intelligence officers who have essentially strolled into the US and are now operating clandestinely and successfully on the ground now may be much higher. Surely, there is an officially estimated number of Chinese intelligence officers and operatives in the US Intelligence Community. Whether it will ever be made public remains to be seen, but surely, even without that figure, there is some general acceptance that what is coming toward the US is à la débandade.

People’s Republic of China Minister of State Security, Chen Wenqing (above). Chen studied Law and Political Science at Southwest University in Chongqing, and joined the Ministry of Public Security in 1984, where he worked for a decade. In 1994, Chen was assigned to the Ministry of State Security (MSS), becoming Deputy Director at the Sichuan provincial state security department. In 1998 Chen took over leadership of the State Security Department in Sichuan. He held that position until 2002, when he was appointed Chief Prosecutor at the Sichuan Provincial People’s Procuratorate. In 2006, Chen transferred to Fujian, serving as Deputy Party Secretary and concurrently head of the provincial Commission for Discipline Inspection (CCDI) until 2012. Following the 18th National Congress of the Communist Party China, Chen was brought to Beijing to serve as a Deputy Secretaries of the CCDI. He was appointed Party Secretary of the MSS in October 2016 and Minister in November 2016.

Section 2: “Key Findings”

In the section, “Key Findings”, Eftimiades provides a list of judgments supported by the information and data in his monograph. For readers, especially students, they may provide some guidance on an academic inquiry concerning Chinese intelligence. Right out of the gate, he notes that his “Key Findings” section is the product of his earlier analysis of 595 documented cases of China’s worldwide collection efforts. Thereby, they stand here independent of, but a primary feature of what is discussed in the monograph. In the monograph’s “Preface”, Eftimiades plainly states that “the focus of this work is on [China’s] worldwide human intelligence (HUMINT) operations.” Yet, in his key findings, he seems to indicate that the true focus of the monograph’s discussion, rather than being the aggregate espionage efforts of government organizations and commercial entities, academic institutions, and independent individuals in the US, is Chinese government civilian and military operations. Imaginably for some, Eftimiades may appear to shortshrift readers on any findings developed through the study of the totality of China’s espionage in the US. Perhaps in Eftimiades’ defense, his omission may very well have been more of an issue of editing and oversight.

To the extent that his key findings are limited to government espionage activities, some might readily assert that rather than opening up new territory, his findings were nearly all well-trodden ground. Indeed, at first blush, one might view what Eftimiades presents as his findings as a somewhat prosaic enumeration of highlights from his examination of the 595 cases. However, greatcharlie assures that they are much more as there are some striking elements among them. Eftimiades 10 key findings were a follows: 1) Chinese espionage activity  has greatly expanded in the past 20 years; 2) Chinese entities conducting espionage include government agencies, the People’s Liberation Army, State Owned Enterprises, private companies, individuals, and several universities; 3) Approximately half of China’s worldwide intelligence collection efforts target military and space technologies; 4) Over 90 percent of China’s espionage activities are performed by ethnic Chinese and males perform more than 80 percent of it; 5) The Ministry of State Security, China’s main civilian intelligence service, exploits social media to target foreigners with access to sensitive information. Those recruitment efforts vary in quality considerably; 6) The Ministry of State Security make use of China’s visa and border control system to identify potential recruitment and manage clandestine assets; 7) Ministry of State Security espionage tradecraft has improved over the last four years, due in part to pressure against it from US counterintelligence services; 8) Nearly half of China’s traditional espionage efforts–pursuing political and military secrets–and covert action campaigns are targeted against Taiwan; 9) China’s foreign science and technology collection efforts correlate closely to the priority technologies identified in government strategic planning documents; and, 10) China’s “whole society approach” to espionage has a harmful effect on the US economy, diplomatic influence, and military capabilities. Furthermore, China’s actions threaten European national and economic security through espionage and coercion against government entities and business decision making.

What sparked greatcharlie’s interest considerably was Eftimiades finding concerning non-ethnic-Chinese recruitment, that more ethnic Chinese recruits are used than nonethnic ones by Chinese government organizations and commercial entities engaged in espionage in the US. Multum in parvo. (Much in little. (Small but significant.))

He makes an impressive statement, but regrettably, he does delve deeper into this issue at any point later in the monograph allowing readers to understand how he got there.  His “Analysis of Espionage Tradecraft” section would have been taken to even greater heights. Useful at some point of the monograph’s discussion also would have been some background on the evolution of Chinese intelligence practices to recruit nonethnic Chinese as well as ethnic Chinese as operatives. With regard to greatcharlie’s aforementioned presumption concerning Eftimiades somewhat likely effort to stoke debate on the monograph, perchance once again he is providing more grist for the mill on this score. Perhaps a set plan regarding the monographs page length did not allow him to expound on the matter.

Perhaps it would be enough for some to say in this case that Chinese intelligence services may have recognized they can achieve their respective goals more efficiently and effectively by working mainly with ethnic Chinese recruits. Yet, surely, Chinese espionage in the West has evolved from pursuing ethnic Chinese sources alone. All things considered, such a limited effort by Chinese government organizations and commercial entities would hardly be the case. It stands to reason that the number of nonethnic recruits with which they have been successful is far higher than the few he has enumerated. To an extent, in Eftimiades own examples there is evidence that a number of nonethnic Chinese operatives were targeted and successfully recruited. Chinese intelligence services clearly have the interest and capabilities to bring in such recruits presumably as would Chinese commercial entities engaged in espionage in the US.

As discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” it was once generally understood in the West that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers, businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections, and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use. However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method.

Guo Wengui, aforementioned here as the billionaire businessman who broke with the regime and revealed information from highly placed sources in the Chinese intelligence services that China’s espionage networks reportedly include up to 25,000 officers and 15,000 operatives, also spoke on the matter of non-ethnic-Chinese recruitment. Guo said Ma Jian, who recall was the vice minister for the civilian intelligence service, told him that a major shift by the Chinese was expanding the scope of agent recruitment from Asians to other ethnic groups.

One might argue that if Chinese government organizations and commercial entities engaged in espionage in the US were running only a few nonethnic operatives in the field, an idea Eftimiades’ statistics would apparently support, those few nonethnic operatives were doing a colossal amount of work alone to collect the loads of information from institutions where ethnic Chinese may not necessarily have been well represented or significant at all. In the abstract, and not to cast aspersions on any employees anywhere in which the erstwhile spies worked, but it may have been the case that other nonethnic Chinese employees were involved in espionage in those same institutions who went undetected and whose work was completely unknown to those who were caught.

Imaginably from a counterintelligence standpoint, if Chinese government organizations and commercial entities engaged in espionage in the US were running merely two or a few more nonethnic operatives in the field, trying intercept so few well-concealed individuals from a field of dozens of potential spies would conceivably be rather challenging. Finding them all during the past few years would be nothing less than spectacular accomplishment. C’est chercher une aiguille dans une botte de foin.

Chinese government organizations and commercial entities engaged in espionage in the US go after whomever might be best suited to meet their needs. For the accomplished services in the intelligence industry, espionage is a results focused business, not an ethnocentric one. It was noted earlier that Eftimiades insists that no one really knows how many officers and operatives working for China are on the beat in the US, but later in his “Summary” section suggests that they may very well number in the thousands. Aforementioned, too, were claims that the numbers of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field would be enormous. If those high numbers are accurate, it would likely mean those officers would be going after greater numbers of recruits. Surely, along with increased ethnic Chinese recruiting, nonethnic Chinese recruiting numbers would see far more than a nominal increase as a result.

Incidentally, Eftimiades mention of the balance between ethnic and nonethnic Chinese recruitment by Chinese government organizations and commercial entities engaged in espionage in the US, determined as a product of his analysis of the 595 cases, somewhat flies in the face of what he boldly asserted earlier in the discussion on the general on the unawareness of numbers of officers and operatives working on the ground there for China. As stated earlier, to the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US is in the abstract.   

People’s Republic of China PLA Major General Chen Guangjun (above), Chief of Central Military Commission (CMC) Joint Staff Department Intelligence Bureau. The 54 year-old Chen currently serves as chief of Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau as well as an Assistant to the Chief of the Joint Staff. Chen joined the Rocket Forces of the PLA in 1984. In the mid-2000s, he earned a Ph.D. from Northwestern Polytechnical University. The PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. Chen achieved some notoriety prior to taking over the Joint Staff Department Intelligence Bureau. Through 2007 and 2008, Chen was the focus of several newsmedia reports chronicling his role in improving levels of education in his unit.

Section 3: “Introduction”

Eftimiades begins his Introduction by stating that while espionage is often employed to support foreign policy, a country’s clandestine activities rarely become the subject of foreign policy. However, despite how rare it might be, he says that is the case for the People’s Republic of China with its massive “whole of society” approach to conducting espionage. Eftimiades believes its approach is creating a new paradigm on how intelligence activities are conducted, viewed, and addressed by countries. He notes that a key element in the US-China trade war and downward spiral in relations–a matter the received much attention from the US newsmedia at the time he penned his monograph–is Washington’s demands that Beijing cease stealing US intellectual property and trade secrets. Despite China’s denials, Eftimiades stressed that “hundreds of recently prosecuted espionage cases” prove otherwise. China’s espionage activities are changing the global balance of power, impacting the US and foreign economies, and providing challenges to domestic, national security, and foreign policy formulation.

Not to be an apologist, but rather, to be fair-minded, Eftimiades notes that there are otger governments, companies, and individual entrepreneurs that violate US laws in the drive to possess or sell US technology, government and corporate secrets. He states: “Violating a country’s laws is common practice in the murky world of espionage. According to Eftimiades, almost every time an intelligence service conducts espionage in another country, it violates that country’s laws, and that includes US intelligence operating overseas.” However, he insists that the difference is that the US and other countries engage in espionage to determine and counter hostile or potentially hostile adversaries. The purpose of espionage is not to develop their countries’ own industries or transfer foreign wealth which is a main focus of China’s activities.

There is little doubt that the public affairs departments of nearly every bureaucracy under the State Council, and Propaganda Department and Foreign Affairs section of the Communist Party of China would chomp at the bit to enthusiastically and gloatingly state in response that the US space program was developed through the employment of scientists and engineers from Occupied Germany. The resettlement of the professionals and all of their research and development was facilitated by intelligence elements of the US national security bureaucracies. The Chinese would doubtlessly assert that US activities on that matter essentially established the model for acquiring foreign capabilities through national security bureaucracies to support their technological needs and channel down to large industries mostly related to defense and intelligence to support their advancement. Chinese public affairs spokespersons would surely go on to state, likely with the pretension of lamenting, that as a result of depriving Germany of its own citizens best efforts in aerospace technologies, the country was denied trillions in revenue from potentially providing the world the fruit of their expertise. Indeed, Germany could have become the epicenter of aerospace technology development and research in the world. (Mind readers this is a presumed argument of the Communist Party of China, not at all the position of greatcharlie.) Mayhap, the counterpunch would be that Werner Von Braun and the other German scientists and engineers sought to to the US and if they were left to their devices in Occupied Germany, the Soviet Union would have surely grabbed them up to use for Soviet Premier Joseph Stalin’s sinister purposes. Germany as a whole benefited immensely from postwar reconstruction due to the US Marshall Program. German industries were given an excellent restart as a result of their rebuilding and retooling under that program.

Section 4: “Analytical Methodology”

Eftimiades explains that for purposes of this study, all of the legal definitions of criminal acts in the statutes and administrative regulations found in the export violations–International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), International Emergency Economic Powers Act (IEEPA), as well as covert action, and research violations, are categorized as espionage. Eftimiades again explains that over a period of 10 years, he compiled and analyzed 595 cases of Chinese espionage that have occurred worldwide. He notes that over 450 of those cases occurred after 2000. He states again that through the analysis of these cases, sufficient evidence provided on espionage by the Chinese government, Beijing’s promotion and support of organizations outside of the government responsible for the same, and the information objectives, determines gaps in their knowledge, and operational “tradecraft” techniques of those organizations.

There is perhaps an argument to be made that once Eftimiades decided upon the definition of espionage mentioned in this section, he shaped his discussion of what Chinese non-government entities, institutions, and individuals would be viewed as engaging in espionage. One could hardly find fault with his decision. After all, his choice was not without precedent as certain bureaucracies of the US government involved in the 595 cases he studied made the same decision based on the law. However, from the lens of the accused Chinese non-government entities, institutions, and individuals, it may be the case that they were stealing trade secrets and intellectual property, but they may not have viewed their actions as espionage, rather just theft and just a part of business. One could imagine individuals of elements involved with such thefts saying with acidulous humor that if those, who possess information that they desired to purloin, really wanted to prevent theft, they would do a far better job at securing that information. Those with such larcenous instincts might go on to insist that those possessing the information would need to look deeper within to find the answer as to why they have so often left themselves wide open to theft. This thought, on the perception of thieving Chinese non-government entities, institutions, and individuals on whether their actions are a matter of espionage or “merely” grand larceny, is developed further in this essay in the “Analysis of Espionage Tradecraft” section.

The monograph’s following four sections on Chinese operations and tactics were meat and drink for greatcharlie and will likely be for like-minded souls. They are: Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; and, Section 9: “Analysis of Espionage Tradecraft”. Only three of the four are fully discussed in this review.

Section 6: “PRC Organizations Conducting Espionage”

The espionage effort by Chinese government organizations and commercial entities, as explained by Eftimiades, has features that are entirely its own. From an analysis of his 595 cases, Eftimiades explains espionage activities correlated to their sponsoring organization (the “customer” receiving the information or technology) showed five distinct clusters of organizations engaging in espionage. The governing Communist Party of China uses government, quasi government, academic, and commercial entities as mechanisms to conduct all forms of espionage abroad. Most interesting of these are China’s “non-traditional collectors”, which include State Owned Enterprises, universities, and private companies. He confirms that the employment of such a broad set of entities for intelligence collection evinces China’s “whole of society” approach to espionage. The list of includes: 1) the Ministry of State Security, the Guojia Anquan Bu, China’s preeminent intelligence agency, responsible for overseas espionage and counterintelligence both at home and abroad; 2) the Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau of the People’s Liberation Army (PLA), responsible for collecting and analyzing foreign military intelligence, including technology; 3) State Owned Enterprises (SOE), include the 50,000 aerospace and defense companies, subordinate research institutions, and technology transfer organizations owned by the central government; 4) Private Chinese companies or individuals acting unilaterally for commercial benefit only were engaged in espionage in approximately 22 percent of cases Eftimiades analyzed, and in nearly 30 percent of those cases, there was a clearly identifiable Chinese government, SOE, or university as the ultimate customer for illegal exports or trade secrets; and, 5) Other Chinese government elements that collect intelligence (information) and technology include the PLA Political Department Liaison Office (targeted against Taiwan), the United Front Work Department (UFWD), and many universities under the State Administration for Science, Technology, and Industry for National Defense (SASTIND). 

Most intriguing to greatcharlie was Eftimiades’ discussion of the PLA Political Department Liaison Office, the UFWD, and SASTIND. Beginning in reverse with SASTIND, Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Clearly put by Eftimiades, as the start point of a virtual wheel of information exchange, SASTIND assigns projects to ministries with military production responsibilities. Those ministries pass the work to the research institutes under their auspices. The associated research institutes send their information and technology gaps back to SASTIND. There are two departments within SASTIND,responsible for developing and tasking technologically related intelligence requirements and for collecting intelligence against those requirements.They are the Comprehensive Planning Department and the International Cooperation Department. The Comprehensive Planning Department tasks collection to the MSS and most likely to the PLA Joint Intelligence Bureau. The International Cooperation Department has its own independent collection capability. Members of this department travel with China’s scientists to collect information against specific requirements.

Eftimiades reports that SASTIND also has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. Some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. That list includes: Beijing Institute of Technology; Beijing University of Aeronautics and Astronautics; Beijing Engineering University; Harbin Engineering University; Harbin Institute of Technology; Northwestern Polytechnical Institution [University]; Nanjing University of Aeronautics and Astronautics; and, Nanjing University of Science and Technology. As of the monograph’s writing, over 35 Chinese universities (or professors from those universities) have been identified in US federal court documents as having some role in China’s overseas espionage cases, according to Eftimiades.

Eftimiades explains that the distribution of Chinese espionage cases worldwide illustrates the magnitude of Communist Party of China controlled businesses, research entities and business organizations involved in espionage activities. Providing superb graphs and charts for readers to examine while following along with his discussion, he shows that there is a near equal distribution of espionage activities between the four major organizational clusters (MSS, PLA, SOEs, and Private Companies). Eftimiades explains that the distribution indicates a concerted effort to use all mechanisms of government and the economy to collect foreign information and technology. To date, the Communist Party of China and the Chinese government have not taken steps to impede illegal activities (according to foreign countries laws) of their state corporations, private businesses, universities, and citizens. Eftimiades says China, referring to it once again as a “digital authoritarian state”, is clearly capable of doing so. He suggests that the Communist Party of China sees the appropriation of foreign innovations and technology as part of a policy aimed at developing domestic technology and increasing production.

In addition, his statistical breakdown of the 595 espionage cases illustrates that Chinese private companies have an aggressive posture in conducting espionage, resulting in 136 cases or approximately 23 percent of all activity worldwide. Similarly, SOEs were surreptitiously examining or collecting information or technology in 121 cases or 20 percent of the total. The SOEs are primarily collecting advanced military technology and associated research. Private companies and individuals primarily pursue commercial technologies, intellectual property and military technologies. Espionage activities conducted by the PLA Joint Intelligence Bureau give primacy to defense information, armaments, and military (or dual use) technology. The PLA was involved in 122 instances of espionage or 19 percent of all cases. Eftimiades reports that the MSS was involved in 95 instances of espionage or 16 percent of all cases. Preferred MSS targets included political or defense information, foreign policy, overseas dissidents, military capabilities, too, and foreign intelligence services. The final category of entities conducting espionage on behalf of China were Chinese universities and the UFWD. The universities generally targeted foreign technology to support advanced military weapons systems development and commercial endeavors.

Regarding the PLA Political Department Liaison Office, Eftimiades, in a markedly  unadorned way, explains that it is targeted against Taiwan. However, some confusion may befall those readers who perhaps may think of the Communist Party of China’s International Liaison Department when they come across the title, International Liaison Office. Among the pertinent facts, as part of Xi’s military reforms, in November 2015 the General Political Department of the Central Military Commission was abolished and was replaced with the Political Work Department. In January 2016, the Political Work Department became official. Its primary role as the chief political organ under the Central Military Commission is to integrate the Communist Party of China and its ideology and propaganda into the People’s Liberation Army. In that role, its responsibilities include: preparing political and economic information for the reference of the Political Bureau; conducting ideological and political work on foreign, particularly adversarial armed forces, by promoting China’s policies among their ranks, and disrupting unit cohesion within adversarial forces by withering their morale. It also has the duty to incite descension and rebellions particularly within the Taiwan army and other foreign armed forces. The Political Work Department’s Liaison Department controls a united front organization called the China Association for International Friendly Contact (CAIFC) that is active in overseas intelligence gathering and influence operations. Reportedly, the International Liaison Office has dispatched agents to infiltrate Chinese-funded companies and private institutions in Hong Kong. Their mission is also counter-espionage, monitoring their own agents, and preventing their recruitment of Chinese personnel by foreign intelligence services.

The International (Liaison) Department of the Communist Party of China is a very different organization. It stands as one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three include the UFWD, the Chinese People’s Political Consultative Conference (CPPCC), the Propaganda Department. Founded in 1951, International (Liaison) Department is the party’s diplomatic arm, handling relationships with more than 600 political parties and organizations as well as individual, primarily political, elites. The department previously handled the Communist Party of China’s relationships between fraternal Communist parties and cultivated splinter factions of Moscow-dominated Communist parties after the Sino-Soviet split. The activist bent of the International Department disappeared as the department began re-establishing itself from 1970 to 1971 following the tumultuous early years of the Cultural Revolution. Indeed, in the 1970s, as Anne-Marie Brady explained in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the International Liaison Department’s intelligence efforts often surpassed and even outmatched those of regular Chinese intelligence services. It became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies and guerrilla movements worldwide. Interestingly, the department originated as a UFWD bureau before being carved out into an independent entity.

You Quan (above), head of the Communust Party of China’s United Front Work Department (UFWD). You Quan was appointed United Front Work Department (UFWD) head on November 7, 2017. You directs the UFWD, assisted by seven deputy directors. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance.

Although he mentions the UFWD, Eftimiades does not provide any discussion of the organization. For readers wholly unfamiliar with it, greatcharlie provides some small treatment here. As discussed in the October 19, 2020 greatcharlie post entitled, “The Case of a NYPD Officer Allegedly Engaged in Intelligence Activities for China Spotlights the United Front Work Department”, within China, the UFWD plays a vital policy development and coordination role, especially for ethnic and religious minorities. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. Xi has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. United front work is the central element to understanding what the Communist Party of China is doing and why to shape the world outside of itself. In a June 9, 2020 Australian Strategic Policy Institute report, You Quan, the head of the UFWD, is quoted as saying: “The United Front is a political alliance, and united front work is political work. It must maintain the party’s leadership throughout, having the party’s flag as its flag, the party’s direction as its direction, and the party’s will as its will, uniting and gathering members of each part of the United Front around the party.” People’s Republic of China Chairman Mao Zedong described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a 1950s CIA paper, united front work was referred to as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the Party.

Perhaps from a publisher’s point of view and with some intimation of what would most interest the monograph’s readers in fields of business and finance, Eftimiades thought it most necessary to place emphasis upon the State Administration for Science, Technology, and Industry for National Defense (SASTIND) over all of the other PRC organizations engaged in espionage. The information presented on SASTIND, for instance, is assuredly not part of regular discourse on Chinese espionage. Eftimiades, in a rather sedate tone but still a quite edifying stream of consciousness, lays out what that government organization’s well-controlled work against the US and other highly industrialized countries worldwide and its stealthy and insidious nature.

It should be expected, and may actually be tacitly accepted by some intelligence analysts in the US and in the services of other highly industrialized countries, that among Chinese government organizations and commercial entities on the ground in the US engaged in espionage, there are understood defined areas of responsibility and much as the clear boundaries already set, and well-known, between PLA HUMINT targets and activities and those of its civilian counterpart, MSS, similar arrangements have been made to avoid unwittingly conducting redundant operations, accidental collision of officers and operatives in the field, and potential interservice competition and quarrels in pursuit of available sources for US secrets. A similar delineation between the MSS and Zhōnghuá Rénmín Gònghéguó Gōng’ānbùthe Ministry of Public Security of the People’s Republic of China (MPS), both a law enforcement and an intelligence and counterintelligence service. Harmony among organizations is doubtlessly desired and required in order for them to succeed and to avoid being caught.

Yet, with so many Chinese government organizations and commercial entities on the ground in the US engaged in espionage, theft, overt collection, hiring operatives, surveilling and studying the opposition, as a reality, on more than one instance an effort to collect a particular type of information might lead more than one organization, for example, one governmental and one commercial, to the same target. One might imagine how chaos could reign without some communication. Officers and operators, perhaps not even immediately aware of each others presence, might literally run into each other, occasionally tread on each other’s work, and might even step on each other’s toes now and then creating some disruption. Some general agreement between organizations and entities in the field would need to exist in order to ensure possible fruitful operations would not face “friendly” challenges and obstacles albeit unintentionally, and to ensure they are enabled to adhere to clearly delineated lanes of action for each organization. On the matter of security, one might imagine how much easier it would be to detect and intercept Chinese espionage operators from the different organizations if they all kept showing up at the same institution trying to contact, recruit, smooze, cajole the same people in them, or one institution were simply bombarded by attempts by individuals to inveigle their way into it with a similar focus on its research and development. Obviously Chinese espionage efforts have been far quieter, smoother, and more sophisticated in nature.

Perhaps the best way to what is discussed here is simply to state that there are likely furtive bridges across organizational lines and areas of responsibilities that allow managers on the ground and officers, old hands in the business who have mastered the job, engaged in intricate operations against similar targets to directly communicate, provide assistance, modest resources, and advice all designed to facilitate security and activities and promote success. It would be a form of unofficial, collegial, furtive modus vivendi established with the requirements for operational security firmly in mind and every imaginable precaution taken. In this section, Eftimiades briefly mentions that in at least two cases, there were actually joint MSS and PLA operations in which individuals inside an aerospace company were recruited as operatives to assist in targeting the company for cyber-attacks. The MSS is so segmented with its many state department’s and provincial bureaus, that the most effective aspect of any effort by the two organizations to work jointly must have occurred between managers in the field. Given the success each espionage element, government or otherwise, has found in the US, the Communist Party of China, which would indubitably be aware of such interorganizational contacts, would likely stay mum about it all but monitor it all the same. After all, Communist Party of China intelligence organs operating sub rosa in diplomatic missions and commercial entities or incognito wherever else, would conceivably benefit too from being tied into the clandestine communications among managers in the field imagined here.

Concerning another point that flows from this discussion, rather than lacking actual knowledge or even a good sense of where everyone was relative to each other among Chinese government organizations and commercial entities engaged in espionage in the US and not having an full account of who was on the ground and stand bereft of paths for the most senior network managers of each organization to liaise, potentially in some extraordinary emergency, in the abstract, surely one could conceive that there would be a least some tacit coordination among their senior leaders, perhaps back in China. Such information would at least be in PLA, MSS, and–as often ordinary Chinese citizens will usually be involved–MPS hands. MPS surely has the most complete, up-to-date records–are perhaps often pulled into the mix of overseas espionage activities to some small degree for that reason. That information would also most likely be in the hands of the Communist Party of China via MPS. In addition to performing standard domestic functions as a law enforcement and intelligence and counterintelligence service, MPS is very much tied to the Communist Party of China to the extent that it helps the Party maintain its tight grip on the population.

For the edification of greatcharlie’s readers who may be not so familiar PLA intelligence, as explained in the  January 31, 2021 greatcharlie post entitled Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)”, the PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission. Thereby, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), something similar to the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare are now aggregated into the Strategic Support Force. As with its sister civilian service, the MSS, and intelligence services worldwide, the PLA makes regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. It aggressively uses Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection.

Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Eftimiades reports that SASTIND has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. On that list is Northwestern Polytechnical University of Xian, China, It is ranked number 1 in the discipline Aeronautical and Astronautical Science and Technology, known for producing some of the best brains in China’s defense industry.

Section 7: “Intelligence Collection Objectives”

As promised, greatcharlie has condensed the sections of Eftimiades monograph, providing important details, but it has not revealed everything. Yet, with such a relatively short text, there would naturally arise occasions when little option would appear available than present wholly what is provided in a particularly diminutive section, in order to provide the reader with a full understanding of the author’s thinking. That is the case with the “Intelligence Collection Objectives” section of the monograph. Under what has been whimsically dubbed as “spookspeak” by members of the intelligence industry some time ago, Collection Objectives, also known as Information Objectives or Requirements, identify the specific information or technology that is tasked to intelligence services for collection. Eftimiades stated that requirements can number in the tens-of-thousands, and explains that one can infer from requirements a country’s knowledge and technology gaps for they are a reflection of them. He provides as an example a country that has been continually pursuing information on specific components of turbine engines. The implications and indications for taking that course, says Eftimiades, are that the country most likely lacks the required information or technology on turbine engines for its planned purposes and espionage presents the only immediate way of acquiring it. Non solum eventus hoc docet, iste est magister stultorum, sed etiam ratio. (Not only does the outcome teach (us) this, that is the teacher of fools, but (so) too does reason.)

Regarding China, Eftimiades explains that its strategic collection objectives can be identified through a number of national level strategic planning documents. Listed earlier in the “Key Findings” section in the monograph, they are: Made in China 2025; Space Science and Technology in China; and, A Road Map to 2050, the National Key Technologies R&D Program, and the 13th Five Year Plan. Those national level strategic planning documents can be subdivided into specific technology development programs, are the following: the National Basic Research Program (973 Program); the National High-Tech Research and Development Program (863 Program); the National Key Technologies R&D Program; and, The National S&T Major Projects. Eftimiades offers a subset of those National S&T Major Projects which includes: Advanced Digital Control Machines and Fundamental Manufacturing Equipment; Breeding of New Variety of Transgenic Biology; Core Electronic Devices, High-end General Chips and Fundamental Software; Key New Drug Innovation; Large Scale Development of Oil and Gas Fields and Coal-bed Gas; Megascale Integrated Circuit Manufacturing Technologies; Next Generation of Broad Wireless Mobile Networks; Wastewater Control and  S&T Achievement Industrialization; National New Products Program; and, the National Soft Sciences Research Program. 

Eftimiades says that as one further breaks down the strategic technology objectives, a strong correlation to China’s espionage activity emerges. The Director of National Intelligence report, Foreign Economic Espionage in Cyberspace (2018) identified industries and private technologies that are frequent targets of foreign espionage. Eftimiades’ informs that an even closer correlation between China’s espionage efforts and national requirements can be made when comparing the 595 cases with the 19 key Technologies identified in the Communust Party of China strategic industrial planning documents Made in China 2025. These technology requirements were the primary objectives in the 435 cases. The fact that such a high proportion of espionage activities are correlated in Made in China 2025 Key technology list indicates the Communist Party of China’s role in guiding China’s global espionage effort.

Laying out points on this matter from his case analysis for all readers to understand, avec brio, Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks. Such collection efforts support PLA military aerospace programs and China’s commercial aviation sector. Going further, he states that a review of the 116 cases targeted at aerospace companies identified over 200 specific military and civilian technologies and trade secrets (stolen and attempted stolen). Among the many “Key Technologies” sought, were: Cryogenic pumps for space vehicles, valves, transfer lines, refrigeration equipment, space qualified radiation hardened circuits, components for the storage and use of liquid hydrogen, cryogenic coolers, Ka-band space communications, satellite/missile insulation blankets–germanium coated polyimide film, and multi octave traveling wave tubes used as amplifiers in satellite transponders. Major systems include: the Space Shuttle, Delta IV Rocket, F-15 Fighter, C-17 transport, F-22 Fighter, F-35 Fighter, B-1 Bomber, Ch46/47 Chinook, C-130 training equipment.

China’s Mars rover, the Zhurong (above) rolls off its lander, to begin a mission of seeking out geological discoveries. Was its development the result of espionage? Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks.

Another high priority collection target of Chinese espionage is information technology. Statistically speaking, China’s collection of information technology (113 cases) is second in numbers only to aerospace technology. China has placed strong emphasis on collecting information technology to include semiconductors and manufacturing technology. Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did. The Chinese company Huawei has been under similar export restrictions for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Key information technology related to China’s collection requirements include: microelectronics, microwave integrated circuits, microprocessors, circuit boards, crypto key devices, data and voice transmission systems, semiconductors, and trade secrets such as laser manufacturing techniques. Semiconductor manufacturing is a priority target for Chinese espionage as the US and several other nations still maintain a sizable lead over China in production capabilities. Additional priority targets for collection include biopharma and medical devices, automated machine tools and robotics, energy saving/new energy vehicles, and new materials development. Eftimiades informs that these are often distinct patterns of intelligence activity that correspond to each category of technology. For example, excluding China’s  cyber espionage campaigns, collection on biopharma and medical devices is limited to exploiting research programs (e.g., Thousand Talents Program) or economic espionage using company insiders. The three targets for this category are universities, research institutes, and pharmaceutical companies. Lastly, In the category of energy saving/new energy vehicles, Eftimiades states that most of the collection activity has been economic espionage employing insiders. The two targets for this collection effort have been companies and research laboratories. Eftimiades reveals that the majority of thefts of this technology have occurred through insider threats with cyber espionage as a secondary method.

To be succinct, in many fields, subject areas for analysis, facts are often misused and abused, but on intelligence, it can lead to great failures, and potential national disaster. Facts cannot be nailed down and used to support only what one wishes. To the contrary, facts should take the analysis toward what is authentic. From that judgments and plans must be based. Doing anything otherwise, especially while in pursuit of an opponent, is simply to procrastinate by entertaining oneself with errant deliberations. The opponent, no matter what one might choose to believe, does not procrastinate. As Eftimiades, himself, notes in the “Intelligence Collection Objectives” section of his own text, the Chinese know what they want and go after it at the time, in the way, and with the means they desire. Operatives complete their tasks and off secrets go–and oftentimes actual technologies as well–to China. That is one of the simple and more apparent keys to the opponent’s success.

China has shown little compunction over putting in full view at home, marketing, technologies, and making geopolitical moves that would be suggestive of the fact the information that allowed for those developments and actions was stolen from the US. It is almost as if the Communist Party of China encourages such actions to flaunt their country’s considerable bag of intelligence victories. Of course, government officials in Beijing will normally assert that there have been thefts and declare any evidence presented of such as circumstantial or outright lies.

Given just how much China has poached from the US has been revealed, even paraded in Beijing, one could reasonably conclude–and it is absolutely true–that China has run off with far more than a bale of information and data on classified defense and intelligence related projects, innovative commercial products, trade secrets, intellectual property, and classified foreign and defense policy documents. It is safe to say that an enormous amount is being collected. It might leave some to reasonably accept that a stratospheric level of espionage is being conducted by far greater numbers of intelligence officers and operatives and it has been ongoing.

Eftimiades provides a brilliant account of Chinese intelligence collection requirements. He supports his claims with superb charts. Some are practically signposts pointing to where the adversary is likely to show up next. Some are strong enough to serve as figurative beckoning fingers enticing along with whispered words, “Here they are.”

Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE, now defunct. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did.

Section 8: “Analysis of Espionage Cases”

The dominant activities for China’s overseas espionage are espionage, economic espionage, and export administration regulation (dual use) violations, together comprising 60 percent of all activities. Taken as a whole, statistically speaking, illegal exports (theft of dual use and military technology) make up approximately 47 percent of China’s espionage activities abroad. Eftimiades divides the 595 espionage cases that he analyzed into the following categories: espionage; economic espionage as defined by ITAR, EAR, IEEPA; covert action; and, research violations. China’s illegal export of military and dual use technology, to include IEEPA, EAR, and ITAR violations and other export related violations in the US, comprise 43.7 percent (260) of all cases worldwide. Eftimiades says more than 80 percent of these cases occurred in the US. Reportedly, economic espionage which is mainly conducted by private companies or individuals, account for 25.98 percent (119 total) of cases). The category of “traditional espionage” stands at 22 percent (108 total) of worldwide activities. Eftimiades notes the figure of traditional espionage cases sits at 55 if Taiwan is separated out as a Chinese intelligence target. Of known cases, Taiwan is the single highest priority target for individual espionage.

On a chart provided by Eftimiades, one can observe the distribution of cases to the many venues of Chinese espionage in the US. The distribution pattern reveals concentrations occurring in tech sectors, manufacturing hubs and business centers. In California, “Silicon Valley” is shown to be the number one spot in the US for China’s illegal technology collection efforts. Apparently, more than half of the 140 cases that occurred in California targeted technology firms in that venue. Other cases centered around San Diego and then Los Angeles in the state. Further, collection activity in California was mainly economic espionage (51) cases), EAR violations (30 cases), ITAR violations (25 cases), and IEEPA violations (13 cases). In the economic espionage cases, the predominant form of tradecraft was using insiders (employees) to access restricted technology and trade secrets. Priority collection objectives in California were information technology (46 cases), aerospace and aeronautical equipment (27 cases), and automated machine tools and robotics (20 cases). Nationwide, China’s collection activities cluster around the major educational, research, and manufacturing centers in several states to include Massachusetts, Michigan, New York, Pennsylvania, Florida, New Jersey, and Texas. Victims of China’s espionage efforts in the US include major defense and aerospace companies, pharmaceutical firms, technology research companies, and manufacturers. In cases in Virginia and Florida, Chinese diplomats and citizens were caught trespassing on military facilities to conduct ground photo reconnaissance. Those facilities were associated with US Naval forces and special operations capabilities.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) Eftimiades notes that research universities are clearly primary targets for collection efforts, achieved most often through talent programs such as China’s Thousand Talents Program, Hundreds Talents Program. Eftimiades reports that most estimates suggest there are “at least 200 Chinese talent programs designed to employ academic and professional expertise from the West into serving China’s national development.” He continues further to explain: “This expertise ranges from scientific and engineering fields to business, finance, and social Sciences. These programs are serviced by 600 overseas stations that gather information on foreign scientists and then attempt to recruit them. In numerous cases, professors, graduate students, and PLA researchers have also been arrested for stealing research from overseas universities for use in China.”

Chinese intelligence services apparently studied the situation, and recognized just how open the US was for theft of its secrets in all sectors and then clearly decided to pour through, taking whatever they could. Surely, the Communist Party of China saw no need to halt commercial entities engaged in their own espionage activities, much as Eftimiades remarks earlier in the section entitled “PRC Organizations Conducting Espionage”. It appears they have seen nothing but opportunities to do a lot of open field running for them with little real risk. To date, it appears that they have all found no reason to pare down their operations, and certainly no reason to retreat. From Eftimiades own data, one can infer their espionage activities have steadily increased. Opinionis enim commenta delet dies, naturae judicia confirmat. (For time destroys the fictions of error and opinion, while it confirms the determination of nature and of truth.)

Though Eftimiades explains in his Preface that “cyber espionage is only addressed in select cases which were enabled by humans providing insider access. However, in discussing how exactly the FBI and DHS have thwarted Chinese espionage efforts later in his “Analysis of Cases” section, the discussion meanders into cases in which they discovered sources within China of cyberattacks into sensitive computer files of the US government, defense related businesses, financial institutions, high-tech and medical research facilities, academia, and anywhere else the hackers apparently believed there was a good opportunity to break-in and seize data. While Eftimiades expressed the intent to focus on HUMINT operations and tactics of Chinese government organizations and commercial entities engaged in espionage in the US, it would seem that he had little choice but to present it if he sought to put some positive face on what US counterintelligence services are doing to thwart China’s efforts. It is the brightest rift which can at present be seen in the clouds,

Readers may recall in Act 1, scene 3 of William Shakespeare’s play, The Life and Death of Julius Caesar, Cassius utters these apposite words to his co-conspirator Brutus: “The fault, dear Brutus, is not in our stars / But in ourselves, . . . .” With the intention of being frank, but by no means beastly, greatcharlie proffers that the fault for China’s success may lie with the US counterintelligence services themselves. It may be less a matter of tactics, techniques, procedures and methods, and rather a problem among US counterintelligence service personnel that the Chinese have recognized that they can exploit. As a matter of professional development, some effort might be made to ensure their cognitive abilities regularly honed through weekly, even daily, exercises and tests to strengthen their thinking skills, their prowess at uncovering all relevant facts, even from trifles, and developing solid insights from those facts, and their effective and correct use of a reliable intuition and intimation. Though this is stated in the abstract, one can almost be certain that the Chinese intelligence services to some degree are doing like-minded things to strengthen their intelligence officers competences. It could be something as simple as the private performance of Tai chi chuan or likely Martial Qigong every morning. (imaginably, both techniques would be performed respectively with a dynamic and free-flowing form and stances that would cause any instructor to weep with delight while observing ) Along with exercise, stretching, and breathing, it would allow their intelligence officers to mediate and attain deep focus and a relaxed state. Such activity would be helpful in any struggles with dépaysement.The Chinese intelligence services surely are quite determined to maintain an edge over their adversaries. So far, they have proved themselves to be competent and accomplished services in the field.

The Chinese company Huawei has been placed under similar export restrictions as ZTE had been, for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Section 9: “Analysis of Espionage Tradecraft”

As stated earlier, a condensed review of Section 9 “Analysis of Espionage Tradecraft” is not included here. The section is left to each reader to enjoy at first blush and perceive and decipher all they can from it. Recall that in November 1922, when excavating the tomb of Tutankamen, the English archeologist and Egyptologist, Howard Carter, pierced a hole enabling him to see inside the actual chamber. He was asked by colleagues if he could see anything, and he simply replied: “Yes! Wonderful things!” Readers will say the same when they read this section.

Having stated that, greatcharlie nevertheless includes some commentary on section, compelled by Eftimiades to mention that among those committing acts of espionage for China are commercial entities, SOEs and private companies, academic institutions, and independent individuals, particularly entrepreneurs. Eftimiades explains that SOEs and commercial entities have been determined to engage in espionage in the US and elsewhere outside of China. Having dubbed them as entities engaged in espionage, they are examined as such and ascribe all of the qualities of an intelligence service. Thereby, one would expect to observe certain traits of an intelligence service such as tradecraft to be performed by their representatives while operating in the field. Yet, unless there is some information collected by US Intelligence Community–and that would unbeknownst to greatcharlie–stating those entities as well as individual business engaged in similar acts, view themselves to be intelligence services or espionage organizations, one may not see them regularly act as such.If they display any tactics, techniques, or methods that resemble tradecraft it should be viewed as exceptional and not an expectation. Imaginably, they, themselves, might be quite surprised anyone might refer to them as espionage organizations. They simply may view themselves as a “collective” Chinese citizens working in the US availing their home companies and country of technologies, hardware, documents or whatever else they might grab from US institutions that may employ them as the opportunities present themselves. To that extent, they may really be nothing more than somewhat organized rings of thieves, nothing more. As for these individuals showing such willingness to respond to the requests and demands of the Chinese intelligence services or other State Council bureaucracies as SASTIND, too much might be made of the fact that they are obedient to the commands and demands of their authoritarian and very often punitive, government. After all, in addition to their own lives, everything that they hold dear, their families, are in the hands and under the awful power of an authoritarian–some might say totalitarian–Communist government in Beijing.

Of course, one must be open-minded. Thus, the door should not be shut completely on the possibility of some deliberate design in the practices of such commercial entities and individuals with regard to their espionage. Note that overall, their practices are not chaotic or haphazard, but rather they are grounded and for the most part accomplished. Aliquis latet error. (Some trickery lies hidden.)

In the abstract, one could imagine their movements and interactions of individuals operating for commercial entities may be intentionally stochastic. Indeed, if the activity is genuine espionage and not simply criminal behavior what greatcharlie supposes should really draw the attention of US counterintelligence is not as much whether it meets a certain expected standard of tactics, techniques, procedures and methods. What should draw that attention is the appearance of control, orchestration, and forceful activity, and that something intense is happening. Something is intended and is being achieved. The fact that there is a professional side to all of that activity must also be considered. The focus, greatcharlie humbly suggests, perhaps should be placed first on the purposefulness of the activities displayed by Chinese commercial entities and individual businesspeople, not its randomness. 

Acting as described, they allow themselves some degree of security without the need to set up resources, set up sites, train in tactics, techniques, procedures and methods to communicate and pass information physically. Keeping their movements randomly determined might leave their efforts open to analysis statistically. One could discern some random probability distribution or pattern. However, it might still be impossible for those movements and interactions to be predicted in a useful way. One might imagine that to rise to a certain level in their companies or institutions, the individuals involved are well-educated or clever enough to consciously plan their activities in a seemingly random way. Surely, anyone in a commercial entity or institution selected for such work will be tested and screened before being sent off. In some welcome back, job well-done session or maybe a torturous debriefing, the employees surely inform their manager what practices worked well in the field and which at the time were determined to be too risky.

What would seem as important, or perhaps even more vital for Chinese commercial entities, would be properly casting each “espionage operative” or “thief.” The absolute right man or woman must be assigned for the right job. Surely, human resources would bring in and spotlight the right people and managers would make selections for such work and overseas deployment. One would hardly find such individuals to be hot-blooded, and wreckless, incompetent in any fashion. They would exude equanimity, sangfroid, graciousness, and professionalism. They apparently work with a mindset that nothing is unattainable. Loosely, one might posit, taking such an attitude and approach to their efforts, might be said to be at the foundation of any “ostensible tradecraft.” Everything they do, choices they make, flows from that line of thinking.

Looking at Eftimiades discussion a tad more it would seem that he gives Chinese commercial entities and individuals engaged in espionage too much and too little credit at the same time. He perhaps gives them too much credit by identifying them as intelligence gathering organizations and thereby assessing their use of tradecraft. He gives them too little credit in that if he believes his presumption as to their status as spies and their “spy-like practices,” correct, then he dismisses the possibility that their actions are disguised, deliberately performed in a way distant from tradecraft as a technique. If their intention was to cause confusion among possible observers by taking that tack, Eftimiades’ expression of some puzzlement over the absence of traditional tradecraft in their practices serves as evidence that to a degree they may have succeeded in that. At the same time, certainly nothing they might do, would be intended to stand out, such as, perhaps in extreme, appearing gargoyle or something of the type, and drawing attention daily.

Some foundational information and thought on Chinese espionage activities in the US has to be established if study and understanding on the subject is to be advanced. The establishment of such a baseline of information, however, should not result conversely in some uncompromising stance toward it. New facts must be collected and an openness must exist to consider alternative analyses of those facts, which may lead to new possibilities and potential successes against such activities. There are likely many unexplored possibilities that perhaps should be considered about all matters concerning the subject. From what has been publicly reported, often in the US national security bureaucracies, perspectives on adversaries have reportedly become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, perhaps most akin to an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with regard to Chinese foreign intelligence activity in the US.

It seems high time that US counterintelligence services ceased looking at Chinese intelligence operations and tactics with a focus on their deficiencies and flaws in practice. Equally or even more important is to consider precisely what they are doing right in order to be successful. A starting point would be an assessment of how Chinese intelligence services and all the other government organizations and commercial entities engaged in espionage in the US view US counterintelligence services and how they are responding to US defenses set up against them. It would seem from Eftimiades text that a burgeoning notion in defense of the current situation in which China is achieving a degree of success is that their numbers in the US are so high that it would naturally be difficult to struggle with them head-to-head. Hopefully, this is not the case. To be frank, the ability of Chinese intelligence services to position so many of their personnel in the US is just a symptom of the conundrum of not being able to stem their activities. Focusing upon that will not yield a cure. There are surely considerable deficiencies and flaws in the way in which US counterintelligence operates that have given Chinese government organizations and commercial entities the confidence to act without much fear. Res ipsa locquitor. (The thing speaks for itself.)

Of the seven universities that have been dubbed the Seven Sons of National Defense, some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. On that list is the Nanjing University Aeronautics and Astronautics (above). Nanjing is also known for providing the MSS with recruits for its corps of intelligence officers.

Section 11: “Summary”

Since what is found in Eftimiades “Summary” section is drawn from his discussion of his analysis of the 595 espionage cases since 2000, it would stand to reason they would serve well as a figurative subset of eight ample bullet points for his “Key Findings” which themselves extracted directly from the facts of those many cases. Of that seeming “subset of findings” in Eftimiades “Summary” section, the “top 5” selected by greatcharlie are the following.

First, Eftimiades explains that the US Intelligence Community is not well-organized to protect the secrets of US industries. It is far better at protecting its own secrets. He says the same holds true for most other technologically advanced [highly industrialized] countries. A problem he points to, calling it obvious, is that commercial industry and scientific research programs, the primary targets for Chinese intelligence collection, are the most vulnerable.

Second, as aforementioned in the discussion of the monograph’s Preface, Eftimiades says the DHS and the FBI are leading the effort in the US “to combat China’s massive intelligence collection campaign.” He again states that both organizations “have done excellent work in reducing Beijing’s relentless efforts,” noting the FBI has made advances since 2018 to assist US industry and academia, and DHS is also working aggressively to curtail illegal exports of advanced technology and those who steal scientific research. However, he declares “there is still much more to be done.” He explains that the work of other government agencies as well as a bipartisan effort in Congress will also be necessary to ensure national and economic security.

Third, Eftimiades proffers that success in thwarting China’s aggressive collection efforts will ultimately rest upon three factors: 1) the ability of US law enforcement and intelligence apparatus to shift organizational culture and support private industry and academia; 2) developing a strategic campaign in the US integrating all the elements of the government and its allies; and, 3) having Congress pass laws to raise the costs of economic espionage to the Communist Party of China. Chinese companies and individuals via visa restrictions, sanctions, investment restrictions, and otherwise. 

Fourth, Eftimiades explains, as he has surely illustrated throughout his monograph by reporting his case analysis, yet does not declare in any vehement way, that China’s “whole of society” approach to espionage has been quite successful thus far in defeating government and private industry organizations. He focuses more on what has been positive about US counterintelligence efforts,

Fifth, Eftimiades reveals that efforts by some countries within the EU, India, and Japan to restrain China’s intelligence activities have been comparatively less apparent in public sources. Although espionage arrests in India, Germany, France, Belgium, and Poland have been low in number, he sees such developments as an indication that those countries now seek to more vigorously counter China’s collection efforts. In addition, Eftimiades asserts that “China’s public image is suffering worldwide as the French and German governments have made statements on China’s aggressive espionage on social media, human rights issues, COVID-19 response, and Beijing’s threats over trade.”

In determining the percentage of Chinese espionage efforts thwarted, it must again be noted that the percentage would need to be calculated based on the entirety of the Chinese espionage effort. If one accepts Eftimiades does not know that number, and there is no reason not to do so, knowing the percentage of thwarted espionage efforts seems impossible and his claim is only a presumption or at best the result of “secret knowledge.”

When writing about the success of the FBI and DHS in thwarting espionage efforts of Chinese government organizations and commercial entities, there was less of an appearance by Eftimiades of reporting facts, and a more apparent effort by him to convince readers on a position tenuously supported in the text that he wants them to accept. To that extent, he actually presents more than anything else, as there is no supportable alternative story to present given the realities of the situation, is a well-supported outline of concerted, energetic, and endless activity to steal US secrets by China.

It would seem that the nature of the situation has already been firmed in the minds of the public based on reports in the newsmedia. It is unlikely that readers of his monograph would be inclined to Eftimiades perspective, despite his remarkable background. It is unlikely that anyone in the US counterintelligence services, particularly among senior executives and managers, is on Cloud 9 over results versus Chinese government organizations and commercial entities engaged in espionage in the US. Somewhere deep inside, some may feel a bit stuck and stagnating, clutching at straws, and listening to the wind, but conceal such concerns from their colleagues. One might imagine their feelings: “Je suis las de toujours faire la même chose.” That would be a multifaceted problem for US counterintelligence services in itself. Perchance in trumpeting FBI and DHS success was an effort to boost morale or at least comfort those from each service who may have had their fill of Chinese success in their country. Eftimiades may have viewed optimism as the best and most available elixir for defeatism, and employed it liberally. Perhaps this line of thinking that drove Eftimiades, who leaves no doubt that he is unwavering in his support and confidence of the FBI and DHS, consciously drifts a tad away from his encomium of their respective work against Chinese espionage moves in the US. As also mentioned in the discussion of the monograph’s Preface, in the “Summary” section, Eftimiades does say “there is still much more to be done.”

Noticeably, in the “Summary” section, as noted in the discussion of the Preface, Eftimiades also relents so to speak from his “declaration of nescience” to say there are very likely thousands of Chinese espionage operators in the US. However, although there is clear evidence that their purpose is to steal US secrets and technologies, one might consider in the abstract whether there may be other interests of the utmost importance to the Chinese intelligence services that require such a labor-intensive effort. That should beat the brain. Going back to the suggested figure of 25,000 intelligence officers, professionals, albeit discrepantly trained and experienced, on the ground–a force one and half times the current size of a US Army armored division, it may be worth considering whether they may be engaged in a bold, cunning reconnaissance and surveillance mission of far greater conception than ever seen in the past or might normally be imagined in the present. Itt might be a mission that could not be performed in any other way than with a large force of professional intelligence officers. To be direct, yet admittedly still a bit Delphic, there must be a clear reason why officers of Chinese Intelligence services operating in the US, in particular, are so successful at not being wherever, whenever US counterintelligence services are looking for them. 

There is a thin line that separates reality from illusion. It must be kept firmly in mind that if one denies or unconsciously suppresses reality, what is left is only an illusion, false reality. Once one begins planning and operating within that, all is lost. If that is or ever would be the case concerning the Chinese conundrum, the situation will become far worse than ever imagined. Further, the more one deals in truths and reality, the more one develops reliable intuition and intimations. The more one entertains fallacies and what is artificial, the farther one moves away from having any real intuition or developing any intimations at all. These skills in the end will prove to be absolutely imperative if endsieg, a final victory against all of the odds stacked against them, is to be achieved by US counterintelligence services in their struggle against Chinese espionage efforts. As the celebrated Spanish novelist, translator, and columnist, Javier Marías remarked during an interview for the Winter 2006 issue of the Paris Review: “One must have courage to see what one does see and not to deny it for convenience.”

Regarding China’s concern about having the image of being a country of thieves and copycats, stealing the best ideas of other countries to support and propel its conspicuous advancements in nearly all sectors, the Communist Party of China absolutely has an interest in global public opinion of China and perceptions of its actions on the world stage. Still, it is unlikely that the Communist Party of China has too much concern about that in that vein. One must remember, the Party insists that at the foundation of all advancements of the Western industrial powers are the years those countries overwhelmed peoples who were defenseless and through a colonial system violently oppressed them and allowed business enterprises of their respective countries to exploit the conquered peoples’ lands for raw materials and mineral wealth for centuries. They will use the experience of China to support that argument. Within their own countries, the Party says down-trodden workers were essentially enslaved by the same business enterprises now called multinational corporations. (Note that greatcharlie asserts in the abstract that this is the Communist Party of China’s perspective; it is by no means greatcharlie’s perspective.)

Still, more salient based on the Party’s mindset would be the overall judgment of the world on the robust energy China displays as it pushes onward and upward into the future and, albeit mistakenly believing, eventually reaching the position at the top as the world’s dominant power. From that perspective, the Communist Party of China would see their country as having a very positive, lasting impact on global perceptions of it everyday. To that extent, the Party leaders and propagandists likely weigh that global perception on “energy” and Western measures of global public opinion ratings, particularly if those ratings are based on reactions to independent events and not the bigger picture. While one might agree that there are some universal truths about our world, still not everyone thinks the same on all issues. China’s view of its future is quite at variance with that held by most in the US best familiar with the issues involved. Fere libenter homines id quod volunt credunt. (In most cases men willingly believe what they wish.)

There will naturally be more that US counterintelligence services would want from the US Congress to appropriate for them in order to pursue adversarial countries’ intelligence services operating without pause, on the ground, in the US. However, the matter must be examined from the lens of Congressional leadership. From their view, US counterintelligence services  presently possess considerable resources to pursue Chinese intelligence officers and operatives. There are no indications Chinese espionage networks are being regularly taken down. Harsh critics and skeptical observers might begin to believe that, unbeknownst to the public, US counterintelligence services are actually being restrained from doing their utmost to defeat opponents here in the US. However, there would hardly be any logic to that. Surely, US counterintelligence services are not flâneurs, in the field simply playing chase games. Even the slightest act in that direction would betray the trust and reliance the US public has in their fidelity and  their belief that they are protecting the country’s sovereignty, its property, its interests and especially its people. As expressed in the February 26, 2021 greatcharlie post entitled “Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts”, by 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. Sardonically, from a paranormal perspective, one might suggest that although Chinese intelligence officers may be operating in the same spaces in which US counterintelligence services are looking hard, they do so in some other plane existence, undetectable by mortal eye. Sous une surface calme tout se passe.

There has been more than enough talk about how bad the problem with China is. C’est la Bérézina. As it has been discussed so often that, in a way, such talk haa become by the by to some degree for the US public. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and destroy all of its networks. As greatcharlie has mentioned in proceeding posts on the Chinese espionage crisis, It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Eftimiades clearly understands that much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. Fundamental changes may be needed in efforts to halt Chinese espionage operations. There is the possibility that certain apparent aspects of Chinese intelligence operations are not being focused on sufficiently or appropriately. Making the right improvements requires being persistent in one’s search for answers. To continue the pursuit successfully will require a certain boldness in thinking. Although he literally lost his head by guillotine two years later, George Jacques Danton, the 18th century French revolutionary leader, addressed the Legislative Committee of General Defence, September 2, 1792 with words concerning the situation in France which are apposite for counterintelligence organizations dedication protecting their countries against any harm by Chinese intelligence services: “De l’audace, et encore de l’audace, et toujours de l’audace, et la France est sauvee.” (Boldness, more boldness, and always boldness, and France is saved.)

What Eftimiades presents on Chinese espionage operations and tactics represents a stage of those activities existent at the time he wrote the monograph. However, Chinese intelligence operations and tactics appear to be constantly and rapidly evolving, becoming something more effective, more efficient everyday. As their capabilities improve, the possibilities for action also increase. It is difficult to accept but very likely a reality that success has given Chinese intelligence services so far good reason to approach the future with confidence. To that extent, the worst may be yet to come. However, on the other side of the coin, while it may seem counterintuitive to some ears, the success of Chinese government organizations and commercial entities engaged in espionage in the US should not frustrate US counterintelligence officers. Rather, it should embolden officers of US counterintelligence services to struggle even harder to succeed. Hope must still exist in the situation for that. Surely, establishing a pattern of success would go a much longer way in building self-confidence among officers in US counterintelligence services struggling on their own home ground with the Chinese.

What one finds in Chinese Espionage Operations and Tactics is of considerable quality. The book remains a steady flow of information, data, and expressions that well-demonstrates the author’s command of the subject matter, from beginning to end. Without pretension, greatcharlie states that what is presented here represents less than twenty percent of the insights birthed in greatcharlie by Eftimiades monograph. Readers should imagine what insights might be brewed up from within themselves after they have had a chance to read through it. 

It is assured that after the first reading Chinese Espionage Operations and Tactics, one would most likely go back to the book and engage in that stimulating process again and again. The monograph will very likely be regularly consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. Surely, the monograph would be quite useful to an Intelligence Studies instructor who, as a primary part of an assignment, might decide to have students read the monograph, observe the manner in which Eftimiades report is formatted, how information is presented in its sections, and develop insights from its discussion.

Perhaps it is eedless to say at this point, but it is nonetheless stated with absolute conviction and true relish, greatcharlie unequivocally recommends Eftimiades Chinese Espionage Operations and Tactics to its readers.

By Mark Edmond Clark

Commentary: Will the Real Dong Jingwei Please Stand Up?: Comparing Features of Popular Images of China’s MSS Vice Minister

People’s Republic of China Vice Minister for counterintelligence of the Ministry of State Security Dong Jingwei (far right), and People Republic of China Minister of Public Security Zhao Kezhi (center), were among five Chinese officials attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. On June 23, 2021, officials of the People’s Republic of China Embassy in Washington presented this photograph of Dong’s very public appearance at the Shanghai meeting as proof that he is in China despite rumors that he had defected to the US four months before. The point at issue is whether the photograph presents the real Dong.

In June 2021, rumors had taken flight concerning the alleged defection of Dong Jingwei, the People’s Republic of China Vice Minister for counterintelligence of Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS–China’s relative equivalent to the Central Intelligence Agency (CIA). Dong was alleged to have defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. After arriving safely into US hands, Dong allegedly provided government officials with information about the Wuhan Institute of Virology that purportedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. However, by late June 2021, US officials began reaching out to the news anonymously to say reports of Dong’s defection were not true. and hinting that he remained in China. The mainstream news magazine Newsweek reported on June 22, 2021 that it was informed by a US government official that reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Although reticent about the rumors for the longest time, on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite claims that he had defected to the US four months before. Curiously, the photograph has not been widely accepted as incontrovertible proof of Dong’s identity, that he still resides in China, or that he did not defect among many independent China-watchers.

Before the controversy of the rumored defection, one would have had great difficulty finding Dong Jingwei’s name anywhere it might even be expected. Two resources for such information that greatcharlie’s will reach for first are: Peter Mattis and Matthew Brazil, Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), and I. C. Smith and Nigel West, Historical Dictionary of Chinese Intelligence (Historical Dictionaries of Intelligence and Counterintelligence) (Scarecrow, 2012). Following the blow-up of the defection story, numerous articles online have appeared and online encyclopedias such as Wikipedia and Britannica, have developed enough information to provide decent–though some were not so verifiable–biographies of him. As was noted in greatcharlie’s June 30, 2021 post entitled The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax,” never before has Dong’s name, or any other senior MSS counterintelligence official’s name, been bandied about in the US or global newsmedia in the manner it has been lately.

What would imaginably now be a greater issue for inquiring minds than Dong’s biography, is the matter of his actual image, how he actually looks. A number of photographs of him have cropped up along with the many new articles, but two particular images of Dong have been very popular. As the two images have far more similar features than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. If they are photographs of two different men, one may actually be Dong. Here, greatcharlie gives making comparisons between the two images of Dong the old college try.

The June 16, 2021 tweet from the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong Jingwei had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia. Along with Han’s commentary was the popularized photograph allegedly of Dong Jingwei.

The first image mentioned above was made available widely via Twitter on June 16, 2021 as a result of being in a photograph attached to a tweet by the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia.

The second fairly popular image is included with his biography in Wikipedia. The individual in the Wikipedia photograph appears to be the same individual in the photograph that the Chinese government released of Dong attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. He is the same individual in a photograph taken when Dong was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. In the photograph, Dong is first from the left. It is alleged to be the earliest publicly available photograph of Dong after he began serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in April 2018. 

A photograph taken when Dong Jingwei (far left) was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. It is alleged to be the earliest publicly available photograph of Dong serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in the MSS in April 2018.

Si parva licet componere magnis. (If we may compare small things with great.) By placing the photograph of Dong from greatcharlie’s June 30th post beside the photograph from his biography in Wikipedia, using only the naked eye, one can find clear distinctions in at least seven areas of their respective faces. To allow readers to follow along with comparisons of facial features, the June 30, 2021 greatcharlie post photograph is included here as Figure 1. The Wikipedia photograph is included here as Figure 2. A chart that identifies parts of the human face is included here as Figure 3. Readers should refer to that chart to locate points of the face mentioned in Figures 1 and 2. The seven specific points on the face address include: philtrum; philtral columns; philtral dimple; nasolabial grooves; nasal septum; mentolabial sulcus; and, facial marks.

Figure 1 

Dong Jingwei June 16, 2021 Twitter Photograph

Figure 2 

Dong Jingwei Wikipedia Biography Photograph

Figure 3 

Face Chart

Philtrum

The philtrum on the individual in Figure 1 forms a visually straight canal with the philtral columns formed in straight lines from the nasal septum to the top of the lip. They are somewhat thick on both left and right. The canal of the philtrum appears relatively symmetric in its depth and width to the corresponding height and width of each philtral column. On the individual in Figure 2, the philtral columns appear shorter than those of the individual in Figure 1. They are separated enough to form the philtrum into a wider and somewhat deeper canal than that of the individual in Figure 1. 

Philtral columns

Although they are not marked on the chart in Figure 3–greatcharlie apologizes for that omission, the two columns of the philtrum running from the septum of the nose to the top of the upper lip are called the philtral columns. At the point the philtral columns touch the top of the upper lip–known more precisely as the vermilion border–in Figure 1, two delta shaped points form. Those delta shaped points are not present on the upper lip of the individual in Figure 2. On the individual in Figure 2, the philtral columns contact the upper lip in a way to form a horseshoe or “U” shape. The upper lip, itself–as aforementioned, called the vermillion–forms only moderate curves at the points on which the philtral columns contact it.

Philtral dimple

The philtral dimple, not marked in the chart in Figure 3–again, our apologies–is the gap between the two philtral columns where they contact the upper lip. On the individual in Figure 1, the philtral dimple is pronounced between what are visually two triangle shaped points, both left and right at the base of the philtral columns. On the individual in Figure 2, the philtral dimple is a far less pronounced facial feature.

Nasolabial grooves

The nasolabial grooves on the individual in Figure 1 are very pronounced both right and left. They begin at a point above the wings of the nose appearing to make contact with the dorsum of the nose. The nasolabial grooves on the individual do not contact the wings of the nose. They stretch in near straight lines down and to the left and down and to the right, reaching just outside the edge of the angles of the mouth. The nasolabial grooves on the individual in Figure 2 are not as long as that of the individual in Figure 1. They curve inward and contact the top of the wings of the nose of the individual. Although the nasolabial grooves are not as pronounced on the individual in Figure 2 as those of the individual in Figure 1, where they become more apparent is closer to the wings of the nose. They are somewhat deeper and the skin around them appears thicker than that for Figure 1.

Nasal septum

The nasal septum at the point where it contacts the philtrum on the individual in Figure 1 is thin. The point at which the nasal septum contacts the philtrum On the individual in Figure 2 is somewhat thick. The nasal septum also appears shorter to some degree. The individual in Figure 1 appears clean shaven beneath the nasal septum and over the philtrum to the upper lip. The individual in Figure 2, in all photos available publicly, maintains very slight hair growth, perhaps a deliberate, modest “designer stubble,” beneath the nasal septum, covering the philtrum down to the top of the upper lip and across to the angles of the mouth.

Mentolabial sulcus

On the individual in Figure 1, the mentolabial sulcus, the line or furrow formed between the base of the lower lip and the base of the chin, is prominent. There is an apparent blemish–mole, birthmark, scratch, bruise–beneath the mentolabial sulcus along its right edge, at a point just inside “the line.” The mentolabial sulcus on the individual in Figure 2 is barely perceptible. It has a somewhat curved shape. The chin on the individual in Figure 1 appears somewhat “U” shaped. The chin on the individual in Figure 2 appears more “bow” shaped. The length between the base of the lower lip and the base of the chin is shorter on the individual in Figure 2 than on the individual in Figure 1.

Facial marks

On the individual in Figure 1, there is a mole, birthmark, slight injury (scratch or bruise), beneath the mentolabial sulcus, beneath and just inside the right edge of it, not making contact with the line itself. On the individual in Figure 2, there are no similar marks on the face.

Finally, the most obvious difference between the two men is that one in Figure 1 wears eyeglasses. The individual in Figure 2 does not wear eyeglasses. It is possible, however, that the individual in Figure 2 does wear eyeglasses, but simply removes them when taking photographs.

Additional Observations Concerning Photographs

Signs of Aging

Eheu fugaces labuntur anni. (Alas, the fleeting years slip by.) What might be perceived beyond the physical about how two individuals in the photographs projected themselves at the moment their pictures were taken is that they are respectively professional, intelligent, well-minded, well-dressed, well-groomed, Chinese officials. However, from what information is publicly known, and what one may accept as true about Dong is that he is currently 57 years old, reportedly being born on November 18, 1963, one can attempt to correctly perceive aspects of his physical condition, too! To that extent, one might consider how age might impact the appearance of the real Dong.

There are many who really do not begin showing signs of aging until a bit later than 57. (By no means does one become “past one’s prime” or “over the hill” after reaching age 57!) Yet, there are some fairly common, and commonly understood, changes in appearance that normally occur. As one ages, the appearance of the face and neck typically changes. Loss of muscle tone and thinning skin can often give the face a flabby or drooping appearance. The skin also tends to dry out and the underlying layer of fat shrinks so that your face no longer has a plump, smooth surface. To some extent, wrinkles cannot be avoided. If readers would look back at the two photographs of individuals both identified as Dong in Figures 1 and 2, they will notice that the individual in Figure 2 has a rather plump, smooth surface. There are no wrinkles or furrows visible on the face. There is considerable muscle tone in the face in all three photos of him presented here, most prominently along the jaw. The individual in Figure 1, exhibits the more dried skin that comes with age. The visage of the individual is strong but there is no pronounced muscle tone. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, slight furrows can be discerned on his forehead.)

Sun exposure and cigarette smoking are likely to make them develop more quickly. However, there is no way for greatcharlie to determine whether the individual in the photograph is a heavy smoker or is regularly exposed to the sun. There is no way available for greatcharlie to determine whether these factors relate to the individual in Figure 1 either.

In another sign of aging, the number and size of dark spots on the face increase as well. It was noted earlier that there is a blemish on the right side of the face of the individual in Figure 1. However, there is no available way for greatcharlie to determine when that individual acquired the blemish. There are no discernible spots on the face of the individual in Figure 2.

With aging, the loss of bone mass in the jaw reduces the size of the lower face and makes your forehead, nose, and mouth more pronounced. The nose may lengthen slightly. In both Figures 1 and 2, there is no indication of the loss of bone mass in the jaw. The noses of the individuals in Figures 1 and 2 do not appear to have suffered ill-effects of age such lengthening. In fact, the skin on both noses appears rather smooth and plump.

A common transformation due to aging is for the fat from the eyelids to settle into the eye sockets. This can create the appearance of sunken eyes. make. The lower eyelids can slacken and bags can develop under your eyes. The weakening of the muscle that supports the upper eyelid can make the eyelids droop. This may limit vision. There is nothing to indicate any of these aspects have impacted the appearance of either individual in Figure 1 or 2. As the individual in Figure 1 wears eyeglasses, any effects on his eyes may have been influenced by them. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, it appears that there is a hint of bags under the eyes detectable through his eyeglass lenses.)

A most apparent sign of aging is gray hair on the scalp, and gray hair on the scalp, and on the eyebrows and eyelashes as well. One the individual in Figure A, there is no ability to determine whether he has gray hair in his eyebrows or eyelashes. Except for the hair above his forehead, one cannot see the hair on his scalp to determine if there is gray hair. (It must be noted that in a photograph included here below in which the same individual identified as Dong in Figure 1 is seen, his hair parted on the left side of scalp, revealing what appears to be gray hair.) The individual in Figure 2, on the other hand, clearly has no gray hair in his scalp, eyelashes, or eyebrows. In fact, as aforementioned, there is slight hair growth on his upper lip. It is decidedly black giving him a very youthful appearance. To that extent, the individual in Figure 2 appears to be younger than the individual in Figure 1, and perhaps younger than 57-years-old.

Countenance of the Face

Duriora genti corpora, stricti artus, minax vultus et major animi vigor. (Hardy frames, close-knit limbs, fierce countenances, and a peculiarly vigorous courage, mark the tribe.) In addition the changes in the face that come with aging, one’s work can be manifested in the countenance, too! As explained in greatcharlie’s June 30, 2021 post, the primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide to protect China’s citizens, secrets and technology from foreign spies. Counterintelligence may very well be the greatest manifestation of the paranoia business, but it, as all other elements of the intelligence industry, requires wisdom, reason, and logic to be performed well. If progress through interviews or interrogations of the subject of an investigation indicates that an investigator is on the right track, there will be an attempt to find another door inside to open and pass through in order to get deeper on matters. Such technique is honed and polished over the years. 

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, speaks to this point in The Secret Pilgrim (Alfred L. Knopf, 1990) when his main character, George Smiley a senior and well experienced intelligence officer for The Circus–MI6 in nearly every respect, tells a group of probationary intelligence officers in the fictional foreign IntellIgence training school in Sarratt that he was the one who debriefed his arch rival from Moscow Center, the headquarters of foreign intelligence service of the Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB.  He was known only by the name, Karla, and was captured in Delhi after escaping the US. Explaining to the trainees in general about the nature of interrogations, Smiley says at times they are “communions between damaged souls.” However, when MSS managers have determined the situation demands rough treatment, imaginably compelled by some exigent circumstance, and when the decision will align with the thinking and plans of the Communist Party of China leadership, surely coercive measures will be employed to include forms of torture. That work surely takes its toll, often manifesting its pull on the countenance of those who have engaged in it. The aphorism is quite appropriate here: “L’habit ne fait pas le moine.” Still, perception might lead the reasonable to choose the individual in the photograph of Figure 1 to someone more apparently carrying such a burden based on appearance, and perhaps a bit of intuition. Ut imago est animi voltus sic indices oculi. (The face is a picture of the mind as the eyes are its interpreter.)

An image of Dong Jingwei matching that from the June 16, 2021 Twitter photograph (above). If these popular photographs of Dong in Figures 1 and 2 presented here are actually of two different men so be it. This practice may turn out to be of greater use by China’s intelligence services than anyone outside of the country might have imagined. However, there remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case then in the possible effort to conceal his identity, Dong has done the thing completely.

Concealing an Intelligence Chief’s Identity: Not an Uncommon Practice

The idea of a director, senior executive, or key operations manager of an intelligence service taking steps to conceal his or her identity would not be unique in the annals of secret intelligence. Turning to a handful of examples, in greatcharlie’s November 13, 2019 post entitled, “Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997),” it was explained that Markus Wolf, chief of the foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA of the erstwhile Deutsch Demokratische Republik (German Democratic Republic) or GDR, lived a life in relative obscurity, brilliantly concealing his presence and the footprint of his organization as both operated against the West. His memoir’s title, Man without a Face, was a direct reference to the fact that at one point, Western intelligence services only had a blurred photograph of Wolf while he attended the Nuremberg Trials from which elements within the CIA managed to identify him in 1959. Unable to collect an up-to-date photograph from which to identify Wolf afterward, for a long-time he was referred to among Western intelligence services as the “man without a face.” As the story goes, only after a GDR defector, Werner Stiller, identified Wolf in a photograph in 1979 for the counterintelligence element of West Germany’s Bundesamt für Verfassungsschutz (Office for the Protection of the Constitution) or BfV did that change. The photograph of Wolf was captured by Säpo, Sweden’s National Security Service, during a visit he made with his wife to Stockholm in 1978.

At the time Stephen Dorril wrote his authoritative book, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000), Richard Dearlove, then head of the United Kingdom’s Secret Intelligence Service–colloquially known as M16–was virtually unknown. A contemporary photograph was not published in the newsmedia. According to a BBC report, when Stella Rimington in 1992 was named the first female chief of the United Kingdom’s Security Service–known colloquially as MI5–her neighbors finally discovered what she did. Even her children learned of true occupation for the first time. No official photographs accompanied her name at that time. However, later, official photos of her were provided after photographers managed to take what was described as “a very blurry picture of her out shopping.”

Sidelights

If these popular photographs allegedly of Dong in Figures 1 and 2 here are actually of two different men so be it. It may turn out that using decoys may be a practice in greater use by China’s intelligence services than anyone outside of the country might have imagined. Perchance as a result of the Dong defection matter, it has been brought to light to the world all at once. The sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. 

There remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case, then in the possible effort to conceal his identity, Dong has done the thing completely. The two photographs focused upon here will continue to be published perhaps until another plausible image, or perchance another two or more, of Dong surface at some time and via some source of Beijing’s choosing.

A quote from Arthur Conan Doyle cited in greatcharlie’s June 30th post on Dong’s rumored defection might be worth repeating here. In “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in Doyle’s The Adventures of Sherlock Holmes published in the Strand Magazine (1891), his main character, Holmes, states: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

The Way Forward

Omne ignotum pro magnifico. (Everything unknown seems magnificent.) Without pretension, greatcharlie states that it does not have any information that would allow it to judge which photograph holds Dong’s true image. As promised, greatcharlie has only sought to parse out a few possibilities here. What is presented are simply perceptions based on observations made of less than a handful of photographs. Certainly in China, there are more than a few people in the MSS, MPS, the State Council, and the Communist Party of China who know exactly what Dong looks like and which of the two photographs, if either, depicts him. It may very well be that the causality for the use of mixed images of Dong is based on an effort to increase security. However, just as greatcharlie, a nonpracticioner, “amateur sleuthhound”–as one reader sardonically  referred to the editor–has examined two reported images of Dong in photographs, Expert, professional analysts in US and other allied intelligence services have doubtlessly examined all of the photographs out there that purportedly include Dong using AI and other advanced technologies, and have reached to their own conclusions. Thus, despite any possible efforts to conceal Dong’s identity, they likely have a fair idea of how Dong looks, too!

As greatcharlie has noted in previous posts, in our ordered universe, it is expected that everything will follow its design. Order in the human mind is established by patterns that one can decipher. With the smattering of facts, evidence, and insights available, one can still postulate, and see if a theory formulated on what the whole Dong episode was all about can be confirmed by facts through investigation. It may not always be a tidy process. Wary of the moves Chinese intelligence can make, some might contend the matter of the varied images of Dong may actually be part of some recherché plan to create greater mystery around his identity. Imaginably, it would be viewed as a subplot hanging from a greater MSS disinformation plot to foster a bizarre defection rumor. On the other hand, some might go as far as to assert a more fanciful theory such as the leadership of MSS, in an effort to impress Communist Party of China leaders ahead of, and during, the Centennial of the Communist Party of China the decided to provide a modest demonstration of the organization’s capabilities. Thus,, MSS may have decided to have a little fun with US counterintelligence services by “just messing with them” as the saying goes, making certain that Party’s leaders were in on the joke. The whole matter has certainly had quite a meretricious effect worldwide. Of course, such a move would hardly be a schema, and perhaps the last thing one should expect from MSS. Still, though it may be improbable, it is all the same conceivable. One can be assured that similar overimaginative assessments, judgments concerning the Dong defection episode will continue to be made and published primarily online. Their creation will be driven by the fact that for inquiring minds, the curious, the enthusiasts demand more answers on the matter. In Areopagitica (1644), the great 17th century English poet and intellectual, John Milton, explains: “Where there is much desire to learn, there of necessity will be much arguing, much writing, for opinion in good men is but knowledge in the making.”

The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax

People’s Republic of China Vice Minister of State Security Dong Jingwei (above). Beginning in February 2021, Dong became the subject of a rumor alleging that he, along with his daughter, defected to the US. The possible implications of his supposed defection were staggering. It was eventually revealed and proved that the rumor was pure fiction.  Never before has Dong’s name, or any other Chinese counterintelligence official’s name, been bandied about in the US newsmedia or worldwide in the manner it has been lately. An attempt is made by greatcharlie to some degree how this all came about and what was the purpose of it all.

Rumors of the alleged defection of Dong Jingwei, a vice minister of the People’s Republic of China Ministry of State Security–China’s relative equivalent to the Central Intelligence Agency, were the subject of intense discussion in the US newsmedia and social media particularly in June 2021. Allegedly, Dong fled China in February 2021 and handed himself over to US intelligence officials. Dong would have been one of the highest-ranking officers from China’s Intelligence Community, and the Chinese government in general ever to defect to the US. Yet, alas, the rumored defection never occurred.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, is now highly selective, positively picky, about those who serve in national security positions in his government. Considering what would be the most likely nature of the man or woman who would be able to serve as his Vice Minister at MSS for counterintelligence, it is hard to form a mental picture of where the rumor that Dong had defected to the US with his daughter, or who, or better, what organization, may have actually given it wings. It is harder to understand how those who ignited the rumor of Dong’s defection intended to benefit from its formulation and promotion. It is hardest to envision who among those with any knowledge of the Chinese government and the national security apparatus would believe, would ever consider defecting to the US no matter what the circumstances may be within the Communist Party of China or in his personal life. One could imagine Dong would be a deadender, sticking with the Party and his country until the rattle. There is always the possibility–though there are absolutely zero newsmedia reports anywhere that suggested some proceeding mental health episode had befallen him–that Dong may have been overwhelmed by some cacoethes. Barring that, there was no earthly reason to believe that he would defect, and to the US nonetheless. The puzzle now having been “resolved”–the whole truth is out there somewhere, greatcharlie gives a go at parsing out some of these issues hoping it does not come off as l’esprit de l’escalier. In that process, greatcharlie, albeit, steps out on shaky ground to present some unsolicited–and hopefully not unwanted–suggestions on how similar false reports in the future might be given appropriate consideration. Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.)

Some might conclude after noting the topic of this post that this is one more by greatcharlie on Chinese espionage in the US. Some, perhaps duly, might also grumble to the effect: “Now greatcharlie is all China, all the time!” While greatcharlie approaches the defection that did not happen out of academic interest, this examination, much as those of proceeding posts, is part of an ongoing effort by greatcharlie to give consideration of what it could offer to contribute to development more effective approaches to such hostile intelligence collection efforts against the US. Indeed, with the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. Readers will likely discern facts are interpreted from that perspective. However, no information is skewed or bent with preconceived ideas or bias.

Who Is Dong Jingwei?

Dong was born on November 18, 1963. At the time of this writing, he is presently 57 years old. In China it would be of some significance to note that he is of Han nationality. As for his studies, he has earned a master of science degree. The only publicly reported member of Dong’s family is his daughter, Yang–also known as Dong HuaHua on social media, who as part of the defection hoax was said to have allegedly fled China with him. She is the ex-wife of Alibaba executive Jiang Fan, who now heads the company’s powerful e-commerce platforms, Tmall and Taobao. 

Dong is a member of the Communist Party of China. Highlights of his career include service as the Secretary of the Party Committee and Director of the State Security Department of Hebei Province from 2006 to 2017. He served as Director of the Pokitical Department of the Ministry of State Security from 2017 to 2018. He eventually became a Member of the Party Committee and Vice Minister of the Ministry of State Security and the Chief of MSS Counterintelligence. It was noted in the July 24, 2015 edition of Intelligence Online that Dong’s heading of the State Security Department in Guo’anbu in the Hebei Province was significant for him as that province has reportedly produced many of Xi’s “securocrats.” Loyalty to superiors, reliability, and regional background apparently put him in good standing with senior party officials under Xi. By 2015, Dong reportedly became part of the “Xi Jinping Clique”, one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles and accolades provided to Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS, where Dong is vice minister, is an intelligence service responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems mainly from providing consumers in Beijing to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, and ministers and senior executives of appropriate ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions.

As noted in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” the primary targets of the MSS hands down are its chief competitor, the US, the Russian Federation, Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes. In the countries of Eastern Europe, China has achieved some prominence in their space. China must equally measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. Taiwan, which Beijing declares is part of China, is a special case and a very important MSS target. The second rung of competitors would include India, Pakistan, Nepal, and Mongolia. India has doubtlessly garnered a bit more attention from MSS due to its ongoing border struggle with China. MSS has stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

In defining counterintelligence, James Olson, the former chief of Counterintelligence for the Central Intelligence Agency and author of To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), which greatcharlie reviewed for its January 2021 post, states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” The primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide. MSS shares the counterintelligence role with Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS. MPS is an intelligence service under the State Council in charge of the country’s internal and political security and domestic intelligence.

The achievements of MSS in the US have certainly been no mean feat, and should not be underestimated. As discussed in the February 26, 2021 greatcharlie post entitled,”Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts,” the tide of essentially unchallenged Chinese espionage has lapped up so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among possible dissenters, an interest, not solely due to exigency, will grow on the idea. Chinese intelligence services have hampered the work of US businesses, research and development firms, high-tech firms, academia, and the federal government itself. They have created spy networks within institutions critical to US economic security and defense. They have attempted to inconvenience the US in its efforts to improve bilateral and multilateral relations in under-developed, less industrialized countries and even long time friends of the in certain regions, and multilateral institutions that the US actually had a hand in creating. One might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them.

Dong (above)  once headed the State Security Department in Hebei, a province which has reportedly produced many of Xi’s securocrats.” Loyalty to superiors, age and regional background apparently won him favor with senior party officials under Xi. He then became part of the “Xi Jinping Clique,” one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles held by Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. It stands to reason that in order to be a successful vice minister for MSS counterintelligence. Dong must be a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

In attempting to ascribe certain traits to Dong given his role at MSS, those considered by greatcharlie may appear to be mere abstractions. However, the few traits listed here along with a reliable intuition and challenging experiences within his own intelligence organization may very well have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions within adversarial intelligence services. These same traits perhaps have also assisted Dong in successfully navigating the top rung of China’s national security apparatus and to perform well at the side of leaders of the Communist Party of China.

One might first postulate that Dong possesses the traits of clarity, purpose, and focus. Surely, Dong puts his intentions forward for the best outcome possible. Clarity would allow Dong to concentrate with intention on what is ahead, on what needs to be done. One might expect that Dong believes by now that serving in MSS, performing executive duties for counterintelligence is his purpose. To that extent, purpose was likely revealed to Dong when he discovered the ability to use intuition to understand what may not be clear to others. He would be able to focus on what truly matters, and understand what needs to be avoided, such as anything that might frustrate, seriously inconvenience, hamper, or inevitably destroy his organization’s efforts

Dong is an intelligence officer and political leader of great energy, enthusiasm, and creativity. That energy is transmitted through the MSS. In the US, it would be transmitted not only to officers in the field but to errant citizens and Chinese émigrés recruited to serve the purposes of the intelligence service. He would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. He would be able to find unlocked potential in situations and determine ways to uncover what may be hidden away

What Was Reported on Dong’s Alleged Defection

Relate retero. (I tell what I have been told.) Some simple falsehoods went some way to explain and support what was from the outset a questionable story. From what can be gathered about the episode, stories about Dong’s alleged defection initially emanated from conservative websites in the US. Newsweek points decidedly to a June 4, 2021 report from the conservative political commentary website, RedState, as a source of the rumor. Discussion within conservative circles reportedly became even more intense as days passed. There was considerable discourse on Dong’s defection found in Chinese-language, anti-Communist newsmedia outlets in the US and on Twitter.

Among those who reported on the defection, there was general acceptance of the sequence of events. The defection scheme as laid out was indeed mad-capped. Dong allegedly defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. Dong supposedly provided the US government with information about the Wuhan Institute of Virology that allegedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. According to Han Lianchao, a former People’s Republic of China Ministry of Foreign Affairs official who defected in the wake of the Tiananmen Square massacre, Dong’s defection was raised by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi at the US-China Summit in Anchorage, Alaska in March 2021. On June 16, 2021, Han, citing an anonymous source, alleged that in Anchorage, Yang and Wang demanded that the US return Dong to China, but US Secretary of State Anthony Blinken refused. Subsequent reports, coupled with analyses by China specialists continued as Dong’s precise whereabouts remained unknown. Speculation had even reached Chinese social media threads after Dong had not been seen or photographed for several weeks.

While preparing a story on the alleged defection, SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations, had sought comment from the State Department last week, however, it did not respond. In the first public clarification put out by the US government on the affair, a US official, speaking anonymously, “reached out” to say reports of Dong’s defection were not true. With regard to Dong’s whereabouts, he stated “We can’t confirm or deny where he is exactly,” but hinted he remained in China. The official refused to go any further. When SpyTalk asked why the Biden-Harris administration sought to knock down rumors of such a high level defection, an ultra-sensitive issue, the official reportedly stated, “that’s more of a policy question”and referred SpyTalk to the White House. Reportedly, the National Security Council did not respond to SpyTalk’s request for comment.

Notably, Newsweek reported on June 22, 2021 it was informed by a US government official that the reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Yet, such reporting still did not cause those insisting on the defection to retreat back, away from the issue. It is always a capital mistake to reach conclusions before having all of the facts on a point at issue.

The Chinese government, itself, delayed publicly addressing the stories about his alleged defection. Then on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite rumors that he had defected to the US four months ago. According to minutes released by the Communist Party’s Central Political and Legal Affairs Commission, Dong was among five Chinese officials who attended the 16th meeting of the Security Council Secretaries of the Shanghai Cooperation Organization (SCO) Member States on June 23, 2021 Reports of the meeting were also shared on Weibo, China’s largest social media service.

Sources of the Hoax: Views on That in the Newsmedia

The Daily Beast quoted Robert Manning, a former top Asia specialist in both Republican and and Democratic administrations for more than 30 years as saying the decision of the Biden-Harris administration’s willingness to address such a normally highly secretive issue was “to excise an unnecessary additional irritant in the still downward-spiraling bilateral relationship” between the US and China. The Daily Beast also reported another possible motive was to beat back a Republican campaign to deflect blame for the COVID-19 pandemic in the US from the erstwhile administration of US President Donald Trump to China’s Wuhan Virology Lab and, by extension, Anthony Fauci, director of the National Institute of Allergy and Infectious Diseases, who has been critical of the former president’s response to the disease. In the same vein that the motivation may be domestic politics, the Daily Beast reported that a leading China watcher suggested the objective was to head off Republican accusations that the Biden-Harris administration was “hiding a defector who has info on the lab leak or [other] embarrassing stuff.” Essentially amplifying what was aforementioned here, the Daily Beast explained reports of Dong’s defection originated in conservative circles here and abroad that have been critical of the scientific consensus that the COVID-19 pandemic was transmitted from animals in Wuhan’s “wet market.”

On June 4, former Fox News reporter Adam Housley tweeted that “US intelligence has a Chinese defector with Wuhan info. and China is trying to produce variants that suggest it came from bats to cover up that coronavirus originally came from a lab.” Housley’s report was referenced by RedState, which alleged that “a person believed to be among the highest-ranking defectors ever to the United States from the People’s Republic of China has been working with the Defense Intelligence Agency (DIA) for months.” Citing anonymous sources “inside the intelligence community,” The Daily Beast further reported that Red State cautiously claimed “the defector has direct knowledge of special weapons programs in China, including bioweapons programs,” and that the alleged information had created “a sudden crisis of confidence in Dr. Anthony Fauci.”

In a June 24, 2021 Washington Times story, it was suggested by a former National Security Agency counterspy that the defection rumors were “part of a Chinese disinformation effort to distract attention from growing international concern over reports the coronavirus pandemic may have originated in a Wuhan laboratory.” If that intriguing possibility is true, it would seem that the other shoe dropped when Dong was seen at a meeting with the head of MPS later in the month. It might be said the some in the US newsmedia are so expectant and desirous of good news for the US on the Chinese espionage front, that some outlets were even ready to jump at a contrived one. he US Intelligence Community did not flinch in response to the defection reports at any point until,  as aforementioned, one US official spoke “just looking to correct the record.” 

Other Suggestions

One can only imagine–if he was actually unaware that the fiction of his defection, would be laid on so thick in the newsmedia worldwide–what Dong’s immediate reaction was when he received news that he was the subject of a farce that put his loyalty and honor in question. Dong was imaginably a little put out. It may have also caused him some embarrassment, some loss of honor. While the truth of Dong’s loyalty to the Communist Party of China and his country would eventually be made very clear, he would surely recognize that once his name was associated with he would indubitably feel was a damnable rumor, that taint would still stick, even if only to some small degree, long afterward. 

 Perchance that the defection rumor was contrived by MSS, then it would be accepted honorably as an unavoidable sacrifice he had to make with the aim of protecting China. Perhaps some monitoring should be done to see if somewhere along the line in the near future, there is some sudden mention of Dong awarded some high honor for his “service” from the Communist Party of China. Perhaps he would receive the award from Xi, himself. That may very well signal, and could help support the idea, that the defection story was indeed part of some nefarious MSS scheme.

Quis custodiet ipsos custodes. (Who watches the watchmen.) Dong has unlikely gotten lost in any hurt. Yet, one might speculate that perhaps somewhere, someone believes Dong pretends to have an inner strength, nerve, that he actually lacks. Though the true source remains publicly unknown, so far to greatcharlie’s knowledge, no one has been denounced at least publicly in China for having responsibility for igniting the rumor against Dong. One could hypothesize that if the source of the rumor was actually in China, it may have been the case that Dong recognized attempting to establish blame among any rivals for the episode would only be corrosive, and trying to reconcile with some sense his own guilt for leaving himself open to the of such a rumor would be self-defeating. In such a hypothetical case, an expression of such acrimony within days of the celebrations of the Centennial of the Communist Party of China taking place in Beijing on July 1, 2021, would unlikely be of any benefit to Dong politically, professionally, or personally. To that extent, in the eyes of Communist Party of China leaders, he likely would do himself much honor by deciding to hold his tongue at this time, if he even needed or desired to speak out at all.

Arthur Conan Doyle in “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in The Adventures of Sherlock Holmes published in the Strand Magazine (1891) had his main character, the damnably good detective Holmes, state the following which is apposite here: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

Xi Jinping’s Counterintelligence Concerns

Xi has placed considerable focus on police, judges, prosecutors, public security, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. Xi has ordered China’s security forces to be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. In his address at the ceremony, Xi lauded the major contributions made by the Chinese police to safeguarding national security, social stability and people’s interests, He called them a mighty force that can be fully trusted by the Party and the people, and spoke highly of the major contributions made by the Chinese security forces to safeguarding national security, social stability and people’s interests. Xi also called upon the security forces to uphold the Party’s absolute leadership.

People’s Republic of China President Xi Jinping (above) has placed considerable focus on police, judges, prosecutors, public security, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. Xi has ordered China’s security forces to be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. Clearly, Dong has been mindful of Xi’s concept and intent and obedient to the new counter-espionage regulation that came into effect in April 2021.

Would Beijing Call It a US Counterintelligence Plot?

As discussed already here by greatcharlie and in previous posts, little progress has been made in halting it or even making a discernible dent in Chinese intelligence operations. Many minds in the US national security bureaucracies are certainly working fiercely on this matter of utmost importance, but it seems too few facts have been collected for them to run on to break new ground or produce anything worthwhile. Trails of espionage may lead to the MSS and PLA, directly in many instances, but those who commit the devilry of spying on Beijing’s behalf, in the US and from China, are seldom caught. With estimates as high as 25,000 Chinese intelligence officers, operatives, and informants on the loose in the US, it is difficult even the most partisan US observers such as greatcharlie to deny China has secured a massive advantage for itself. Publicly, there appears to be not much of anything comparable achieved to knock back Chinese espionage.

Dong’s team and counterintelligence executives and managers of the other Chinese intelligence services surely study the tactics, techniques, procedures, and methods of US foreign intelligence and counterintelligence services. They would seek to better understand and prepare for expectant future attempts to covertly insinuate operatives into the Chinese foreign and national security apparatus, including particularly both the clandestine posts and covert networks of civilian and military Chinese intelligence services and Communist Party of China organs operating overseas.

Dong and his counterintelligence managers at MSS doubtlessly understand the situation the US Intelligence Community has faced, scoring few victories and suffering many defeats in the intelligence struggle with China, and they very likely recognize that US foreign intelligence and services are anxious to turn the situation around and get some things going. They have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. 

To that extent, one might imagine it could plausibly be claimed within MSS headquarters that whole episode was a US counterintelligence artifice, designed to twinkle out Chinese intelligence service officers and operatives based on the their reactions by some the following: movements–attempt to leave US; communications–sending communiques by codes and encryption to provincial departments and municipal bureaus to confirm rumors and see instructions on next actions; contacts–reaching out to network managers in distress or panic; and, email, text, call, and meet other intelligence officers to parse out situation as reported. Alternatively, also with a counterintelligence purpose, the US could be said to have attempted to smoke out prospective defectors among those officers and operatives, attempting to convince them that some “tower moment” for Chinese intelligence service operations in US had occurred and the moment had arrived to choose to remain part of Communist Chinese system or seek refuge in the US. 

Dong and his manager further parsing out the matter might have speculated that beginning in February 2021, he may have been out of pocket for an extended period or on medical leave for some illness. Such speculation could go further to suggest the US Intelligence Community became aware of the situation, which would have been a chilling prospect in itself for MSS counterintelligence, and sought to capitalize on it 

What might cause Dong and his managers some discomfort even though the whole defection story was revealed as a hoax, and if it was the actual source of the hoax, is that for a while at least there appeared to be good news about success against China. Even if proven false, it would be good to have such positive news reach the ears of the US public, and Beijing would not want that. Further, even though the truth is out, the belief may exist among many in the US public that the “super secret” US Intelligence Community may have truly scored the specified success, and now, for reasons unknown, want to conceal it. Among conspiracy theorists in the US, the imagination may have also been given fuel to run wild and the whole matter of the defection will linger for a while. Chinese intelligence services would likely hope that some sense of discouragement might reach into the psyche of the US public over how Chinese espionage in their country appears unstoppable, even though it may be an issue somewhat outside of the average citizen’s day-to-day concerns.

As for the Communist Party of China, propaganda elements might eventually seek to use the whole circumstance to an advantage against the US. The goal would be to embarrass the US by making it appear as if the US Intelligence Community conjured up a story of defection because that has had no real successes at all against China. What would then perhaps be called “the big US lie” or something to that effect would doubtlessly be denigrated by Beijing through declaring it as being too contrived, unsubtle, poorly executed, and further evidence of how little the US Intelligence Community knows about the Chinese intelligence services. Then again, there may just be silence from Beijing.

A Novel MSS Counterintelligence Tactic to Smoke Out “Disloyalty in the Ranks?”

It would appear Dong may have actually been expecting to face something out of the ordinary from US and other foreign counterintelligence services much as discussed here, and it factored into MSS calculations on operations against the US. According to a story in the June 18, 2021 edition of the South China Morning Post, a report on a seminar on a counter-espionage regulation that came into effect in April 2021 was posted on Changanjian, the social media account operated by China’s top law enforcement agency, the Central Political and Legal Affairs Commission of the Communist Party of China. At the seminar, Dong urged the country’s intelligence officers to step up their efforts to hunt down foreign agents and insiders who collude with “anti-China” forces. A read-out from the seminar quoted Dong as explaining: “The promulgation of such regulations provides us, the principal agents responsible for counter-espionage work, with the legal means to prevent, stop and combat criminal activities that would jeopardize our national security.” Dong went on to state: “This will reinforce our responsibility in counter-espionage work, and enable us to do a better job in organising and mobilising all social forces in waging ‘people’s warfare’ against espionage activities.”

In addition to Dong’s expressions on catching foreign spies, the actual report as posted stated that the intelligence officers must also go after “insiders” and “people who bankroll their activities behind the scene.” On that point, the report additionally noted: “At present, infiltration and spying activities by foreign intelligence agencies and hostile forces have increased significantly.” It went on to say, “In particular, there are individuals who have willingly become ‘insiders’ colluding with foreign intelligence agencies and hostile forces and engaging in anti-China activities.” The South China Morning Post story lastly noted the insistence in the report that “All state security agencies must stand firm … deepen and carry out our various counter-espionage work to safeguard our national security.”

Given what was stated by Dong at the June 18th seminar on the counter-espionage regulation that came into effect in April and the report on the event, it may be grotesquely improbable, yet all the same conceivable, that the defection hoax was actually an MSS loyalty test on a grand scale to as was suggested, to step up their efforts to hunt down foreign agents and insiders who collude with “anti-China” forces.

Attempting to look at thinking in MSS from the outside, trying to put moments and trifles from recent events in order and give them a deeper meaning, greatcharlie hypothesizes that Dong and his counterintelligence managers at MSS could not be certain of how the US Intelligence Community, and other foreign intelligence services for that matter, might apply pressure to its officers and operatives. For them, that is always the pinch. To do something more than just study the matter, they may have created a scenario that would likely shock MSS personnel in the field: the defection of the MSS Vice Minister, for counterintelligence nonetheless. That might explain why Dong’s good name was thrown into the mix of something so repugnant. Dong and his managers could test what may have been a working theory on the likely causality of some occurrence, in this case it would have been collusion with anti-China forces, and see if it could be confirmed by facts through investigation. Indeed, Dong and his managers would have wanted to see for themselves how officers and operatives in the field would respond to a very deceptive approach that perchance in their minds could have plausibly been attempted by US counterintelligence.

Many of the MSS foreign intelligence networks and operations in the US, and elsewhere overseas, are run by MSS Provincial departments and municipal bureaus. It would most likely be the case that foreign intelligence and counterintelligence managers of those departments and bureaus would have understood that there would be no reason to leave their locations or try to leave the US in the case of such a defection. It would stand to reason that their identities as spies would likely remain unknown for the time being and everything would be handled by Beijing to prevent their capture and keep them safe. That would likely be instilled in training and before deployments. Expectedly, as a result of training, loyalty and dedication, equanimity and sangfroid would be displayed by officers and operatives. However, through experience one might postulate Dong could have felt that there are patterns one can discern that establish order in the human mind. An unexpected blow to the MSS leadership as a defection of its chief of counterintelligence, which they depended upon for their very lives, might surprisingly elicit inordinate behavior among trained officers and operatives.

Dong might have conceptualized further that if one of his officers or operatives had even considered going over “to the other side” or perhaps might have already been in “friendly contact” with so-called “anti-China” force, the former might fear of being uncovered by an alleged defecting chief of MSS counterintelligence might impel them to act, the latter might want to use the situation to capitalize on the connection already made and go to the other side. (After reading what is presented here, perhaps some may accuse greatcharlie of having too much imagination, others may say, too little.)

A Thought about Future Defections by Foreign Intelligence to the US

As expressed in previous posts by greatcharlie, how the US handles every defection will surely shape decisions by officials to defect in the future.What US counterintelligence services do with defector would certainly have value for MSS to the extent that it could be used to discourage, plant in minds of officers and operatives that turning to the US would not be a wise choice. What prospective defectors might gather from the whole Dong business is that his or her defection could easily become a very public matter, very quickly in the US and eventually worldwide. It could be imagined by them that facts concerning who or what, when, where, how, and why would somehow be leaked to the news media. Rather than a serious concern, their defection might be presented and looked upon at least among some in the US as a banal amusement. Bookmakers in Las Vegas may very well have been taking bets on the outcome of it all: “Did he or did he not defect?, and “Will he stay in the US or be returned to China for one of our spies?” Regardless of the rank or position a prospective defector might be, he or she would hardly get the impression that the way Dong’s name was tossed about was nothing to signify, but rather unseemly. They would perhaps recognize that they would have little cause to expect any better treatment for themselves. None of this should be looked upon as exaggeration or fanciful if the Dong episode might be considered at all instructive. Using the backdrop of this episode as a gauge, one can only imagine what would go through the mind of an intelligence officer of adversarial country, wanting to defect when thinking about the treatment and well-being of his or her family members and himself or herself, how seriously their situation would be taken by the US, and what would be their final disposition. That may not portend well for the US Intelligence Community or prospective defectors. Hopefully, that will not be the case.

The Way Forward

Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.) Despite pronouncements of Communist precepts that are designed to allow the society to evolve socially, economically, and politically, declarations to maintain an orderly society though a system of justice demanding obedience and assurances from the Communist Party of China on the smooth running of the state and conduct of government affairs aimed at supporting a high quality of life for the people, visible and publicly released reports of scientific achievements in the medical field to high-tech, greater endeavor in the vast ocean and into space, and the notices of accomplishments externally on foreign affairs and guaranteed that the country cannot be threatened, bullied, or taken advantage of ever again, China is nonetheless a nontransparent society. What one knows about China is what Beijing says is true. Independent observations that defy its realities are anathema in Beijing, and can be responded to harshly. There is plenty of secrecy. The frugal release of information on the Wuhan virus is the latest best example of that. Beijing, without fail, will double down further in secrecy when it comes to national security. Yet, to discerning eyes, what the world observes China doing also speaks volumes about what is highly likely being decided behind the scene. That was especially true in this case when ostensibly a man viewed widely in the Communist Party of China as one of the country’s most loyal and dedicated servants, was accused of what could be called the unthinkable. 

While Dong’s name has never been bandied about in the US newsmedia or worldwide in any way close to the manner it has been in just days before thus writing. For those somewhat familiar with such matters, greatcharlie’s editor, himself, being simply an enthusiast and nonpracticioner, well-separate from the intelligence world, the notion that that he of all people in Chinese intelligence would defect would be a bombshell neatly as big if Alexander Bortnikov of the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB, was said to have defected instead. That is simply unimaginable. 

Revenons à nos moutons. The hope of US counterintelligence should be “simply” to come into positive contact with an officer, operative, or informant with an albeit some leaning toward an idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. 

Given the peculiarities of the world of intelligence, this analysis should not be considered too extravagant. The desire of greatcharlie is that nothing in this post would be deemed too fanciful by readers and a bit of their curiosity on the topic at hand would be satisfied. Admittedly, it would be doubly satisfying to know what is presented here might  resonate with a few in US counterintelligence services grappling with the Chinese espionage conundrum. However, if greatcharlie has not achieved the latter, the 18th century French Enlightenment writer, historian, and philosopher, François-Marie Arouet, known by his nom de plume Voltaire, sums up its sentiment in Poème sur la Loi naturelle (1756), Quatrième partie: Je n’en dirai pas plus sur ces points délicats. / Le ciel ne m’a point fait pour régir les États, / Pour conseiller les rois, pour enseigner les sages.” (I will not say more on these delicate points./ heaven made me not to govern states, / To counsel kings, to teach wise men. Spero melior. (I hope for better things.)

Book Review: Bill Gertz, Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (Encounter Books, 2019)

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping in People’s Liberation Army uniform (above). Successive US administrations, both Democrat and Republican, stuck to a belief that by maintaining good relations with China and conducting trade and other business with it, the Communist regime in Beijing would eventually evolve into a free market, democratic system. However, it is clear now that China has reverted to its Maoist Communist roots. Instead of becoming more moderate and more democratic, China has become a more repressive dictatorship domestically. Internationally, instead of becoming more integrated, China has emerged as a dangerous threat to peace and security as it seeks to become the world’s dominant power. How this all came about and what the US can expect from all of this is elaborated upon in Deceiving the Sky: Inside China’s Drive for Global Supremacy.

In Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (Encounter Books, 2019), Bill Gertz, the author, directs a flood light on China’s practices that are designed to undermine the US economy, weaken and ultimately defeat the US military, and diminish the global influence of the US. An emphasis of Gertz’s discussion is how US leaders have repeatedly failed to understand the preparations in which Beijing is engaged to ready China for a confrontation with the US in the near future. Gertz also asserts the US leaders have also habitually failed to take appropriate steps to deter and act appropriately in response to Beijing’s threatening moves. An example of how destructive and impactful such delinquencies have been is the US response following Beijing’s use of the People’s Liberation Army (PLA) to crush the democratic aspirations of thousands of Chinese in Tiananmen Square in June 1989. China was sanctioned. However, Gertz says that far more consideration should have been given to how China would and actually did react to sanctions. Gertz says what China actually did was launch an unbridled campaign over the next three decades to steal and otherwise acquire some of the most valuable technology from the US. The theft has been staggering, estimated to be as much as $600 billion annually in stolen technology and intellectual property. However, in successive US administrations, both Democrat and Republican, there was a wilful blindness toward what was occurring. They stuck to a belief that by maintaining good relations with China and conducting trade and other business with it, the Communist regime in Beijing would eventually evolve into a free market, democratic system. 

Gertz says the outcome of this decades long policy failure by the US has been the emergence of an expansionist, hard line Communist regime headed by a supreme leader, who took power in 2012, with unchecked powers matched only by Mao: People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping. Gertz asserts that Xi has ruled with an iron fist. China has reverted to its Maoist Communist roots. Instead of becoming more moderate and more democratic, China has become a more repressive dictatorship domestically. Fundamental freedoms rights and prosperity for the Chinese people have essentially been eliminated.Internationally, instead of becoming more integrated, China has emerged as an ever more dangerous threat to peace in security as it seeks to become the world’s dominant power. Communist ideology is the centerpiece for that Chinese drive for dominance. How this all came about and what the US can expect from it all is elaborated upon in Deceiving the Sky: Inside China’s Drive for Global Supremacy.

The attention of greatcharlie was drawn to Deceiving the Sky at first upon recognizing the title’s reference to “The Thirty-Six Chinese Strategies.” The Thirty-Six Chinese Strategies or Stratagems are a collection of tactics that can be applied to very different situations. The strategies are derived from military tactics applied during the Warring States Period (403-221 B.C.) or during the Three Kingdom Period (220-265 B.C.). Comparisons are naturally made to other Chinese military texts such as Sun Zu’s Art of War focus on military organization, leadership, and battlefield tactics, the Thirty-Six Strategies, is a unique collection of ancient Chinese proverbs, more apt for the fields of politics, diplomacy, and espionage. The origins of this book are unknown. No author or compiler has ever been mentioned, and no date as to when it may have been written has been ascertained. Deceiving the Sky is the first stratagem of the thirty-six.

Gertz explains in the text that the title Deceiving the Sky comes from an ancient Chinese strategy used by generals to win battles called deceive the Sky to cross the ocean. As the story goes, an Emperor was hesitant to launch a military campaign against neighboring Koguryo, now Korea. In reaction, one of his generals convinced the Emperor to go to dinner at the home of a wealthy peasant. As the Emperor entered the house for a meal, the residence moved. The emperor had been tricked onto a boat ended for battle across the sea. Rather than disembark, he ordered the military campaign to advance, and the battle was won. What is derived from this story is that a leader’s determination to win a war should be so unrelenting that even an Emperor, viewed in Chinese culture as the son of heaven or the Sky, can be deceived. Translated into military precepts, deceiving the sky suggests that a commander: 1) Openly act as if intending to do one thing then do something else; 2) Create false alarms until the opponent no longer takes notice of alarms; 3) Lull the opponent into a sense of false security by appearing innocuous. Then when the opponent ignores you, one can attack at will; and, 4) One can also do the reverse, acting mysteriously and pretending to know things onees do not. Try different things and watch the opponent’s responses. The opponent will react most strongly to that which creates most concern. (See Stefan Verstappen, The Thirty-Six Strategies of Ancient China (China Books and Periodicals, 1999))

As Gertz discusses how China has acted against the US in recent decades, no doubt is left about how pertinent this ancient yet timeless stratagem is to its approach. According to Gertz, the strategy well-reflects the Marxist maxim that the ends justify the means. Beijing practices strategic deception known in the ancient formula as using false objectives to facilitate true objectives. It is another way of describing the Communist strategy of using all means warfare against the US which is the sole obstacle to China crossing the ocean and achieving the rightful place as the most powerful state in the world. Nemo repeite fuit turpissimus. (No suddenly becomes bad.)

So impressed was greatcharlie with Deceiving the Sky, it has sought to allow its readers to gleen enough about the book in a review that they would choose to well-thumb its pages themselves. What greatcharlie can state in all conscience that if one really does not have much time to dig deep into the crisis of Chinese actions and intentions, Gertz’s breakdown of the whole matter is about as accurate and concise a report on the matter as one is going to get. What is most impressive to greatcharlie about the book is the manner in which it stimulates thought on the grave issues concerning China. As greatcharlie has stated in previous reviews, books that can stir a fire inside the reader, and a passion for a subject, are the most memorable and most enjoyable to sit with. The role of reviewer, an unsolicited intermediary between a book’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a book then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil on a manuscript. It is greatcharlie’s preference to provide reviews of books that readers of blog can enjoy and from which they may edify themselves. Never is harm intended.

Gertz is an award-winning national security journalist and author of eight books, four of which were national bestsellers. He is currently national security correspondent for The Washington Times. On China, he is accepted in both journalistic and foreign and national security policy circles as being an authority. Even more, he is something of a treasury of knowledge on its pursuits versus the US. Confidential sources for years within the US national security bureaucracies have shared what they have reasoned was permissible with Gertz that clarified much about personalities, events, and situations concerning China with all possible precautions concerning national security firmly in mind. Gertz’s considerable standing among federal employees in rather sensitive positions is a reality that the most senior executives in the US government have recognized and have begrudgingly accepted. Gertz has been a guest lecturer at the FBI National Academy in Quantico, Virginia; the Central Intelligence Agency; the National Defense University at Fort McNair, and, the Brookings Institution.

The Author

Gertz is an award-winning national security journalist and author of eight books, four of which were national bestsellers. He is currently national security correspondent for The Washington Times. As a journalist, he recognizes his responsibility to speak truth to power. On the issue of China, he is accepted in both journalistic and foreign and national security policy circles as being an authority. Even more, he is something of a treasury of knowledge on its pursuits versus the US. 

Confidential sources for years within the US national security bureaucracies have shared what they have reasoned was permissible with Gertz that clarified much about personalities, events, and situations concerning China with all possible precautions concerning national security firmly in mind. Gertz’s considerable standing among federal employees in rather sensitive positions is a reality that the most senior executives in the US government have recognized and have begrudgingly accepted. In his biography posted by the Harry Walker Agency, a speaker’s bureau, it is noted that former Central Intelligence Agency (CIA) Director R. James Woolsey stated: “When I was DCI [Director of Central Intelligence] Bill used to drive me crazy because I couldn’t figure out where the leaks were coming from. Now that I’ve been outside for two years, I read him religiously to find out what’s going on.” During the 1990s, Secretary of Energy Bill Richardson told the author: “We talk about your stories at Cabinet meetings.” Defense Secretary William S. Cohen once remarked to China’s military intelligence chief that Bill “has access to more intelligence information than anyone I know.” Former Defense Secretary Donald H. Rumsfeld once told him: “You are drilling holes in the Pentagon and sucking out information.”

Gertz has also been a guest lecturer at the FBI National Academy, the CIA, the National Defense University at Fort McNair, the Brookings Institution, and Hillsdale College. He has participated in the National Security Studies Program at the Johns Hopkins University School of Advanced International Studies and the Syracuse University Maxwell School of Citizenship and Public Affairs.

In Deceiving the Sky, Gertz has provided a most discouraging account of how the US has fared in a “struggle” to claim the perch of the dominant power in the world which China has promoted. At the same time, he answers in an admirable way the questions that US policy makers and decision-makers should be asking. To that extent, he has supplied the US foreign and national security policy bureaucracies with their deficiencies. An earlier work by Gertz, The China Threat: How the People’s Republic Targets America (Regnery, 2000), was prescient in assessing Communist China’s goals and intentions. Deceiving the Sky includes new details of the danger and proves his warning was correct. Gertz warns that if nothing significant and lasting is done, it will only get worse.

Gertz digs into the dark roots of Beijing’s plans. Readers will find that the information Gertz provides will prove to ring true on every issue. He demonstrates that there are clearly greater issues hanging from any issue with China than usually appear at first glance. Surely, presenting a full excavation of China’s actions and intentions was unlikely desired or practical given the larger audience Gertz sought to reach. Perchance if Gertz were to write enough works on the matter he will manage to at least touch upon all of its many aspects. Gertz is not a storyteller. His job is not to entertain, despite what his publishers might desire without the ultimate objective of every publisher which is to sell books. As a journalist, he delivers the news, lays out the facts as they are, and to the extent that he may provide analysis, he edifies and enlightens with his insights. Gertz has the power to intellectually stimulate with his words

The present situation between the US and China is recognized by many scholars, academics, policy analysts, and journalists as being unhealthy. Gertz’s reports on Chinese plans and actions have run concurrently to those of other journalists and scholars writing on the subject and the main features of their stories tally. Indeed, a lengthy list of authors have written fine books on the matter and offer similar perspectives. Concerning those other books, greatcharlie would not dare offer even a short-list of them for it would only open the door to judgments on the the selection of them and perhaps their numerical order. As this review is focused on Gertz’s work, all of that would be beside the matter.

It would be difficult to convince greatcharlie that Gertz wrote Deceiving the Sky with the objective of eclipsing the whole of its kind. What he has done is add an invaluable volume to the body of literature that accurately discusses “The China Threat.” He articulates the struggle in a manner that gives all matters that hang from it real meaning. Gertz only asks readers to follow closely what he has written and learn. Some seem disposed to remain content with that situation as long as it lasts. Though he lays it all out impressively before his readers, those not so warm to Gertz’s views will for themselves determine what if anything in the book is essential and what is not. Certainly, one must also accept that not everyone will be attuned to the scream of writers such as Gertz on the real and immediate threat China poses. 

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) To those who seek to find normality and safety in what China is doing in Asia and beyond and see it all as being modest enough, it is likely Deceiving the Sky put their noses are not out of joint. Whether they might be characterized as rejectionists or alarmist in accord with their responses to Gertz, nothing in Deceiving the Sky was apparently intended to harshly cut so deep into the foundations of thinking of proponents of an ascending China that they should find his facts and deductions threatening to their own analyses or interests. He is not on the attack. His goal is to illuminate. He encourages all readers to simply evaluate for themselves how things have actually been moving and where they are actually heading. Not just out of a sense of professional satisfaction but rather the urgency and importance of the matter, he would welcome and wish for an effort by them to test the virtues of what he presents.

Xi and senior decision makers on foreign policy within the Communist Party of China albeit are individuals of an exceptional nature judging from what they have displayed of themselves in challenging the US for the position as the world’s dominant power. That is a desire that they have in abundance. They have shown themselves to be a thoroughly bad lot. Gertz paints an even more sinister picture of Xi in a discussion of historical figures among his role models.

To accept that China would cause the release of COVID-19 through what might be called deliberate negligence would cause one to accept China was capable of any fantastic outrage. Doubtlessly, many already believed that. Gertz would perhaps be among their number. China was frugal with information about COVID-19 enough so that rather than being seen as heroes, they have set themselves up as the antagonist of every Western country, primarily the US, struggling to resolve the COVID-19 pandemic in this all-too real global tragedy. Many in the federal government foreign and national security policy bureaucracies and the US Congress with the responsibility to monitor what China is doing, have refrained from telling too much about its actions and intentions and the full extent of what its intelligence services are doing against the US to the public possibly for fear of figuratively frightening the horses. An unwavering conviction over China’s malign intentions appears to be a luxury that many especially in US foreign policymaking circles sense they cannot afford to have. They understand that one’s political fortune could possibly be balanced against it. That job has really been left to individuals as Gertz.

It appears important to note that in more than one spot in Deceiving the Sky, Gertz’s discussion on US policymaking on China is colored by his political perspective, recognizably conservative. As aforementioned, Gertz is a national security correspondent for the Washington Times, a daily newspaper with a conservative political alignment and was employed in that position at the time he wrote Deceiving the Sky. The book was published in 2019, and Gertz also expressed some satisfaction with the decision-making of the administration of US President Donald Trump under a strategy of competitive engagement. (Readers for whom this will pose some problems have been forewarned.) Not to make a labor of this matter, suffice it to say that such digressions in the text should not distract somber and astute readers from taking into consideration the healthy, accurate, and urgent message Gertz offers exposing the true intentions. That discussion, in greatcharlie’s assessment, is not partisan.

What greatcharlie Found Most Interesting

Deceiving the Sky is 256 pages, portioned in 13 chapters and a titillating conclusion. It presents what could perhaps be called a catalogue of sins by China. The range of Gertz’s coverage of China’s activities in Deceiving the Sky can be readily observed in his descriptive chapter titles. They include: Chapter 1: How Communists Lie: The 2007 ASAT Test; Chapter 2: The East Is Red: Communism with Chinese Characteristics; Chapter 3: China Wars: The Failure of Pro-China Appeasement; Chapter 4: The Coming Space War with China; Chapter 5: Assassin’s Mace in Space; Chapter 6: Seeking Digital Superiority: China’s Cyberattacks; Chapter 7: High-Tech Totalitarianism; Chapter 8: Chinese Intelligence Operations; Chapter 9: Influence Power: Beijing and the Art of Propaganda and Disinformation Warfare; Chapter 10: Financial and Economic Warfare with Chinese Characteristics; Chapter 11: Corporate Communism: Huawei and 5G; Chapter 12: Military Might: World Domination Through the Barrel of a Gun; and, Chapter 13: Flashpoints at Sea and China’s String of Pearls Expansion. He sums up the book with the thought-provoking segment: Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People. 

It would be impossible for greatcharlie not to receive the lessons and messages of books as Deceiving the Sky and feel compelled to ruminate upon them. Yet, in this review, greatcharlie’s focus is not turned dutifully and perhaps expectedly toward the fundamental and vital issues of concern such as China’s military growth, military strategy, investment in space platforms, ties to Russia, moves in the South China Sea, threat to Taiwan, and other issues of the utmost importance concerning its expansion and hegemony in its the Far East and ambitions beyond Asia. Regular readers of greatcharlie are aware that the blog’s editor has a keen interest in what author’s offer about what makes those of interest to them tick. For years, such independent analyses by reliable sources have often saved federal bureaucracies an infinity of extra trouble by offering insight on what may very well be on the minds of decision makers in foreign capitals. After examining a sufficient record of an individual’s attitudes and behavior in the aggregate sometimes, their motives may still remain inscrutable and those writing books on their policy making and decision making with little resource may turn to speculation. An additional interest of greatcharlie of late are the activities of Chinese intelligence services in the US.

Four chapters in which Gertz offers insights into the thinking of the leadership of the Communist Party of China at the present and into the future  and Chinese intelligence services that caught greatcharlie’s attention are: Chapter 2: The East Is Red: Communism with Chinese Characteristics; Chapter 3: China Wars: The Failure of Pro-China Appeasement; Chapter 8: Chinese Intelligence Operations. Insights Gertz offers in the book’s close, Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People, are also worthy of special note.

According to Gertz, no other Chinese leader since Mao has embraced the rigid orthodox Communist ideology more than Xi Jinping, who came into power in 2012. Soon after, Xi engaged in a ruthless, albeit less viable, ideological cultural revolution of his own, a political purge of thousands of officials, some were among the most powerful players in the system. By 2018, under Xi, the Party once again emerged with Mao-like devotion to the Socialist ideal of creating New Chinese Man. He lays out how Xi has assumed more power than any Chinese leader since Mao.

Chapter 2 The East Is Red

It is in Chapter 2, Gertz’s more fully explains, as mentioned earlier, that no other Chinese leader since Mao has embraced the rigid orthodox Communist ideology more than Xi Jinping, who came into power in 2012. Soon after, Xi engaged in a ruthless, albeit less viable, ideological cultural revolution of his own, a political purge of thousands of officials, some were among the most powerful players in the system, such as regional Communist Party boss Bo Xilai, police, intelligence and security czar, Zhou Yongkang, and former Vice Chairman of the Central Military Commission, General Guo Boxiong. 

Gertz reminds that beginning in the 1980s and over the decades that China noted the post-Mao policy dubbed “reform and opening up,” Gertz has readers cast their minds back to the years when Chinese Communist leaders went to great lengths to hide their ideology. He states that “ideological speeches were reserved for Party meetings and three-hour long recitations on the great works of the Party.” He continues further explaining that propaganda organs deliberately substituted the more-moderate sounding Socialism in place of Chinese Marxist-Leninsm in a strategy designed to win widespread support from non-Communist countries around the world.

Gertz then emphasizes how all of that changed with Xi. By 2018, the Party once again emerged with Mao-like devotion to the Socialist ideal of creating New Chinese Man. He lays out how Xi had assumed more power than any Chinese leaders since Mao. Gertz notes that following the death of Mao, the next leader of China, Chairman Deng Xiaoping, argued that Mao’s fanatic view of the World Communist Revolution needed to be changed. In its place, he adopted a new strategy called “Beyond Ideology and Social Systems” that sought to scale back Maoist ways but not give up Communism. Deng intentions were not benign. Gertz asserts that Deng believed world peace was at hand and that China should find a way to exploit it. To that extent, Gertz writes, Deng put forth China’s pragmatic strategy enabling massive trade and investment with the Capitalist world. As Gertz explains,”Bide our time, build our capabilities” was the Dengist ideology, and when the peace eventually collapsed, China would be ready both economically and militarily to dominate. Interestingly, despite appeasement of China by successive US administrations after Chinese tanks crushed the hopeful democracy movement in Tiananmen Square in June 1989, Gertz notes that Beijing continued to harbor the conspiracy theory of US plans to subvert and contain the People’s Republic.

As a very intriguing and instructive point, Gertz explains that “Chinese Communism mimics religion-it presents a version of history with a journey of deliverance played out in chapters written in a chosen language. It boasts its own priesthood–political commissary ubiquitous throughout–and an enforced infallibility of its leadership.” There are prophets and devils, along with a council of senior religious leaders who have the power to change or interpret the Communist historical narrative. Gertz goes on to state that Party loyalty equals morality; doubting history is blasphemy, heresy and treasonous. He then declares: “There is a chosen people, the Chinese, a promised land, China, temples, pilgrimages, faith in the face of contrary facts, deep intrusion into the personal life of each person, and the indoctrination of children into the tenets of Chinese Communism.”

Perhaps a very apparent expression of Chinese Communism as religion is through united front work. To better understand united front work, greatcharlie turns to the expert source for perspective, Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published a superb book, Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019). According to Mattis, the central element to understanding what the Chinese Communist Party is doing and why to shape the world outside the party is united front work. Mao described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a paper in the 1950s, the Central Intelligence Agency (CIA) defined united front work as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the party. To that extent, as Mattis explains, united front work entails shaping those outside the party, and not simply the Chinese people or world outside the People’s Republic of China. United front work must also be a tool of political struggle. It is not confined to activities that we would call propaganda or public diplomacy. It is not limited to covert action. In 1939, Mao wrote: “Our eighteen years of experience show that the united front and armed struggle are the two basic weapons for defeating the enemy. The united front is a united front for carrying on armed struggle. And the Party is the heroic warrior wielding the two weapons, the united front and the armed struggle, to storm and shatter the enemy’s positions. That is how the three are related to each other.” Mao’s outline of united front work within the party’s toolbox remains as the core understanding of it within the Communist Party of China today. United front activities have “aided” the Communist Party of China in resolving several dilemmas of the post-Mao era. That was most apparent following the Tiananmen Square and the death of Deng.

Evaluated on the basis of the united front policy system, the Communist Party of China’s management of political influence operations runs to the very top of the party, involving senior leaders directly. The policy system extends through the party’s hierarchy and spills over into China’s government ministries as well as other state-owned and state-administered organizations. The State Council ministries to include the Ministry of Foreign Affairs and many other organizations with a party committee offer unique platforms and capabilities that the united front policy system can draw upon for operational purposes. United front work is conducted wherever the party is present. To that extent, as Mattis explains, united front work is not an “influence operation” or a campaign. It is the day-to-day work of the party. The importance of united front work to the Chinese Communist enterprise is the reason why Xi has repeatedly emphasized the importance of a working organ of the Communist Party of China’s Central Committee, the United Front Work Department (UFWD ), to China’s rejuvenation. Among experts on China, UFWD is generally understood to be a Party intelligence organ,

One could only have imagined that foreign policy decision makers at the top of the Communist Party of China were aware that if the COVID-19 disaster was not put right with urgency, it would have had an unfortunate effect on US-China relations. Relative to the enormity of the crisis created, Beijing’s response could not reasonably have been considered apologetic or a recognition of their misstep at all. Overall, the design of the response appeared to be to protect the image and reputation of the Communust Party of China, and leave the impression that it was infallible in its response.

United front work in diplomacy can often be a dominant feature. Diplomacy with leading industrialized Western countries and prominent industrialized countries in their own region is used as a platform to promote the message of the Communist Party of China and bolster its standing. To discern such efforts, one might watch for matters stated publicly that might have little purpose in a more private setting and in fact might be best conveyed on the sideline meeting or during a break in bilateral or multilateral talks.

The reason for this is that the target audience of those comments will not be the party to the negotiation. The target is the people of China and people of underdeveloped and burgeoning industrialized countries who erroneously might see China as having eclipsed the power of leading industrialized countries and directly confronting them. China’s effort to pull countries of the Third World in Asia and Africa and even countries in Eastern Europe, with a particular focus on the Balkans, within its sphere of influence to turn a phrase has the characteristics of a near collection mania. However, the behavior of the Communist Party of China perhaps has had its best results among countries led by tyrants and other potentates who themselves have engaged in the ions old quest for dominance in their region or in the world. Aliquis latet error. (Some trickery lies hidden.)

A tangible demonstration of how China is leading the march to a “better” future for the world, by taking on US power publicly. This was recently done during a two-day bilateral meeting from March 18, 2021 to March 19, 2021 at the Captain Cook Hotel in Anchorage, Alaska. A  US delegation led by US Secretary of State Antony Blinken and US National Security Adviser, Jake Sullivan met with a People’s Republic of China delegation led by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi. The two-day meeting got off to a tense start, with a public display of the strained nature relations between the US and China. 

Blinken laid out many of the areas of concern, from economic and military coercion to assaults on basic values. Sullivan made clear that the overriding priority of the US was  to ensure that its approach in the world and approach to China benefits the US public and protects the interests of US allies and partners. Further, he explained further that the US did not seek conflict, but welcomed stiff competition and will always stand up for its principles, for its people and its friends.

Yang responded boldly, taking a bit of time to express sharp criticism of the US. He spoke with great authority. There was an air of ceremony in his reproach. Yet, through his words were evinced the restricted, mental prison of Communism. His statement must be examined in some detail to allow readers to sense the style, tone, rhythm, mood, the expression of indignation, and the recognition that a new world order is on the horizon that will have Chinese characteristics. One can discern a certain flavor in expressions of united front work in diplomacy.

Yang explained: “We believe that it is important for the United States to change its own image and to stop advancing its own democracy in the rest of the world. Many people within the United States actually have little confidence in the democracy of the United States, and they have various views regarding the government of the United States. In China, according to opinion polls, the leaders of China have the wide support of the Chinese people. So no attempt to–the opinion polls conducted in the United States show that the leaders of China have the support of the Chinese people. No attempt to smear China’s social system would get anywhere. Facts have shown that such practices would only lead the Chinese people to rally more closely around the Communist Party of China and work steadily towards the goals that we have set for ourselves.”

In an effort to turn a disadvantage into advantage with mere words, Yang went on to say: “On human rights, we hope that the United States will do better on human rights. China has made steady progress in human rights, and the fact is that there are many problems within the United States regarding human rights, which is admitted by the US itself as well. The United States has also said that countries can’t rely on force in today’s world to resolve the challenges we face. And it is a failure to use various means to topple the so-called authoritarian states. And the challenges facing the United States in human rights are deep-seated. They did not just emerge over the past four years, such as Black Lives Matter. It did not come up only recently. So we do hope that for our two countries, it’s important that we manage our respective affairs well instead of deflecting the blame on somebody else in this world.

Ostensibly speaking on behalf of peoples “oppressed” and formerly oppressed by Western powers as China, itself, once was. Yang was particularly biting, stating: “The United States itself does not represent international public opinion, and neither does the Western world. Whether judged by population scale or the trend of the world, the Western world does not represent the global public opinion. So we hope that when talking about universal values or international public opinion on the part of the United States, we hope the US side will think about whether it feels reassured in saying those things, because the US does not represent the world. It only represents the government of the United States. I don’t think the overwhelming majority of countries in the world would recognize that the universal values advocated by the United States or that the opinion of the United States could represent international public opinion, and those countries would not recognize that the rules made by a small number of people would serve as the basis for the international order.”

No doubt was left as to his loyalty and dutiful nature toward the Communist Party of China as Foreign Minister Wang performed his united front responsibilities expressing the following position: “China certainly in the past has not and in the future will not accept the unwarranted accusations from the US side. In the past several years, China’s legitimate rights and interests have come under outright suppression, plunging the China-US relationship into a period of unprecedented difficulty. This has damaged the interests of our two peoples and taken its toll on world stability and development, and this situation must no longer continue. China urges the US side to fully abandon the hegemonic practice of willfully interfering in China’s internal affairs. This has been a longstanding issue, and it should be changed. It is time for it to change. And in particular, on the 17th of March, the United States escalated its so-called sanctions on China regarding Hong Kong, and the Chinese people are outraged by this gross interference in China’s internal affairs and the Chinese side is firmly opposed to it.”

Latrant et scitis estatint praetesquitantes estis. They bark, so you know that you are in front of them.) One could reasonably presume any genuine negotiations planned by Chinese officials was secondary to what was stated at the outset of the meeting. Nothing stated by them could have led one to believe they were negotiating, seeking to establish common ground and points of agreement on issues and ways to come together on the most nagging ones. The meeting in Anchorage, Alaska provided a grand stage. The target audience of the Chinese officials’ reproaches was not really Blinken and Sullivan who were present in the room, but rather the people of China stand people of underdeveloped and burgeoning industrialized countries who would likely see China directly confront the US through their words. The Chinese officials sought to establish separate warring identities between the US and China. They sought to create the impression that some equipoise of power had already been by China versus the US.

Further, the Chinese officials clearly wanted to establish an image for the world to see of how disassociated China’s worldview was that of the US. They also appeared to want to demonstrate that China’s old view was more closely related with underdeveloped and burgeoning industrialized countries. They wanted to create the impression that there were both positive and negative forces present at the meeting, setting China up as the positive force and the US as the latter. 

Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi in Anchorage, Alaska, March 2021 (center). Gertz explains that in the 21st century, “the US is facing the potential of a new world war by miscalculation involving China that has been quietly and systematically building up what it terms comprehensive national power–military, diplomatic, economic–for what the Chinese Communust leadership believes will be an inevitable showdown in creating a new anti-democratic socialist and communist world order without the US.” In his most acidulous commentary, Gertz declares that “the pro-Beijing hands in and out if government were complicit in these policy crimes that deliberately appeased China through a rigid, establishment view that ignored the reality of the People’s Republic and cast it as a normal nation and not as a nuclear armed Communist dictatorship.” Gertz says that it was not until 2015 that the pro-China view was recognized as being no longer sustainable.

Chapter 3: “China Wars: The Failure of Pro-China Appeasement”

In the four decades after the period of reform and opening up began in 1972, Gertz says that “the vast majority among a relatively small and close knit community of China experts who glowed into government policy positions, intelligence agencies, and the officer corps from universities and think tanks produced one of the most serious failures of foreign and security policy in US history.” Gertz explains again that “forty years of willful blindness about China led to the adoption of disastrous policies toward China that have produced a new era of danger many experts see as analogous to the 1930s,” a period when shortsighted diplomats and policymakers prevented the US military from preparing to meet the threat of the growing power of the Japanese Empire. As that story goes, tabletop war games against Japanese forces were forbidden. The ruling elite feared that “it would create a new Japanese threat where there was none.” Gertz says that similarly, pro-Beijing hands created another strawman argument for the appeasement of China. In the aggregate, the result according to Gertz has been “a devastating run of policies toward Beijing that avoided all reference to China’s illicit activities and behavior from the massacre of unarmed pro-democracy students in Beijing’s Tiananmen Square in 1989, to China’s role in stealing US secrets on every deployed nuclear weapon in the US arsenal and hastening their spread globally by supplying nuclear warhead design secrets to Pakistan.”

Cuiusvis hominis est errare, nullius nisi insipientis, in errore perseverare. (Any man can make a mistake, only a fool keeps making the same one.) Gertz explains that in the 21st century, “the US is facing the potential of a new world war by miscalculation involving China that has been quietly and systematically building up what it terms comprehensive national power–military, diplomatic, economic–for what the Chinese Communust leadership believes will be an inevitable showdown in creating a new anti-democratic sociakist and communist world order without the US.” In his most acidulous commentary, Gertz declares that “the pro-Beijing hands in and out if government were complicit in these policy crimes that deliberately appeased China through a rigid, establishment view that ignored the reality of the People’s Republic and cast it as a normal nation and not as a nuclear armed Communist dictatorship.” He goes on to state the dominant pro-China community of both officials and non-government experts “inflicted serious damage on US interests by consistently producing biased and misleading assessments on both China’s intentions and capabilities.” Gertz says that it was not until 2015 that the pro-China view was recognized as being no longer sustainable.

As greatcharlie discussed in its March 29, 2021 post entitled, “Listening to and Understanding the Positions of Others: A Requirement for Thoughtful and Fruitful Talks in All Cases,” diplomacy has been defined as the established method of influencing the decisions and behavior of foreign governments and peoples through dialogue, negotiation, and other measures short of war or violence. In its practice, its key for negotiators to ensure the other side is listening and understanding what they are communicating. That necessitates managing negotiations without arousing hostility. Any awkward situations must be handled with tactfulness. 

Although only in office for a few months at the time of this writing, the administration of US President Joe Biden and Vice President Kamala Harris presumably has used US citizens, individuals with the very best reputations to contact Beijing through so-called back channels. Those individuals would be doyens, men or women of the world with a natural turn for diplomacy, and for discreetly presenting issues of concern and arranging delicate matters as a point of honor for Washington. China appears to commit itself to nothing where the US and Western countries are concerned, or where any other country is concerned for that matter. China’s government is founded on a movement that produced a revolution. It believes it provides a way of living based on Mao’s teachings that should be embraced for all humanity. It will never be satisfied until it puts the rest of the world’s government’s on a solid footing in that direction.

Whether diplomats, intelligence officers, Communist Party of China operatives, or businessmen, they spout the old propaganda line while overseas, “Communism is the wave of the future.” The Biden-Harris administration’s policy makers will have ample opportunity to test theories on how to get the best results from US bilateral relations and economic competition with China. Gertz does not use page space to present readers with exact details of how the US has bargained and negotiated with China, or the tone heard during opportunities in which they communicated bilaterally. The outcomes of such talks speak for themselves. It is one thing to establish a competitor firmly in one’s mind to help drive the effort “to up one’s game.” It is wholly another thing to seek something akin to world domination and to find a way up by stealing from, forcing out, and stepping upon, others. China is attempting to do all of the latter to the US. China will almost always be happy to meet with US officials to negotiate and sign any agreements both to humor themselves, satisfy those among US policy makers and decision makers naive enough to believe there would be any hope of hampering China’s march to dominance, and mollify others who may “fear” the change that Beijing assures is coming.

Qui cumque turpi fraude semel innotuit, eriemsi verum dicit amittit fides.  (Whoever has once become known for a shameful fraud, is not believed even if he speaks the truth.) One could go as far as to say it is delusional to persist in communicating entreaties of that kind to Beijing. This is especially true when it is clear how the troubling behavior in question is associated with China’s quest for dominance. There is no shortage of ambition. One cannot show a tender conscience to Beijing without soon facing a test of will or other undesired effect. The next generation may say preceding ones were dull indeed not to recognize and respond to China’s maneuvers. To go on in partnership with the Chinese, US administrations have forgiven, while not warranted, its worsening behavior. They have forgiven much. Diplomatic outcomes on contentious matters may often be part of larger arrangements, schemes of the Chinese. Indeed, Chinese negotiators will expect that parties to a negotiation will be willing to accept and start with the conditions they initially present. They will strenuously negotiate. If the Chinese can find no flexibility and no further room for satisfactory results from the negotiations they may alter their position more in line with the other party’s terms. The other party may be eager to accept China’s new amiable terms but they may be unaware that there could be a catch. A follow-on malign action, may weaken the benefit of any settlement on the same original matter. An opportunity for the Communist Party of China to test the the virtues of this approach presented itself with the Trump administration when it negotiated and signed a trade agreement in 2020. The Communist Party of China was already aware of the burgeoning COVID-19 crisis at home. It no longer appears Beijing is disposed to negotiating fairly, nobly, on anything. This may appear all the more the case as Beijing may feel it is moving closer and faster to its goal of overcoming the US as the world’s dominant power. After examining this, readers should recall the discussion earlier in this review of the “decieving the sky” strategy ascribed to China’s approach. It is very fitting. Quite so!

By the time the second action is realized by the second party, be it the US or otherwise, it is usually still too unfathomable to imagine that the more malign outcome was sought all along by China. By the time it may be accepted by the second party that every step taken by China was part of one larger scheme, the dye will have long since been cast. In its business of conquest, Beijing almost always does everything completely. China’s efforts in this manner do not seem to have an end.

US political leaders must be willing to do the hard yards to ensure its position is protected. This is not a situation that can be nuanced through talks at the negotiation table. China will not surrender any of its gains or leave what appears to be clear paths to its objective for anything the US might offer, except surrender or capitulation.

However, those US political leaders might also consider the words of Paine, 18th Century American political writer, theorist, and activist of the American Revolution asserted in The Crisis No. V (1778): “To argue with a man who has renounced the use and authority of reason, and whose philosophy consists in holding humanity in contempt, is like administering medicine to the dead, or endeavoring to convert an atheist by scripture.”

Workers in a high-tech facility in China (above). Gertz explains that an expert source in the US Intelligence Community revealed to him that Chinese intelligence operations only began receiving the attention they deserved in the late 2010s after China stopped using more cautious methods and adopted bolder approaches to stealing secrets and recruiting spies. Citing a retired source from the US Intelligence Community, Gertz notes that Chinese intelligence activities are akin to a storm. That Chinese intelligence storm is a secret assault on the US that is without parallel since that mounted by the Soviet Union in the 1930s and 1940s. Gertz explains that current Ministry of State Security recruitment efforts are focused on all US citizens with access to secrets China wants. Those secrets come in two main categories: counterintelligence information about Chinese working for US intelligence, and government secrets and even openly available information that will boost China’s military and civilian modernization and industrialization programs.

Chapter 8: Chinese Intelligence Operations

In Chapter 8 “Chinese Intelligence Operations”, Gertz takes the reader into the arcane world of espionage via the operations of Chinese intelligence services in the US. US counterintelligence services have tried to grapple with the matter of Chinese espionage, however the situation with the activities of Chinese intelligence services nevertheless has become an impossible one for them. The anecdotes that Gertz presents well depict the course of that intelligence struggle. He reconstructs the drama of each case. He does this so clearly, that one would believe that he was present in each case to watch events unfold.

At the core of the chapter’s discussion, Gertz explains that today, the Ministry of Public Security (MPS), Ministry of State Security (MSS), and People’s Liberation Army (PLA) intelligence agencies, along with the United Front Work Department, a Communist Party intelligence unit, are the leading forces of China’s intelligence power. Gertz supports the well-established view that the power of those services is focused solely on maintaining and expanding the power of the Communist Party of China in its drive for global domination. At the end of the chapter, Gertz briefly explains that there was ano important reorganization of the PLA intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) now resides with the new Strategic Support Force under the Central Military Commission. To provide a bit more detail on that transition, the Second Department of the People’s Liberation Army, responsible for human intelligence, the Third Department of the People’s Liberation Army, the rough equivalent of the National Security Agency, responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army, responsible for electronic warfare have been rolled into the new Strategic Support Force. The PLA’s human intelligence operations are managed by the Joint Staff Department, and comes under the Central Military Commission. Surely, Gertz is aware of all of this. However, as the main focus of Deceiving the Sky was shed light on the realities of China’s attitudes and behavior, actions and intent, with regard to the US, it was reasonable for him to preclose where he saw fit in his discussion of the Chinese intelligence services.) As for the United Front Work Department, as mentioned earlier in this review, it is one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three are the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.

Regarding MPS, Gertz says that it is the Chinese version of what has been called intelligence led policing that seeks to preempt crime. Yet, unlike the West, where laws limit the activities of police and security services, Gertz says Chinese security operations have few boundaries. One feature of the MPS is a system called “the Big System” that seeks to fuse masses of data from Chinese police and intelligence services into one program. Big intelligence is the intelligence version of the PLA’s drive for “informatization,” a term used for high technology analysis activities. 

Gertz informs that the massive police intelligence apparatus promises to make it more difficult for those seeking democratic political reforms in China to operate. As Gertz puts it, dissidents and enemies of the state as well as actual criminals will find it hard to plan and organize without leaving behind digital breadcrumbs that security services can collect and connect. He notes that theos MPS has also created the Golden Shield, a military style command structure designed to share intelligence throughout China. The systems have created pathways designed to breakthrough bureaucratic obstacles and link data. Golden Shield involves automatic analysis and cloud computing for analyzing masses of data including computerized facial, voice, and gait recognition. While MSS and PLA focus their spying operations on technology acquisition, MPS agents are engaged in spying on Chinese dissidents in the US.

Citing a former CIA director of counterintelligence, Gertz notes that Chinese intelligence activities, lay those of MSS and the PLA, are akin to a storm. That Chinese intelligence storm is a secret assault on the US that is without parallel since that mounted by the Soviet Union in the 1930s and 1940s. Gertz appears absolutely taken by the fact that penetration of US national laboratories has led to the loss of at least six nuclear weapons designs and the enhancement of Chinese offensive and defensive capabilities. Gertz explains that current MSS recruitment efforts are focused on all US citizens with access to secrets China wants. Those secrets come in two main categories: counterintelligence information about Chinese working for US intelligence, and government secrets and even openly available information that will boost China’s military and civilian modernization and industrialization programs. The modus operandi of MSS counterintelligence Includes the recruitment of foreign intelligence officers and their agents for work as double agents. Gertz tries to get to the center of the mystery of how MSS was able to completely destroy the CIA’s networks in China through combination information from an operative within the CIA and communications system breach. An estimated 30 agents were caught of which three were killed.

Beyond its own human intelligence activities, the PLA, particularly what Gertz, as mentioned, still refers to as the 3rd Department of the PLA, has engaged in a cyber campaign which has inflicted considerable damage to include the theft of sensitive government trade and industrial secrets.

Much Gertz explains here, greatcharlie has also observed in previous posts that little progress has been made in halting it or even making a discernible dent in Chinese intelligence operations. Many minds in the US national security bureaucracies are certainly working fiercely on this matter of utmost importance, but too few facts have been collected for them to run on to break new ground or produce anything worthwhile for that matter. Trails of espionage may lead to the MSS and PLA, directly in many instances, but those who commit the devilry of spying on Beijing’s behalf, in the US and from China, are seldom caught. With estimates as high as 25,000 Chinese intelligence officers, operatives, and informants on the loose in the US, it is difficult even the most partisan observers such as greatcharlie to deny China has secured a massive advantage for itself. Publicly, there appears to be not much of anything comparable achieved to knock back Chinese espionage. If US counterintelligence services had ever managed to achieve some significant breakthrough on the Chinese intelligence front, one would hear “singing in the valleys.” US intelligence services, much as those of other countries, abhor the prospect of public scrutiny, but it is too late now to be concerned by such anxiety.

The deluge of Chinese espionage has torn away so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among possible dissenters, an interest, not solely due to exigency, will grow on the idea. Chinese intelligence services have hampered the work of US businesses, research and development firms, high-tech firms, academia, and the federal government itself. They have created spy networks within institutions critical to US economic security and defense. They have attempted to inconvenience the US in its efforts to improve bilateral and multilateral relations in under developed, less industrialized countries and even long time friends of the in certain regions, and multilateral institutions that the US actually had a hand in creating.

In Aristophanes’ play, Birds (414 BC), the character Epops states: “The wise can often profit by the lessons of a foe, for caution is the mother of safety. It is just such a thing as one will not learn from a friend and which an enemy compels you to know. To begin with, it’s the foe and not the friend that taught cities to build high walls, to equip long vessels of war; and it’s this knowledge that protects our children, our slaves and our wealth.” Chinese intelligence services, perhaps at one time, expecting to face something out of the ordinary, that US counterintelligence services would have a few tricks up their sleeves, have not been challenged in any way that has halted or deterred their cyberintelligence or human intelligence activities. Chinese intelligence services have unfortunately managed to do their job successfully, collecting mountains of secret and information from the government bureaucracies and research and development sites, private businesses, high-tech firms particularly, academia, and think tanks. Surely there must be an atmosphere of optimism in the halls of the headquarters buildings of the Chinese intelligence services. The Communist Party of China most likely delights that without openly admitting to possessing such intelligence capabilities, at least through perception, it has that power over the US. 

One can imagine that on more than one occasion, resources, energy, and time were squandered following a false scent. (God help those who have been wrongfully suspected and falsely accused by mistaken or errant officers of any of the US counterintelligence service. It happens. No amount of reparation could ever fix the psychological and material damage very likely done to innocent targets and their loss of reputation and honor.)

Nam qui peccare se nescit, corrigi non vult. (If one doesn’t know his mistakes, he won’t want to correct them.) Perhaps US counterintelligence services are applying old ways of thinking to a new type of intelligence struggle that bears little resemblance to previous ones. The key to it all remains out there somewhere. Finding those who would be capable and disposed to sniff it out using traces available would seem to be the real task ahead. One might presume that US counterintelligence services would hardly imagine anyone from outside the bureaucracy would be capable of producing some shred through their amateur study of the matter. Indeed, some senior executives and managers of US counterintelligence services, determined to stand as solid pillars of standard thinking and behavior that will not be blown down by the winds of change, may brook the idea of bringing in outsiders to handle sensitive matters. They may be mistaken. 

The solution to this espionage riddle, at least based on public reports, appears no closer within their reach. If the matter has not indeed already been settled, it may seem to some that it is at least at the edge of the end. The chance for US counterintelligence services to exhale will not come for a while. Chinese intelligence services do intend to let it come at all. US counterintelligence services have not despaired of getting a handle on the situation. Uppermost in the minds of senior executives and managers in US counterintelligence services is whether anyone within the bureaucracy can produce the magic that will allow them the ability to gain and retain the initiative in a cause that appears to be lost. They must press ahead on the forward foot.

A US B-2 bomber and two US F-22 fighter jets fly in formation (above). The rocky nature of US relations with China is a matter of great urgency. Yet, Gertz is not planting seeds of war in a time of peace. Despite how he labels his conclusion, he does not propose war as a solution. He still holds hope that US officials will come across something along the way that might bring a solution to the crisis. Gertz explains that there is a growing bipartisan political consensus that new strategies and policies urgently are needed to deal with China. Ostensibly to assist in that effort, he presents a set of 14 recommendations for a policy of liberation for the Chinese people from the yoke of Marxist-Leninism with Chinese characteristics.

Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People

Readers might recall the words of the 16th century Italian diplomat and political theorist Niccolo Machiavelli in his famous instruction guide for new princes and royals by The Prince (1532): “There are two ways of contesting, the one by the law, the other by force; the first method is proper to men, the second to beasts.” The rocky nature of US relations with China is a matter of great urgency. Yet, Gertz is not planting seeds of war in a time of peace. Despite how he labels his conclusion, he does not propose war as a solution. Prosing out on that matter, he still holds hope that US officials will come across something along the way that might help them develop a solution to the crisis.

Gertz explains that there is a growing bipartisan political consensus that new strategies and policies urgently are needed to deal with China. He does not believe it will be impacted by what he calls the national predicament, a seeming loss of clarity amid increased political polarization. To assist in finding that solution, he presents a set of 14 recommendations for what he hopes will be a policy of liberation for the Chinese people from the yoke of Marxist-Leninism with Chinese characteristics. Gertz emanates a sense of assurance in his writing that the recommendations he offers in Deceiving the Sky would obtain good results.

Each of the 14 recommendations is sufficiently self-explanatory, some are accompanied here with a précis of his summary on it or greatcharlie’s own comments on it. Together, his recommendations have a cumulative effect. They include: 1) Information: Conduct aggressive competition in the realm of ideas. He proffers that the first step in creating a free and democratic China would be regime change, an effort to peacefully oust Communist Party of China; 2) Reciprocity: Restrict access by China to the US in ways equal to Chinese restrictions. A key measure would be to counter Chinese financial warfare with a US program of economic warfare; 3) Intelligence: Shift the focus and operating methods of American intelligence toward more robust and aggressive operations and more effective analysis. Rather than accept being pushed back on its heels, Gertz recommends that the US Intelligence Community should step up aggressive intelligence and counterintelligence operations against the Communist Party of China and the PLA; 4) Foreign Policy/Diplomacy: Restructure and Reform the diplomatic system. Such reforms would need to be implemented in a way that would allow the US to better confront and counter growing Chinese hegemony; 5) Alliances: Create a pro-freedom, pro-prosperity, and pro-rule of law network in Asia. What was already seen in the Trump administration and still being seen in the Biden-Harris administration is Gertz recommendation that the US develop “a global network of democratic alliances targeting China that will seek to pressure Beijing into abandoning its totalitarian communist system and global designs.”; 6) Cultural/Educational: Severely restrict activities by Chinese nationals in the US who are abusing the American system. Gertz suggests that such activities should be restricted in recognition of the subversion and technology theft threats many unfortunately pose; 7) Counterintelligence: Major strategic counterintelligence operations and analyses should be implemented that focus on aggressively targeting Chinese intelligence and security services; 8) Economic: The US should begin a gradual policy of disengagement from Communist China economically; 9) Financial: Plan and carry out covert financial warfare operations against China; 10) Military Exchanges: The Pentagon and US Military must adopt a new policy that recognizes the Communist Party of China and the People’s Liberation Army as the main enemy; 11) Military Missile Defense: Expand American Regional missile defenses. As part of a strategy of neutralizing China’s massive and growing force of ballistic, cruise and hypersonic missiles, Gertz says US missile defenses around the world should be expanded; 12) Military Gray-Zone Warfare: Develop asymmetric warfare capabilities designed to negate Chinese military, cyber, electronic, and psychological warfare capabilities; 13) Political: Create a Parliament in exile. The creation of a “democratic Chinese parliament in exile” that will develop new policies for a free China is an old chestnut.; and, 14) Russia: Play the Russia card. One might call Gertz the suggestion that the US should play the “Russia card” against China by seeking a free and democratic Russia aligned with the free world somewhat fanciful.

Most notable to greatcharlie in the context of this review is Gertz’s recommendation on “Foreign Policy/Diplomacy: Restructure and Reform the diplomatic system.” In his summary of that recommendation, Gertz suggests that US diplomats and foreign service personnel should be retrained in the use of new and innovative diplomatic methods and techniques for the information age that emphasize successfully implementing new strategic objectives toward China that reject the failed diplomacy of the past. The new diplomacy will be rooted in honest assessments and understandings of the true nature of Communist China. A new objective will be to report on and take steps to force an end to the systematic abuse of human rights in China as a high priority. The US should seek to create a new alliance of nations that will seek to isolate China and spur internal democratic political reforms and promotion of freedom and free market systems in the region. Strategic and economic dialogues such as those in the past that produced no results must be ended. New engagement should be limited to conducting bilateral and multilateral talks on concrete, achievable objectives such as verifiable arms limitation and enforceable trade agreements. It certainly would not be velvety going forward if such a course were followed, but perchance US values and interests would be well-served.

In Deceiving the Sky, Gertz’s research sheds an extraordinary side light on the undeniably aggressive thinking of Beijing. While US political leaders are still in a position to reexamine the facts, they should do so. Surely, if any of them were to take the time to look at Gertz’s book with an open mind, it would given them the necessary nudge to begin thinking in that direction. Deceiving the Sky could also lend support to deliberations among colleagues on the matter. 

There are likely quite a few citizens in the US who have heard about China’s aggressive activities. Surely, they would appreciate reading Deceiving the Sky as it would provide them a firm basis for understanding the many issues involved. As greatcharlie has already stated in this review, information from the text that is discussed here only represents a fraction of what the reader will find in Deceiving the Sky. For greatcharlie, the book was both edifying and a pleasure to read. Without hesitation, greatcharlie recommends Deceivibg the Sky to its readers.

By Mark Edmond Clark

Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts

The People’s Republic of China Consulate in San Francisco (above). The Consulate has been a bit troublesome. On occasion, it has been linked to suspected Chinese espionage efforts on the West Coast. However, Chinese intelligence operations in the region, which holds world-leading science and tech firms, have more often been tied to state-owned businesses, private firms, academic institutions, or research institutes than the Consulate. In a January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence. In Chapter Six, Olson lists 10 “benefits of a counterintelligence operation” and explains how to reap them. In this essay, greatcharlie presents some suggestions on how Olson’s precepts might be applied to help defeat Chinese espionage efforts throughout the US.

In its January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019. In Chapter Six “Double-Agent Operations,” Chapter Seven, “Managing Double-Agent Operations,” and Chapter Eight “Counterintelligence Case Studies,” in particular, Olson provides a generous amount of information on how counterintelligence operations have been conducted by US counterintelligence services. Readers are also favored with many of the logical principles that Olson would practice and expound during training during his service in the Central Intelligence Agency (CIA) counterintelligence. Included among what he presents is a list of benefits US counterintelligence seeks to gain from a double-agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Many of the tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination and creativity. One discovers how double-agents were dangled to garner interest from adversarial intelligence services, false information spiked with just enough truths, “chicken feed,” was transmitted, and nuanced communications between the double-agent and his handler were managed. In 12 case studies, Olson finally presents a classical series of demonstrations along with lessons learned. He tells it all in an apposite way. Virum mihi, Camena, insece versutum. (Tell me, O Muse,of the skillfully man.)

In fairness, Olson’s work should not be judged in terms of his reaction to the prevailing national security crisis at the time of this writing: Chinese intelligence penetration into the foundations of US power. A criminal strain is observed running through the thinking of the Communist Party of China as it dispatches Chinese foreign intelligence services to steal volumes, tons of information from the most secure locations in the US. Perhaps what the future may hold is made darker by the fact that among its central members, are individuals of immense intellect, making them a far more dangerous threat to US interests. In greatcharlie’s view, there is much that can be extracted from To Catch a Spy that might constructively provide some suggestions on how to address this crisis. With the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. That does not imply that a bias colors its discussion. No information is skewed or bent with preconceived ideas. What it does mean is that readers will likely discern facts are interpreted from that perspective.

In Chapter Six of To Catch a Spy, Olson lists the 10 “benefits of a counterintelligence operation” related in particular to double-agent operations and explains, in brief, how to reap them. In this essay, greatcharlie may albeit step out on shaky ground to present some discreet suggestions on how 9 of Olson’s 10 precepts might be applied in efforts to defeat Chinese espionage activities in the US. The suggestions are the result of some creative thinking on what if anything new might be said on the matter. In the essay’s discussion, greatcharlie hopes to avoid any appearance of instructing counterintelligence officers on what to do. Rather, the only desire is to offer all readers its suggestions, leaving it up to those in US counterintelligence to observe, reflect, and act as they may. It would be satisfying enough to know that some of what is presented here might  resonate with a few of them. It is presumed by greatcharlie that Olson’s precepts harmonize to a great degree with those that currently guide US counterintelligence officers in active service and thereby anything resulting from them would not be deemed too fanciful or even recherché. Applying Olson’s precepts to developments on the Chinese intelligence front in greatcharlie’s would have been beyond its scope of its preceding review of To Catch a Spy –although some readers noting the review’s length might sardonically query why there might be any concern over a few thousand words extra. In response to such concerns, greatcharlie has attempted to apply Olson’s teachings to the discussion here without making it an exercise in “large data processing.” It should also be noted that from the corpus of work on Chinese intelligence, a great influence upon greatcharlie are the writings of Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant.

Additionally, upon consideration of what it could offer to support the development of more effective approaches to defeat Chinese human intelligence and electronic intelligence collection activities against the US, greatcharlie bore in mind that it would need to be somewhat Delphic in its discussion. Therefore, what is offered are fragments of ideas with the aim of leaving a figurative trail of breadcrumbs that  a few officers in the US counterintelligence services might pick up. Hopefully, after testing their virtue, they will find something useful. Given this approach, greatcharlie apologies in advance to other readers who may find the discussion somewhat cryptic or a bit “undercooked” at places. De minimis grandis fit magnus acervus. (From the smallest grains comes a big heap.)

Chinese Foreign Intelligence Versus US Counterintelligence

Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know. At the top, senior executives and managers must account for the failing of their respective US counterintelligence services. Imaginably, they resent the deficiency. Surely, they are feeling terribly unsettled by regular reports of so much being blown, so much intellectual property and classified material being lost. They have certainly had a bellyful of the failure rate against the Chinese intelligence networks. There has been so much scandal–or at least what should be scandal–with US political leaders becoming entangled with Chinese intelligence operatives, from interns, drivers, fundraisers, to “camp followers.” Expectedly, senior executives and managers should be wondering whether the rank and file of US counterintelligence has gone on hiatus. To use contemporary sports vernacular in the US, US counterintelligence services “have not shown up” in the struggle with China. They may also be wondering, given the array of tools and considerable resources available to them, whether the rank and file, led by squad, shop, or unit supervisors and commanders, have told them the whole story. Perhaps harshly, they would question whether the rank and file were organizing valid plans or going off on profitless “school boy larks,” not remotely sufficient to defeat a most cunning opponent. Against the Chinese style intelligence operations, it may very well be the case that the ordinary principles of trade craft and security have gone to the wall. French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Directors and commanding officers of US counterintelligence services can only come to the US Congress for hearings on oversight and appropriations seeking sympathy not approval or report any real success.

Perchance little has really been provided in any official assessments of why US counterintelligence efforts have been so unsuccessful. Perhaps senior executives are not asking the right questions or any questions. When one is overmatched, one will usually lose. Some enhanced intelligibility in the discussion of what has been occurring would help to bring at least the US public around to a better understanding of what where things stand and the prospects for success. Without that, policy analysts and other observers are left to presume that the Chinese are that much better. Indeed, as of this writing, the suggestion that has frequently been voiced in certain quarters concerned with the crisis, and has even spilled out into the newsmedia, is that the professional, diligent officers of the US counterintelligence services–and sadly those qualities cannot be ascribed to the entire group–are simply unable to get a handle on the Chinese threat. That suggests there has been a complete eclipse of their faculties. However, that should not be taken as the gospel truth. Surely, the men and women of the US counterintelligence services, correctly focused, will be able to gain and retain the initiative and start pulling apart Chinese intelligence networks. The renowned US industrialist Henry Ford once remarked: “Failure is simply the opportunity to begin again, this time more intelligently.” The US counterintelligence services maintain their vigil.

Olson’s Precepts from To Catch a Spy

On “Spreading disinformation”

Olson begins his veritable “mini manual” by explaining double-agents can be used to provide the opposition service with false or misleading disinformation, but this a relatively infrequent objective. Deceiving the enemy in this manner requires tremendous planning and subtlety because adversarial foreign intelligence services are not easily deceived. Very often they possess the means to verify the provenance of the double-agent’s reporting. Moreover, if the double-agent reports that some action will take place in the future and it does not, the double-agent’s credibility is seriously undermined. According to Olson the use of disinformation in a double-agent operation would only make sense when the stakes are unusually high or the opposition has limited means of verification.

With reference to “Determining the other side’s modus operandi”

Olson explains that a double-agent is in a perfect position to report back on the opposition’s modus operandi. For any counterintelligence officer responsible for monitoring and thwarting hostile services operations, it is invaluable to know how the service conducts its business. Olson recalls that when he was tasked with developing counterintelligence programs at CIA field stations, the first thing he did was review all of the double-agent operations that any US government agency had run in that location. What he wanted to learn was how the target services operated. Among the questions that he would ask were the following: “Did they meet their agents in safe houses, cafes, parks, vehicles, or some other location? What time of day did they prefer for agent meetings? Were there sections of the city they overused? Did they incorporate initial contact points into their modus operandi, and if so, what kind? What kind of equipment and training did they provide for their agents? Did they use electronic communications of any kind? Where were their dead drops and what did their concealment devices look like? What type of signal device did they prefer?”

Olson remarks that It was especially helpful to have double-agent history in the same city that you are operating, but there was value in reviewing any foibles of double-agent operations run by the target service anywhere. As Olson explains, the case officers of the service have all had the same training and follow the same operational doctrine. They tend to fall into habits and use operational techniques that have worked for them elsewhere. The result can be predictability–a major vulnerability in spying that can and should be exploited by the opposition’s counterintelligence. 

Concerning “Identifying hostile intelligence officers”

Foreign intelligence services take great pains to hide their case officers under a variety of covers according to Olson. They can pose as diplomats, trade officials, journalists, students, businessmen or businesswomen, airline representatives, employees of international organizations, and practically any other profession that gives them an ostensible reason for being in the country. US counterintelligence is tasked with piercing those covers and identifying the spies. One of the best tools available for this task is the double-agent.

In some cases the handling officer is the recruiting officer. If the recruiting officer first met our double-agent dangle when he was providing the dotting and assessing venues in true name, then the double-agent can provide a positive identification from the beginning. As standard practice, however, the case officer will use an alias in meeting with the double-agent. The double-agent can still provide a detailed description of his or her handler and can often make an identification through a photo spread. Also, since counterintelligence service running the double-agent operation knows when and where the case officer will show up, for example to meet to meet the double agent, to service a dead drop, or to mark a signal, it has technical options to assist in identification. The case officer usually comes from a known pool of officials from the local embassy, consulate, the UN, a trade mission, or some other official installation. Olson claims that it never takes long “to make” who the handler is.

Double-agent operations that go on for an extended period, as many of them do, Olson explains that they will lead usually to additional identifications of hostile intelligence personnel. Case officers rotate regularly to other assignments, and their agents doubled or otherwise, are turned over to a new case officer for handling. Other case officers are sometimes introduced into the operation as a back-up or as a subject expert. The primary case officer may handle the day-to-day operational aspects of the operation but may not have the in-depth knowledge required to debrief the double-agent effectively on a highly technical subject. Olson says it is not uncommon in these cases for intelligence services to insert a more knowledgeable debriefer into an operation from time to time. He continues by explaining that If the primary case officer may not be able to get a surveillance break to pick up a dead drop, for example, or may not have cover to mark or read a given signal. In that event a colleague from the residency is called on to help out–and can be identified by employed cameras or other surveillance techniques nearby. Olson states that in some long term double-agent  operations, as many as twenty or thirty opposition case officers and support personnel have been exposed in this manner.

Olson warns that things get funny when the handling or servicing officer if a double-agent operation is an illegal or nonofficial cover officer (NOC). Case officers in these categories face arrest or imprisonment if caught. For that reason, illegals or NOCs are used carefully and as a rule only handle or support a case in which the bona fides of the operation are considered airtight.

With respect to “Learning the opposition’s intelligence collection requirements”

In what Olson calls “the cat-and-mouse game” of counterintelligence, even the slightest advantage can be the difference between winning and losing. A good double-agent operation can provide a winning edge by alerting the sponsoring service to the opposition’s collection requirements. Knowing what the double-agent is being asked to provide the handler is a valuable window into what the opposition’s priorities and gaps are. A question posed would be “How much pressure is being put on the double-agent to collect intelligence in a certain area?” He says that the range of tasking is limited, of course, to what the double-agent professes his access to be,  but a good double-agent might hint at the possibility if expanded access to smoke out the opposition’s response. For example, a high technology double-agent might tell his handler that his future duties might include research in high technology devices. Olson says the question then would be: “Does the opposition service respond either alacrity or lassitude?” According to Olson, the latter reaction could indicate that this requirement is being covered by another agent.

Olson demonstrates another ploy that can be used to learn the adversary’s collection priorities which was to have a military double-agent, for example, announce to his handler that he is up for reassignment and is about to put in his wish list for a new posting. Olson says the double-agent would be prompted to ask his handler: “Where would the service like him to go?  Where does the service not want him to go? For what kind of bullet should he be applying?” Olson explains that how the handler responds can indicate the services collection priorities and gaps in locations where it thinks it can handle the double agent safely.

Olson further explains that intelligence services do not task their agents haphazardly. The requirements are generated by a systematic process that includes input from all the interested parties. In the US, for example, requirements for the intelligence community result from an elaborate consultation and give and take managed by the Office of the Director of National Intelligence. The process is far from casual. Any intelligence service can learn a lot by analyzing the requirements given to its double agents. There is significant meaning in what the opposition service is asking for and what it is not.

Regarding “Acquiring positive intelligence”

Olson reveals that occasionally, a foreign intelligence service so believes in the trustworthiness of a double agent that it shares with that double-agent positive intelligence information. The purpose may be to give the founder agent background information to assist in his or her collection efforts. Another reason for doing so might be that the case officer-double-agent relationship may become so critical that the case officer assumes the double-agents ironclad loyalty and “talks out of school.” Olson also says a case officer may try to enhance his or her standing with the double-agent by boasting about past or current accomplishments.

With reference to “Tying up the opposition’s operations”

Every minute an opposition case officer spends on a double-agent, proffers Olson, is a wasted minute. The handlers time is wasted. Also tied up in the operation for no productive purpose are technical teams, linguists, surveillance, and analysts. Olson goes on to note that It is perhaps a perverse but still undeniable pleasure for a US counterintelligence officer to sit back to survey his or her double-agent operations and to gloat about owning a big chunk of that adversary’s time and energy. Every useless thing that a foreign intelligence service does in handling one of our double agent operations leaves less time for it to hurt us with real operations. In the great game of counterintelligence, these are gratifying victories.

As to “Taking the oppositions money”

Foreign intelligence services vary tremendously in how much they pay their agents, but Olson admits that with the right kind of material, a good double-agent can command big money. He explains that the willingness of an adversarial service to pay our double-agents large amounts of money is a good indicator of how deeply we have set the hook. 

About “Discrediting the opposition”

Commenting generally, Olson says intelligence services hate to lose face. Enough of them around the world have acquired such bad reputations for violating human rights, torture, other violent acts, and murder, that there is not too much for the many to lose in terms of good standing. They want to project to the world an image of competence, professionalism, toughness and discipline. Olson explains that any publicity that highlights their failures can undermine their support from their government and demoralize their troops. He notes that in closed societies like the Soviet Union, East Germany, China, and Cuba, intelligence services were hardly accountable to the press and public as those of Western democratic societies. However, he maintains that they still did everything they could to protect their reputations. Olson says that the same is true today of our major counterintelligence adversaries.

The US is reluctant to publicize expired double-agent operations out of fear of revealing sensitive methodology or subjecting the American principal of notoriety. In selected cases, Olson states that he would like to see US counterintelligence be more proactive in capitalizing on the other side’s failures. He believes that by doing so the US can make them gun shy about engaging in future operations against its citizens. He asserts that the US could publicize how they fell into our trap and how much they gave away to us in the process. He suggests that once they are lured into operating inside the US, counterintelligence services can do a splashy expulsion of case officers who have diplomatic immunity and arrest those who do not. As a benefit, Olson suggests the hostile service looks bad for letting itself be duped by our double-agent operation, and should pay a price for it. It loses some of its operational staff, its reputation for professionalism suffers. He feels that no mistake by the opposition should go unexploited. 

The People’s Republic of China Minister of State Security, Chen Wenqing (above). Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know.

Suggestions Drawn from Olson’s Precepts

Do Not Fume, Think!

In Greek Mythology, there was Até, an unpredictable figure, not necessarily personified, yet represented rash, chaotic, ruinous responses by both gods and men to a situation. She was famously mentioned in Act 3, Scene 1 of  William Shakespeare’s play The Tragedy of Julius Caesar, when Mark Antony addresses the body of Caesar and predicts civil war: “And Caesar’s spirit ranging for revenge,/ With Até by his side, come hot from hell,/ Shall in these confines, with a monarch’s voice,/ Cry havoc, and let slip the dogs of war.” Até has been described as a chain reaction, a mechanism in which evil succeeds evil. In finding a handle to the current espionage crisis with China, it is not a time for a “gloves off” attitude. Minds should be directed toward getting at the opponent to send a message, to bully or even to overwhelm, The requirement in this situation is subtlety, nuance, thinking, not any heavy-handed business. If any US counterintelligence officer involved cannot sustain that, he or she is working the wrong target. Informed by experience, greatcharlie is aware that it is a predilection among not all young special agents in a particular US counterintelligence service, but some, to be frightfully eager to prove something to their cohorts and to themselves. Ira furor brevis est; animum rege. (Anger is a brief madness; govern your soul (control your emotions)).

Practicing what is compulsory for all investigations in the Chinese crisis is sine qua non. However, if one’s thinking is not yielding satisfactory outcomes, then one must focus upon how and what one thinks. A corrective step must be to concentrate to enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. It is one thing to supposedly see everything–certainly the tools available to US counterintelligence services allow them to see an extraordinary amount of things, but another thing to properly reason from what one sees. US counterintelligence officers must think harder and conceptualize better. They must ruminate on events in relation to those that proceed them and meditate on what the future may bring. They must practice forecasting decisions by their adversary that may shape what might come and then proof their efforts by watching events unfold in reports. 

The question that must beat the brain of every US counterintelligence officer working on the matter is most likely: “Where will they strike next?” As a practical suggestion, the focus of many investigations–if not all investigations–of Chinese intelligence networks send operations might be placed on two points: those controlling networks and running operations in the field; and the composition of operations in the field.

Know Who Controls the Chinese Intelligence Networks

As it was discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” personnel of the Ministry of State Security (MSS), the civilian foreign intelligence service of China, are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for ten years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is near certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army (PLA) and Communist Party of China intelligence units are operating without official cover throughout the West. (Note: The four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders are the United Front Work Department, the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.) Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. They are known to often operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. 

There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial. In a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations. For some time, those provincial and municipal sub-elements performed mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus By the time of Mattis’ writing, they had become small-sized foreign intelligence services. They were given considerable leeway to pursue sources. In Mattis’ view, that independence accounted for variation across the MSS in terms of the quality of individual intelligence officers and operations. At the present, the provincial and municipal state security departments and bureaus may be operating entire networks of their own in the US with appropriate guidance from MSS Headquarters and the Communist Party of China.

There are likely many unexplored possibilities that perhaps should be considered about the managers of Chinese intelligence networks in the US. Anything that can be gathered or inferred about the individuality of such a person must be put forth for study. A constant effort must be made to understand what makes the network manager tick. Using some of what is publicly known about how Chinese intelligence services have been operating in the US from a variety of sources, to include US Department of Justice indictments and criminal complaints, one might conceptualize traits that could be ascribed to those managers possibly on the ground in the US, controlling operations day-to-day, are: energy, enthusiasm, and creativity. Among their traits, one might expect that they would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. That energy is transmitted to US citizens and Chinese émigrés being recruited to serve the purposes of their intelligence services and, of course, the Communist Party of China. There would very likely be the hope among Chinese intelligence services and the Communist Party of China that following the detection of each of their victories by US counterintelligence services there is an opposite effect upon the officers of those organizations. Chinese intelligence services would surely hope that a sense of defeat reaches deep into the psyche of US counterintelligence services rank and file and firmly sets within them a sense of disponding woe, sorrow, and discouragement. They doubtlessly want them to feel gutted.

The managers controlling operations of Chinese foreign intelligence networks in the US have undoubtedly been selected due to their proven mental alertness, quick thinking, adaptability, and curiosity. They surely have the right stuff to be open-minded and imaginative, within authorized parameters, and are willing to adapt. Surprisingly given the iron-grip culture among managers and executives in Beijing, these “field managers” have apparently been given some leeway to use their initiative to achieve progress. It likely accounts for how the Chinese are able to react quickly to any changing circumstances. To an extent, it may also explain why Chinese intelligence services may appear to some to be so disdainful of any danger that US counterintelligence efforts might pose to their operations despite knowing that they are actively being pursued by them by the hour. To be on top of everything, the network managers are likely sharp as a tack and no doubt endlessly study what is known by Chinese intelligence about US counterintelligence tactics, techniques, procedures, and methods, concepts and intent, and the latest counterintelligence tools US counterintelligence has fielded. Among such individuals, a solid foundation of information likely allows for the development of viable inferences and strong insights which in turn allows for confidence in using their intuition on what may come or what is coming their way. These network leaders are also likely able to identify any “bad habits” that may have ever brought US counterintelligence services too close for comfort. 

There remains the possibility that the network manager may not even be located in the US. Still, someone must be present on the ground in the US, to relay, with authority, directions from the manager and respond to inquiries and urgent matters from those operating in the field. It could be the case that they maintain modest lodgings not only to reduce costs and keep a low-profile in general. However, the presumption of a low-profile manager could also be entirely incorrect. It may very well be that they are individuals who have achieved considerable success and prominence in areas such as business and finance. As such, they, as a professional requirement, would both have access to and daily accumulate knowledge far beyond average boundaries of the latest events in industry and government. They would know what is important and urgent, what is moving things forward, what is the next big thing, who and where are the individuals influencing events and how to make contact with them and get connected to all of it. In their fields, they may be among the most capable at doing that and may have the recognition, awards, and the financial benefits that would confirm it. It would appear that they avoid engaging in any surreptitious or malign efforts in their own companies or in their own fields. However, it is still a possibility.

Such prospective network managers would very likely be untainted by any apparent or questionable affiliation with Chinese universities, the PLA, and the Communist Party of China. (That does not mean family members who may reside in China would not be thoroughly connected to such organizations.) If the individuals have family ties back to China, there would be nothing apparent about them that would make them suspicious. They would likely have no overseas travel or contacts that would create suspicion. Doubtlessly, an endless list of notables from their fields might be prepared to vouch for them. All the while, though, they would be managing intelligence operations of their networks in an exquisite fashion, and feeding back information to China vital to US national security and the key to helping US businesses maintain their competitive edge against foreign rivals. (If the manager is situated in the US, oddly enough, there may actually be a number of creative ways to draw out such senior managers of field operations. As aforementioned, greatcharlie will never offer any insights even from its position outside the bureaucracy that it believed might result in any negative outcomes for the US as it seeks to resolve the China crisis. That being stated, as stated in the December 13, 2020 greatcharlie post entitled, “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago,” if one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. Not one case has been a “wilderness of mirrors.”)

Perchance those of a younger generation would say that Chinese intelligence network managers in the US, as described here, as being  “woke,” or as the Germans would say, “wach,” both words roughly refer to them as being awake. In greatcharlie’s view, spying on the US is not woke. Nonetheless, everyday, the network managers place their keen eyes on the world around them and have a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

Perhaps reading this, one might get the impression that greatcharlie was attempting to convince readers that Jupiter himself was running the Chinese intelligence networks. That is surely not the case. However, it must be recognized that the sort controlling those networks are likely of a very special nature. Surely, with regard to politics which is all so important in the regime of the Communist Party of China, one would expect that network managers deployed against the US, despite not having much physical contact with anyone in Beijing, would be the fair-haired boys or gals among one or more of the senior executives in MSS or even a senior leader of the Party, itself. 

Whatever any US counterintelligence service may attempt to do in an effort to break Chinese intelligence operations, its officers must be mindful that this may likely be the sort of individual they are seeking to maneuver against. Without the ability to get up close to these managers, it might be enough to conceptualize them, given the pattern of activity and interrogations of intercepted officers, operatives, and informants and reinterviewing the handful of “recent” defectors in US hands. (It is wholly plausible that the officers, operatives, and informants working in the US have never seen and do not know the identity of their network manager on the ground. They may only recognize the individual by code via orders, rectifications, responses to inquiries and requests, and inspirational messages.) If the abstract entity, de créature imaginaire, constructed here is, by coincidence, correct in every particular, there may be the rudiments to get started on trying to “steal a march” on perhaps a few of the Chinese intelligence network managers. Shaping one’s thinking against thinking and conceptualized tratits of de créature imaginaire, may be enough to open new doors. Perhaps in time, such in-depth study of these aspects will allow informed counterintelligence officers to develop true intimations, not valueless surmisals or absurd speculation, of what may be occurring and what is about to occur. In “A Story of Great Love,” published in the Winter 2011 edition of the Paris Review, Clarice Lispector writes a sentence that is amusing yet conceptually germane to what is discussed here: “Once upon a time there was a girl who spent so much time looking at her hens that she came to understand their souls and their desires intimately.”

The People’s Republic of China Consulate in Houston (above). From this now closed building, China directed government, economic, and cultural activity across the southern US. Ministry of State Security (MSS) personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations.

Discover the Composition of Network Operations

One might suppose the Chinese intelligence networks in the US, as a primary purpose, unlikely conduct operations in which they blithely seek out new targets day-after-day, although there are perhaps some operations underway that serve to monitor individuals in positions that might be interest and sites of information of interest with the guidance of MSS headquarters, provincial bureaus and municipal departments based on available intelligence. The settled, more fruitful networks that have nettled US counterintelligence services the most are likely set up to run operations on targets of a certain type, rich with prospects at locations in  which Chinese intelligence operatives and informants are well ensconced. One could reasonably expect that there will be a commonality in location for both predator and prey. (Although, nothing can really be certain for espionage is a deke business.) The Chinese intelligence operation will be set up in proximity of a figurative “happy hunting ground,” a high-tech firm, laboratory, academia, political network, foreign, national security, economic, trade policymaking office, agribusiness, and aviation, and energy business to list only a handful. In addition to propinquity, there will be a common functionality of any Chinese owned business that may establish themselves in the hunting ground, and very apparent efforts to create employee links by them with their likely targets. 

Control remains essential in the authoritarian (totalitarian) regime of the Communist Party of China and therefore there is a certain specificity intrinsic to every operation–despite nuance in design, methods, and other imaginative approaches attendant–that will presumably allow for monitoring, oversight, and audits. If it ever was detected that an odd Chinese intelligence network was skillfully mixing tactics, techniques, procedures, and methods in operations conducted following an aggregate rollup of known Chinese intelligence efforts in the US, it is unlikely that particular network’s approach, while perhaps creative to the extent possible, will never stray too far from any observances that would be laid down by their respective Chinese intelligence services. If the tactics, techniques, procedures, and methods used by Chinese intelligence networks are really so similar, one could say their operations will likely have a common “DNA.” The adversary’s known practices are undoubtedly cataloged by US counterintelligence services. It will be necessary to more closely study the common functionality of networks and operations. As much information on their operations must be collected as possible. Study what has been learned by allies. Identify common vulnerabilities in every network. Identify, study, and exploit their deficiencies.

As much of what the networks Chinese intelligence services are exactly doing day-to-day in the US remains unknown publicly at least, it is impossible to say with certainty how the COVID-19 pandemic has impacted their operations. One can imagine there has been some impact. Nevertheless, given that reality, in considering how COVID-19 factors into their efforts, one must again enter the world of supposition in which one analysis of how those networks are not only operating, but more specifically, how managers of those networks are communicating with Beijing and with their officers, operatives, and informants, can be just as good as another.

Even before COVID-19 hit, for Chinese intelligence networks on the ground in the US, managing communications in any direction was imaginably no mean feat. As it was discussed in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).” Perhaps, the main lesson for Chinese intelligence services was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. 

One might venture to say that a likely move to hard documents may have been evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

From what is publicly known, it appears that Chinese intelligence networks do not recruit after simply spotting a potential operative or informant. If that were the case, the success rate of US counterintelligence services against them would be far higher given the opportunities such activities would present and given the experience of their organizations in dealing with such a basic set up. Chinese intelligence services clearly work wholly on their own terms, investigating only those “targets” who they choose to investigate, essentially ignoring anyone that may have the slightest appearance of being dangled before them. It is a benefit for them to operate in what could be called a target rich environment in the US. Recruitment is “by invitation only.” If one is not on the figurative guest list, one does not get in! As part of their investigations of targets for recruitment, doubtlessly it is important to identify the psychological profile of a person, his political orientation, his attitude towards his motherland, China or towards the US, where he or she has become a citizen or visiting for school or long-term employment. And then, after accumulating a sizable amount of material (based on a whole array of undertakings: plain observation, audio- and video-surveillance of the places of residence, agency-level scrutiny, including “honey traps”), on the basis of the analysis, a decision is made about a transforming the investigation into a recruitment with appropriate conditions (such as through compromising materials or a voluntary agreement) or about wrapping up the whole matter by “educating” a foreigner, conveying a favorable message on China and the wave of the future, Chairman Mao Zedong’s vision of Communism.

After studying what is being specifically done by a network long enough, one will begin to see dimly what a network or specific operation is driving at. After finding a few missing links, an entirely connected case will not always, but can be obtained. Once a clear picture emerges, one can start developing attack vectors against Chinese intelligence networks with a forecast of nearly assured fruits. Lately, the identification and aim at any networks has clearly been far less than accurate. Do not use individuals lacking good judgment and sanguine required based on one’s own standard. Create the best team possible. Know your people well. Keep a close eye on neophytes. (As touched on in the discussion of Olson’s “Ten Commandments of Counterintelligence” of Chapter Four in greatcharlie’s review of To Catch a Spy, a supposition verging on the ridiculous must be seen as such by a supervisor and appropriately knocked down. A keen interest must be kept on how subordinates, especially novices, are reasoning with facts. A supposition verging on the ridiculous might involve imputing criminal motive or involvement on a party that could not have been part of a criminal conspiracy or ascribing characteristics to an individual who could not possibly possess them or has not displayed them. A good case could be blighted by such wrongheadedness.)

Gnawing a bit further at the matter of using young, novice counterintelligence officers on such delicate cases concerning Chinese intelligence, one should avoid the pitfall of allowing them to manage surveillance work for a case and turn it into something that might more reflect the work of a security service in a totalitarian country to soothe their egos. Be mindful of the use of time, energy, and budget by them such as placing heavy, wasteful surveillance on the street not to advance the casework but to prove some immature point of power. Casting some wide net will bring in nothing but a lot of extra things that time, energy and money cannot be wasted upon. Differ nothing to their judgment. Every mistake or misstep made by US counterintelligence, whether the result of a manager’s use of some clever misdirection or whether self-inflicted, represents a success for a Chinese intelligence network manager. Keep firmly in mind the managers of Chinese intelligence networks are flexible enough in their thinking that they appear to be able to change horses in midstream while maintaining the metaphoric helm on a steady heading so to speak. 

Concerning contractors, by their nature, they are owned and managed by businessmen out to make money as priority. That focus among many of them can be boiled down to the  precept, “minimum effort, maximum gain” and that can be most apparent in how they conduct their so-called operations on the street. As already alluded to here, their “operatives,” often poorly vetted before being “hired,” many times find it difficult in the field, physically surveilling a target or trying to open a clandestine conversation, to be their higher selves. They are often too aggressive, even ruthless, and engage in what could politely be called “aberrant behavior.” Strangely enough, for many contractors, the reality that their operatives display these characteristics is a point of pride.. As it was discussed in greatcharlie’s January 31, 2020 review of To Catch a Spy, the negative behavior of contractors witnessed in the field by an adversarial intelligence service’s officers, operatives, and informants could very likely have an impact on their impressions of US counterintelligence services beyond what has already been inculcated within them by their masters. It should be expected that any negative impressions could have the deleterious effect of negatively impacting a decision to defect or be recruited if the idea might ever cross their minds. It is impossible to calculate, but it surely can be imagined that a number of potential defectors and recruits may have been deterred from taking the first step over this very issue. Recognizably, there is a reduced ability to effectively oversee what contractors are doing at all times on behalf of US counterintelligence services. At best, the managers of a particular counterintelligence operation that they may be hired to support will only know what the contractors divulge about their efforts. Close observance of them in operation, done furtively by managers of US counterintelligence services, would doubtlessly substantiate this.

Those in US counterintelligence services considering what is noted here might cast their minds back to the observation of the renowned 17th century French philosopher Blaise Pascal in Pensées (1670): “Justice without power is inefficient; power without justice is tyranny. Justice without power is opposed, because there are always wicked men. Power without justice is soon questioned. Justice and power must therefore be brought together, so that whatever is just may be powerful, and whatever is powerful may be just.”

Surely at one time the relationship between contractors and US counterintelligence services was quite beneficial as they provided real assistance through manpower and talent, but again, the situation has since changed considerably. They are shadows of what they once were in terms of quality.  Beyond some possible invaluable assistance they may be providing through precious outside of the bureaucracy analysis and advice on Chinese intelligence activities in the US, in the China case, US counterintelligence services should severely minimize or eliminate contractors if possible. There may be a place for such contractors and their ways in counternarcotics, organized crime control, human-trafficking or some other kind of criminal investigations. However, up against the sophisticated intelligence services of a determined adversary as China, those contractors are not a credit to US counterintelligence services. They are nothing but a liability. The China case is too important to indulge in any uncertainties. On an additional point, technical intelligence tools must be utilized effectively and appropriately. Monitor only those who need to be monitored. Resist the urge to play George Orwell’s “Big Brother.” That urge is another weakness. Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.)

The continued success Chinese intelligence services and counterintelligence services in being able to conceal their massive espionage efforts may suggest that conceptually, they may approach establishing their presence in the US with the thought of “peacefully coexisting” in the same environment as US counterintelligence services. The relationship that they seem to have sought with US counterintelligence services in order to ensure the security of their networks and operations is not “cat and mouse” or combative. It is strangely, but logically, symbiotic. 

That symbiotic relationship, however, is malignant, and designed to be parasitical. To that end, managers of Chinese intelligence and counterintelligence services in the US likely respond to any detection of the presence of US counterintelligence personnel or activity not by avoiding them, but by connecting in some smart way to them. Connecting to them, to give a couple of simple examples means having operatives work for a contractor engaged in physical surveillance, or take on low level employment in or around offices of those contractors. From such positions and similar ones, they would enable themselves to monitor the most well-orchestrated, well-conducted activities from the inside. Some operatives, finding work as operatives in the agencies of contractors for US counterintelligence services  could actually become, and have very likely actually been, part of those operations. Note that operatives of Chinese foreign intelligence and counterintelligence services directed to get close to US counterintelligence services personnel and activities may not necessarily be ethnic Chinese. (For a fuller discussion of that matter, see the July 31, 2020 greatcharlie post “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”) Such a precaution would likely be deemed less necessary by managers of Chinese foreign intelligence and counterintelligence services for operatives placed within or close proximity of contractors offices and personnel as those managers have likely become well-aware of the astonishing lack of due diligence and security practiced by them. Surely, US counterintelligence activities of greatest interest would be those against Chinese foreign intelligence networks and operations. However, there would undoubtedly be significant and considerable value in being aware of physical surveillance activities by US counterintelligence services against the other adversaries of those services. There is every reason to believe cooperative relationships exist among the intelligence services of US adversaries. To say the least, there would be some monetary value in information collected by China of that kind.

Much as some parasites, those operatives who might successfully penetrate any organizations of or pertaining to US counterintelligence services would never act directly  to destroy those personnel or organizations but would rather only nourish themselves off  of them by collecting critical information from them for the security and survival of Chinese Intelligence activities in the US. Reminding again of what might be called Olson’s maxim from To Catch a Spy, “Penetration is the best counterintelligence.” One can almost be certain that senior executives and managers in adversarial foreign intelligence services surely believe that, too! That is something for US counterintelligence services to be very concerned about.

With regard to working with quantitative data, broken down to the essentials, it must continually be used to keep US counterintelligence officers cognizant and well appraised of activity by confirmed Chinese intelligence officers, operatives, and informants tied to diplomatic missions. With quantitative data, users ought to drill down on data concerning their daily and hourly activity from communications to commuting. One must be able to discern even the slightest changes in activity, whether increased or decreased. Data should be reviewed daily to identify the slightest changes from the aggregate numbers. Revisiting data that has already been rolled up and aggregated is also advised. It should be mined through for more details, clues. (One should never get so caught up with data to believe that an opponent’s actions can be reduced to an algorithm. The opposition’s leaders are living, breathing, agile, flexible and–despite working in Communist China–potentially unconventional thinkers.)

Getting Results

Measures of success of the practices suggested here may hopefully be a marked increased prospective opportunities to: neutralize; displace; and, intercept, even recruit, from a targeted Chinese intelligence network.

1. Displace

If the purpose of US counterintelligence is to displace a Chinese intelligence network or operation, the rapid shutdown of an operation would be a sign of success in that endeavor. The threat of intercept or the very public revelation that an officer, operative, or informant in the network has been apprehended would naturally spur such an action. If the environment is made hot enough for the network, its managers and the remainder of their string of officers, operatives, and informants will indubitably go to ground with the hope of resurrecting their network with its diffuse operations at a more favorable point in time. However, if an operation has packed up and moved out, there will be a palpable change in the working atmosphere for the counterintelligence officer who has had their noses to grindstone working the case. In a frenzied rush to exit the US, individual suspected Chinese intelligence officers, working in academia or industry, in physical isolation from their compatriots, or ones that may appear to be operating independently and farthest away from their network compatriots and resources, may no longer see the need to carry on with any pretenses. It is also interesting to see that there is never mention of any effort by Chinese intelligence officers, operatives, or informants to figuratively throw dust in the eyes of those investigating, plant false leads or use other means to misdirect, as they make their escape.

Interviews can be used as a psychological tool to prompt displacement. For the network manager who is logical, visits to the residence or workplace of a subject of investigation by US counterintelligence officer to invite them for an interview in the respective office of their service, or to interview them at that location, may be viewed as probing based on some insight possessed by the adversary. There is the odd chance a network manager might believe a US counterintelligence service was on to something. However, it would seem they would more likely think a US counterintelligence service would “hold its cards a little closer” if it had something solid to act on. If the network manager is thinking in that way, it would mean  he or she has been trying to see through all things cooked up by US counterintelligence. Surely, for the Chinese intelligence  services as much as those of the US, studying their oppositions modus operandi is as important a task as anything else.

Operatives and informants, on the other hand, may become jittery. However, such a visit may not unnerve the network manager. The reaction of a network manager may be no visible  reaction at all. He or she will likely continually display nerve and knowledge. The possibility of such interviews has likely already crossed the managers mind. The network manager has likely already assessed how officers, operatives, and informants in his or her retinue will act or react when approached. The task of the network manager will be to deduce what triggered the interview, reason from cause to effect what is the likely course of events to follow, and act accordingly. That being stated, activities and especially the communications of those approached for interviews must be monitored. New travel plans by individuals with some association to those interviewed, scheduled closely by date, must be examined.

2. Neutralize

To assist in determining where to interdict, stand up a “Red Team” on a non-stop basis, using templates properly constructed from everything known and insights and inferences on Chinese operations and to continue to build up a legend for de créature imaginaire with the objective of achieving increasing accuracy. Among tools that should be made available for use in neutralizing Chinese intelligence officers, operatives, and informants, should be heavy financial rewards for “coming forward”; and whistle-blower-like protections. Casting one’s mind back to the “Chieu Hoi” program used to contend with the Viet Cong during the Vietnam War, US counterintelligence services, using an approach certainly not the same but conceptually similar to that, may very well be able net a few long-time operatives and informants of China see intelligence services with deep involvement in their efforts, who may have had their fill of the whole business and want to get out, but safely. Cela n’a rien d’évident. (The fact that the Chieu Hoi program was implemented in an Asian country is purely coincidental. No deliberate connection regarding a region, race, or political philosophy was made. The parallel is that much as the Viet Cong, Chinese foreign intelligence officers in particular, but any operatives and informants as well are often “true believers,” who act out of conviction. Similar to the Viet Cong, they are driven by a deep-seeded ideology. In their unique case, it is usually the erroneous belief that China is the champion of the oppressed and will become the dominant power in the world.) In case the point has been misunderstood, heavy financial rewards for them would mean steep rewards. Ideally, the result will be to threaten the rewards structure, financial and psychological, of the Chinese foreign intelligence and counterintelligence services. If money would not be the elixir to turn any Chinese intelligence officers, operatives, or informants, US counterintelligence services would only need to pose the question to themselves: Deployed to the US and caught in the business of spying, what else would truly satisfy them enough to cause them to  defect or to become a double? If the situation becomes desperate enough, ask the targeted Chinese intelligence officer, operative, or informant: “What do you want? Name it!” (In other words, at least to get things moving, do whatever it takes, but within reason!) Turning Chinese operatives and informants should ideally take on the appearance of something akin to a business enterprise while actually being a counterintelligence task, if successful. Cela encore n’a rien d’évident. (Note, however, that money can become poisonous in both directions, creating temptation among those in service ranks unfortunately disposed to transgressions. Therefore, its distribution must be very carefully supervised.)

To be succinct, the hope of US counterintelligence should be to come in contact with an officer, operative, or informant with an albeit idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. Pretio parata vincitur pretio fides. (Fidelity bought by money is overcome by money)

3. Intercept

Non capiunt lepores tympana rauca leves. (Drumming is not the way to catch a hare.) This could be entirely off the mark, but it appears that aggressive counterintelligence appears to have been directed at targets of opportunity versus the industry-centric networks of Chinese intelligence in the US. While there may be a meretricious benefit to this practice, it accomplishes nothing in terms of tearing down Chinese intelligence networks or smothering greater espionage operations. Again, elevated thinking is required. There must be an inflexion point at which US counterintelligence services become the fox, and the days of being the chicken come to an end. Better use must be made of tools available and good practices. There must be better use of deception. To lure Chinese intelligence networks into traps, network managers and higher ups in the Chinese system must be convinced that the figurative cheese in the trap is something worth the risk of trying to take. Psychological operations must be used to draw them closer to targets US counterintelligence can cover while remaining concealed. As part of the information warfare campaign with China, an effort must be made to surreptitiously “assist” Beijing in discovering a novel target worth pursuing. Chinese intelligence services have enjoyed a halcion season of success. They apparently have no intention of being thrown off their pace and streak of victories by what they in all likelihood suspect are attempts by US counterintelligence to score a victory against their effort during their moment of glory.

US counterintelligence officers must do their utmost to go beyond the normal scope in determining what will attract Chinese intelligence network managers. They must not proceed by pretending to know. There is no room for guesswork. Approaches developed must not be derivative. They must put as much time as necessary into developing them to become as certain as humanly possible that any new approaches will work. Any enticement or manipulation must not give off any indication of being a plant nor chicken feed. It must appear as genuine gold dust. Under extremely controlled circumstances, it may need to be actual gold dust! What is left is to wait for the network to show itself. There is nothing else to do otherwise. Efforts to stoke or prompt the adversary will lead to blowing the entire set up. Impatience is what the Chinese will look for because that is what every other foreign intelligence service expects of US counterintelligence.

Logically, it would be a capital mistake for Chinese Intelligence services to adulterate what could likely be characterized as an operation in which every aspect was well-known with individuals of ultimately unknown character, loyalties, or reliability and targets of likely no immediate unknown value and of no prior interest or desire. As senior executives and managers in Beijing might assess, if anything suddenly put before them was truly of any immediate value or desirable to China, the individuals or the information would have respectively been recruited or stolen already. Assuredly, that is the pinch for US counterintelligence services when it comes to getting decent double-agent operation off the ground.

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, offers the statement in The Honourable Schoolboy (Alfred A. Knopf, 1977): “A desk is a dangerous place from which to view the world.” US counterintelligence officers must be mindful of what may be perceived in the conference room as an advantage over the opposition intelligence network manager may be the ugly product of groupthink. They must judge perceptions in view of what is  actually known about that opponent, even if he or she remains de créature imaginaire and how that manager may act in response to what they plan to put in his or her way. Use of aggressive tactics or overwhelming superiority can be turned into a liability by an agile thinker. It is also important to understand that no matter how the Chinese intelligence network or operation may be approached, everything done, particularly if successful, will be studied by superiors in Beijing so that all gaps that may have been exploited in a disrupted, displaced, or destroyed network will be rapidly and quietly set right in all remaining networks. Operational missteps that might have been exploited will be identified and never made again. (Be observant for changes in practices among networks and operations being traced.) In view of what Beijing may learn from an initial attack, adjustments in the next US counterintelligence strike against a Chinese intelligence network or operation must be considered even before the first is executed. In a cycle, this approach to attacking Chinese intelligence networks and operations must be adjusted for each new situation and repeated.

To go a step further, one might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them. 

It is unlikely that the senior executives and managers of Chinese foreign Intelligence services are sitting back and gloating about their victories. Rather, it is very likely that everyday they work harder and harder to make their networks and operations better and more effective, pushing their espionage capabilities far-beyond the reach of the counterintelligence services of the countries in which they operate. All of that being said, one might still imagine that soon enough, in a gesture aimed at figuratively putting some dirt in the eyes of US counterintelligence services, the Chinese foreign intelligence services may spend some hours planning some upheaval that their networks could cause in the US to embarrass US counterintelligence services. It would imaginably be designed to knock them well-off track and symbolically mark China’s domination of their opponent on his own home ground. China would also be sending a message concerning its dominance throughout the espionage world. Of course, despite its meretricious effect, whatever such a potential ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would feel enabled to plausibly deny China’s connection to the action. (These are only some thoughts, ruminations, on the situation. Hopefully, this should not cause any undue concern. Or, cela n’a rien d’évident.)

The Chinese have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. To that extent, it is unlikely Beijing wants its intelligence services reaching after anything when their plates are already full follow up on leads they created for themselves. It is possible that the Chinese foreign intelligence services have never seen US counterintelligence services get anything substantial started against their networks in terms of penetration. However, the Chinese will unlikely mistake quiet for security. They probably never really feel secure in the US. It is hard to imagine what might ever be worth the candle to Chinese intelligence services to reach after. Assuredly, impatience in any US operation would be anathema.

People’s Republic of China President Xi Jinping (above). Given the success of Chinese intelligence services in the US, China might soon enough choose to send a message to symbolically mark China’s domination of their opponent on his own home ground. and its dominance in the espionage world. Chinese foreign intelligence services operating in the US may spend some time planning an upheaval that would figuratively put some dirt in the eyes of US counterintelligence services. Despite any meretricious effect such an act might have, whatever such a potential deplorable ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would be able to plausibly deny their connection to the action.

The Way Forward

Month after month, US counterintelligence services discover another set of occasions when China has incommoded a federal agency, a private firm, an academic institution, or research institute by stealing from them classified information or intellectual property most often vital to the national interest. Leave it to say, having engaged in an empirical study of public facts coming in what has been transpiring, the potential trajectory of China’s malign efforts is breathtaking. By 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. However, that is not the case. Perhaps in some allied country, success against China will be achieved showing US counterintelligence services the way forward. With a long history of successfully defending the United Kingdom from foreign spies, it may very well be that MI5 will not have the Cabinet, the Prime Minister, the exalted person herself, wait much longer for good news.

Whether this essay for some will cause a journey from unawareness, curiosity, or a lack of clarity to knowledge, remains to be seen. There has been more than enough talk about how bad the problem with China is. That becomes by the by. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and take the game back to China and destroy all of its networks. It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. In a very small way here, greatcharlie has sought to contribute to development more effective approaches to defeat Chinese intelligence collection efforts in the US. Before writing this essay, greatcharlie fully understood and accepted that there are those singular US counterintelligence services that would be completely uninterested in, and even shun, any voice or meditations from outside the bureaucracy that would dare offer assistance to them in their struggle with China’s intelligence services. (It must be stated that greatcharlie has either been retained to supply any imaginable deficiencies of US counterintelligence services nor has it been retained for anything by any of them.) Often in the US national security bureaucracy, perspectives on adversaries can become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, as suggested,, perhaps an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with Chinese foreign intelligence activity in the US.

With a near endless chain of losses, the following theft sometimes being a greater defeat than the one proceeding it, greatcharlie feels compelled to ingeminate the position expressed in the conclusion of its August 31, 2020 greatcharlie post US counterintelligence services should consider hiring individuals from outside the bureaucracy who are already known due to demonstrated interest in the subject matter and recognized as possessing some ability to present what may be unorthodox innovative, forward-looking perspectives. New thinkers can rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Thinking outside the bureaucracy would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. 

The suggestion should not seem so exotic at this point. Even the adversaries of the US would likely imagine the possibility that some assistance from an unexpected source and direction could pose the greatest threat to their success. Perhaps some US counterintelligence services will never brook the idea of receiving such assistance from outside the bureaucracy. However, in the end, the US counterintelligence service which opens itself up to new, thinking, new insights, new approaches, will very likely bag its tiger. Vigilando, agendo, bene consulendo, prospera omnia cedunt. (By watching, by doing, by consulting well, these things yield all things prosperous.)

Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)

In a nine-count US Deparment of Justice indictment filed in an Atlanta federal court in 2017, the four members of the People’s Liberation Army (PLA) in the FBI poster above were accused of hacking into the Equifax credit reporting agency’s systems, creating a massive data breach that compromised the personal information, including Social Security numbers and birth dates, of about 145 million people, nearly half of all US citizens. There is little need but for citizens to read reports in the news media to know foreign intelligence services were operating inside and outside the US with the intention of causing the country great harm. In To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), James Olson places the efforts of dangerous foreign forces front and center. He explains the efforts being taken by US counterintelligence services to unthread the complicated nature of foreign intelligence activities in the US and drive away the dangers they pose.

There is little need but for US citizens to read reports in the news media to know foreign intelligence services were operating inside and outside their country with the intention of causing the country great harm. In To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), James Olson places the efforts of dangerous foreign forces front and center. However, more importantly, Olson explains the efforts being taken by US counterintelligence services to unthread the complicated nature of foreign intelligence activities in the US and drive away the dangers they pose. As the former chief of Counterintelligence for the Central Intelligence Agency (CIA), Olson is eminently fitted to represent US counterintelligence officers and present their work. In defining counterintelligence, Olson states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” Reportedly, over the years 80 countries, to include allies and friends, have engaged in espionage operations against the US.

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use aggression and force to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so.

From what Olson explains, counterintelligence organizations worldwide must detect necessary attributes of an actor, certain indicia, before initiating a counterintelligence investigation on a suspected “foreign spy” or operative or informant or  foreign intelligence service. The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. That process may not always be easy going. A foreign intelligence officer’s tradecraft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some. Counterintelligence may very well be the greatest manifestation of the paranoia business.

Regarding his career, again, for over thirty-one years, Olson served in the Directorate of Operations of the CIA, mostly overseas in clandestine operations. He was deployed overseas for several assignments, and eventually became chief of counterintelligence at CIA headquarters in Langley, Virginia. At the time he wrote To Catch a Spy, he was retired and working as a Professor of the Practice at the Bush School of Government and Public Service of Texas A&M University. Robert Gates, the former Director of Central Intelligence, 1991-1993 remarked about Olson: “James Olson is a legend in the clandestine service, having served in some of the most difficult, dangerous, and complicated assignments at the height of the Cold War. As director of Central Intelligence, I trusted him without reservation when he was chief of counterintelligence not only because he was enormously capable but also because I knew he thought deeply about the ethical and moral dimensions of what we did every day. Amid the countless books and memoirs of retired spies, especially at this time, this one is essential reading.” Olson was born and raised in Iowa. He studied mathematics and economics at the University of Iowa. Following college, he took a commission in the US Navy, serving aboard guided missiles destroyers and frigates. After a period, he would return to Iowa to study law at the University of Iowa. Apparently, Olson had every intention of practicing law in a small county seat town in Iowa. However, the CIA approached him and invited me to apply for a position in the clandestine service.That us when the story of his life in counterintelligence began.

This book has immediate historic significance because Olson is recognized as an authority among intelligence circles worldwide. There are not so many that have been written so well by former professionals. While others may have their preferences, three of special note and highly recommended by greatcharlie are: Raymond Batvinis, Hoover’s Secret War Against Axis Spies: FBI Counterespionage During World War II (University Press of Kansas, 2014); David Martin, Wilderness of Mirrors (HarperCollins, 1980); and, Scott Carmichael’s True Believer: Inside the Investigation and Capture of Ana Montes, Cuba’s Master Spy 1st ed. (Naval Institute Press, 2007) which Olson refers to in To Catch a Spy.

In Hoover’s Secret War Against Axis Spies–reviewed by greatcharlie on April 30, 2014, the historian, Batvinis, a former Federal Bureau of Investigation (FBI) special agent, presents a crucial chapter in the history of World War II during which the FBI really began and refined its counterintelligence mission. He discusses the FBI’s then new reliance on intrusive investigative techniques (wiretaps bugs, access to bank and financial transaction records), and the evolution of the Bureau’s liaison relations with the British, Canadian, and US military intelligence agencies. (In a proceeding book, his acclaimed, Origins of FBI Counterintelligence (University of Kansas, 2007), Batvinis went off from scratch to tell the reader about the situation.) In Wilderness of Mirrors, Martin tells the story of how an ex-FBI agent William “King” Harvey identified the notorious Soviet double agent Kim Philby in conjunction with James Jesus Angleton, the CIA’s chief of counterintelligence responded to the betrayal of family friend Philby’s betrayal and descends into a paranoid wilderness of mirrors. Wilderness of Mirrors set a benchmark for studies, memoirs, and all other written works on US counterintelligence. It was once required reading for some intelligence professionals–and perhaps it still is. The author of True Believer, Carmichael, was a senior security and counterintelligence investigator for the Defense Intelligence Agency and the lead agent on the successful spy hunt that led to Ana Montes. He provides an inside account of how his espionage investigation, with the eventual help of the FBI, progressed over a period of several years to develop a solid case against Montes. She is the only member of the US intelligence community ever convicted of espionage for the Cuban government. Every twist and turn is all the more intriguing as truths become lies and unlikely scenarios are revealed as reality.

To Catch a Spy is not Olson’s first book. He is also the author of Fair Play: The Moral Dilemmas of Spying (Potomac Books, 2006) Fair Play examines ethical challenges facing US intelligence officers as they attempt to operate within a standard of acceptable moral behavior. That examination is couched in an insightful summary of intelligence history through fifty reality-based scenarios.

To Catch a Spy, 248 pages in length, was released by Georgetown University Press on April 11, 2019. Since then, many others have already formed their own opinion of Olson and his work. For those who may excavate through To Catch a Spy to thoroughly consider points of exposition concerning both himself and activities in which he was engaged, the book has doubtlessly been substantially edifying. The reader is provided with an amazing opportunity to see it all through the prism of a master craftsman as he discusses his profession. Indeed, as with Fair Play, everything Olson provides in To Catch a Spy is founded on his experience during a lengthy career in US counterintelligence. Nevertheless, To Catch a Spy is not a memoir of his life or of his career. That has yet to be written, and perhaps may not be. Still, if one were to go off anyway and measure Olson’s book against the memoirs of Cold War Soviet, Eastern Bloc adversaries of the US there is a decided difference. Those memoirs have a tendency to be anecdote laden, picturesque and exciting. While those who have professionally analyzed them judge them as omitting much, their books typically provide enough nuance to allow for extrapolation, inference, and conceptualization of their tactics, techniques, procedures, and methods. They also often point to their bad choices, pitfalls and ways to minimize losses after encountering them, commonplace wrong turns and remedies to them. That is really what the neophyte needs to receive most.

The author of To Catch a Spy, James Olson (above). Olson is eminently fitted to represent US counterintelligence officers and present their work. For over thirty-one years, Olson served in the Directorate of Operations of the Central Intelligence Agency (CIA), mostly overseas in clandestine operations. He was deployed overseas for several assignments, and eventually became chief of counterintelligence at CIA headquarters in Langley, Virginia. In defining counterintelligence, Olson states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” Reportedly, over the years 80 countries, to include allies and friends, have engaged in espionage operations against the US.

Surely for readers thrilled by spy novels, there was enough provided by Olson to allow them to live vicariously through his anecdotes. In the genre of fiction and nonfiction spy stories, there is an artistic milieu in which–often under the demands of publishers who are intensely interested in selling books–writers seek to position themselves amidst. It cannot be denied that human nature instinctively finds entertainment more compelling than edification. Perhaps even among them, there may be some who will decide after reading To Catch a Spy, that there is nothing so outré about counterintelligence. However, often things seem simple once they have been explained.

Among professionals, not only in the US, but worldwide, To Catch a Spy was likely anticipated with baited breath. That stands to reason that this category of reader would be aware that Olson possesses a huge body of thoughts that most US counterintelligence officers on the job today. There was considerable satisfaction among professionals with his first book, Fair Play. They could have only imagined that To Catch a Spy would be another gem. One might perceive while reading To Catch a Spy that Olson subtly takes on the role of instructor, introducing somewhat nuanced details about certain matters in his lecture as if he were trying to impart the full benefit of his experience to prescient, young CIA counterintelligence officers. To that extent that he does all of this, there is a trace of something akin to a pedagogy for developing the reader’s understanding of the world he is moving them through. A quote widely attributed to one of the most influential artists of the 20th century, Pablo Picasso: “Learn the rules like a pro so you can break them like an artist.” To that extent, novice US counterintelligence officers must master the fundamentals, and the foundation will be laid to explore one’s potential with confidence and an assured step with knowledge and experience of those who came before.

One might expect copies of To Catch a Spy, that may be possessed by US counterintelligence officers from the various services, are treasured and well thumbed. Spotted among reviews of the book on Amazon.com are comments from US intelligence officers in which they attest to the value, positive impact To Catch a Spy had on their thinking and their work. Alex J. Vega IV, Joint Counterintelligence Training Activity (JCITA), Defense Intelligence Agency, and Former U.S. Army Attaché, U.S. Embassy, Moscow, Russia wrote: “Jim Olson has shared with us his accumulated wisdom, lessons learned, and roadmap for the future. To Catch a Spy is the new U.S. counterintelligence standard. It is a must read for serious professionals and anyone interested in the spy world. Jim has done a tremendous service, not only to our generation, but also to those of the next who choose to answer the call to join the counterintelligence battle.” Henry A. Crumpton, a twenty-four-year CIA veteran, author of The Art of Intelligence: Lessons from a Life in the CIA’ s Clandestine Service (Penguin Press, 2012), and CEO of Crumpton Group LLC. remarked: “The author, America’s counterintelligence guru, has crafted a remarkable, indispensable book rich in heartbreaking detail and sharp analysis–serving as a clarion call for a stronger response to the unrelenting, sophisticated, and successful foreign espionage assault on our nation.” Robert M. Gates, Director of Central Intelligence, 1991-1993, stated: “Amid the countless books and memoirs of retired spies, especially at this time, this one is essential reading.”

One could safely state that To Catch a Spy has not been everyone’s cup of tea. Despite such glowing expressions of satisfaction and appreciation, there is a view of the book in which it is asserted that Olson really did not dig down so deep on issues in the text to display his full capabilities as a counterintelligence thinker. He could hardly be so profound, or candid at all. Some professionals worldwide who may have acquired a copy of To Catch a Spy were disappointed when they discovered that the text is not heavy with inferences and insights, and analysis supported by references. In fact, such are rather sparse in the book. In Mark Soares’ review of the book in the scholarly journal Intelligence and National Security, (Mark Soares (2020) To Catch a Spy: The Art of Counterintelligence, Intelligence and National Security, 35:7, 1079-1081, DOI: 10.1080/02684527.2020.1746125), he begins by saying: “James M. Olson has written a deeply personal composition of his extensive career to counterintelligence with the Central Intelligence Agency  (CIA) using a loose and relaxed format not typically seen in intelligence literature.” Explaining Olson’s purpose in writing the book, Soares remarked: “To Catch a Spy serves as Olson’s caution to future US intelligence practitioners and to his country as a whole to pay far more attention to counterintelligence matters rather than focusing all efforts on collection.” However, Soares would eventually judge the book critically, stating: “Though To Catch a Spy is undoubtedly an entertaining read, scholars and academics will be disappointed by the absence of references, with Olson opting instead to use informal notes to add background details to organizations,  individuals, tradecraft terms, or historical events mentioned in the book (pp. 203-217). Many of the events described by Olson could have been referenced more properly given the abundance of information available on such topics.”

For security reasons, Olson admits to having doffed his cap to his former employer so to speak by submitting To Catch a Spy to his former employer, CIA, for review. It is a requirement for officials from the US Intelligence Community with backgrounds as Olson. In Olson’s case, his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any information that would provide some nuance on how the US detects and catches spies would be of the utmost interest and importance to the foreign intelligence services of adversaries as well as allies. One can only imagine an individual with his wealth of knowledge is holding back considering how much more he could have potentially ruminated upon in the book. Under such circumstances, it is understandable that Olson’s lack of profundity would disconcert some.

If Olson were writing only for intelligence professionals, he would have a diminutive audience. While some US counterintelligence professionals might nonetheless view it as their book, To Catch a Thief is a book published for the largest audience possible. To that extent, Olson does not take for granted how much the reader can absorb from what he teaches. It is evident that he takes control of that process, apportioning how much of the story he feels would be appropriate. When he feels the reader should be ready for more, Olson increases the quantity and complexity in his anecdotes.

Even after what could be sardonically characterized as Olson’s generous effort to spoon-feed some readers, other concerns about how the book was written were voiced by reviewers from outside of the profession. In the New York Journal of Books, Michael McCann wrote: “To Catch a Spy struggles to the finish line far behind many other, better publications in terms of immediate relevance. Which invites an important question: Who is Olson’s intended audience?” On that point McCann goes on to state: “To Catch a Spy will provide a useful textbook for students taking Olson’s courses at the Bush School. No doubt they will be quizzed on his ten commandments, the three principles of workplace counterintelligence, and other key points. It will also help them write summaries of important counterintelligence cases over the years and the lessons learned from them.” Leaving no doubt that he was disappointed by the book, McCann states: “For the general reading public, however, To Catch a Spy doesn’t really appeal. Those looking for “juicy new disclosures” will be disappointed as they wade through material just as easily accessed at no cost by googling for it online.”

In its review, greatcharlie, using its understanding of the subject as a nonpracticioner, observing from outside the bureaucracy, follows those aspects of the book closely. The last outcome greatcharlie wants is for its review to boil down to discussion of “Olson left this out. He left that out. He did not elaborate enough here or there.” Despite any concerns about what was missing in the text, in its review of To Catch a Spy, greatcharlie explores what one can appreciate and learn about Olson’s thinking process from what he does provide in the text. However, what is most impressive about To Catch a Spy to greatcharlie is the manner in which it stimulates thought on the issues presented. Books that can stir a fire inside the reader, and a passion for a subject, are the most memorable and most enjoyable to sit with. To that extent, included in the review are greatcharlie’s own thoughts about counterintelligence topics covered by Olson which hopefully will assist some readers in better understanding what Olson is presenting to them. It is also hoped that thoughts shared by greatcharlie will encourage readers to weigh  their own impressions on those topics and develop of their own insights on them whether they may be actual intelligence practitioners or just enthusiasts. Additionally, greatcharlie offers its own thoughts on those topics to assist in giving context to the work of US counterintelligence to the US public, nonprofessional readers, in particular, and, in turn, offer some perspective to the counterintelligence professional on how the ave4age US citizen perceives his or her work. With any luck, what is presented will appropriately resonate among both sets of readers. Rationale enim animal est homo. (Man is a reasoning animal.)

The Headquarters of the Russian Federation SVR in Yasenevo (above). The first three chapters of To Catch a Spy  form a compendium of efforts Olson spotlights of respective Chinese, Russian, and Cuban foreign intelligence services against the US. This is a matter that absolutely merits treatment particularly for the sake of the intelligence enthusiasts and the nonpracticioner. It is great that Olson broached the matter early in his book. The intelligence services of China, Russia, and Cuba are driven by the same concepts and intent that typically drive the leadership of their respective authoritarian countries: greed, cruelty, and lust for power, even world domination. It is fairly well-known outside of the intelligence world that China has concerned the US greatly of late.  Olson’s compendium of adversarial intelligence services activities essentially provides a run down of those respective adversaries’ intelligence operations, both successes and defeats. Much of the information on the cases used to support any small assertions by Olson on the nature of these adversaries’ respective efforts has already been made public. In fact, they were presented in some detail via US Department of Justice indictments and criminal complaints for those cases.

Country Reports on the Main Adversaries of the US

The first three chapters of To Catch a Spy  form a compendium of efforts Olson spotlights of respective Chinese, Russian, and Cuban foreign intelligence services against the US. This is a matter that absolutely merits treatment particularly for the sake of the intelligence enthusiasts and the nonpracticioner. It is great that Olson broached the matter early in his book. The intelligence services of China, Russia, and Cuba are driven by the same concepts and intent that typically drive the leadership of their respective authoritarian countries: greed, cruelty, and lust for power, even world domination. It is fairly well-known outside of the intelligence world that China has concerned the US greatly of late.  Olson’s compendium of adversarial intelligence services activities essentially provides a run down of those respective adversaries’ intelligence operations, both successes and defeats. Much of the information on the cases used to support any small assertions by Olson on the nature of these adversaries’ respective efforts has already been made public. In fact, they were presented in some detail via US Department of Justice indictments and criminal complaints for those cases.

Suspected spy for the Communist Party of China, Christine Fang (above). It was revealed in 2020 that Fang had established contacts and some relationships with several political officials from mayors and local council members, to Members of the US Congress as part of an effort by China to infiltrate US political circles. Olson explains that the Chinese have been trying to influence US political campaigns through illegal contributions since at least the 1990s. Olson says China is in a class by itself in terms of its espionage, covert action, and cyber capabilities. He admitted the US was not doing enough now to prevent China from stealing its secrets. Olson reports that the goal of China’s massive espionage, cyber, and covert action assault on the US is to catch up with the US technologically, militarily, and economically as quickly as possible.

China

Olson explained that China is in a class by itself in terms of its espionage, covert action, and cyber capabilities. He admitted the US was not doing enough now to prevent China from stealing its secrets. Olson explains that the goal of China’s massive espionage, cyber, and covert action assault on the US is to catch up with the US technologically, militarily, and economically as quickly as possible. Olson asserts that if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

There were four important disclosures by Olson on Chinese espionage, which, despite claims from some reviewers were well-known, in greatcharlie’s view can at least be said to have been given “proper” additional light in his discussion. They include the restructuring of the Chinese intelligence services, the political work they do in the US, concerns that a possible mole is ensconced in the US Intelligence Community, and again, the enormity of Chinese espionage. Regarding the Chinese intelligence apparatus, he explains that it was restructured in 2015 and 2016. The principal Chinese external intelligence service is the Ministry of State Security (MSS)., which is responsible for overseas espionage operations. The Ministry of Public Security (MPS) concentrates on domestic activities but also occasionally runs agents abroad. The MSS and MPS were relatively unaffected by recent organizational changes in the Chinese intelligence community. The major impact has been on the People’s Liberation Army  (PLA), which since the 1950s has been heavily engaged in intelligence operations. The PLA in theory has concentrated on military intelligence, but it has actually defined its role more broadly. Olson reports that it has competed with the MSS in a wide range of economic, political, and technological intelligence collection operations overseas, in addition to its more traditional military targeting. The PLA is still responsible for the bulk of China’s cyber spying. However, Olson points to indications that the MSS has been assigned an expanded role in this area as well. Concerning how it is all organized, Olson reveals that the PLA’s human intelligence (HUMINT) operations are managed by the Joint Staff Department, and comes under the Central Military Commission. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence like certainly capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission.Thus, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), the rough equivalent of the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare have been rolled into the new Strategic Support Force. Olson explains that much as all intelligence services worldwide, both the MSS and the PLA make regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. They aggressively use Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection. Olson takes the position, disputed by some experts, that Chinese intelligence services take a vacuum cleaner approach and collect literally any kind of data they can get their hands on in the US.

Olson explains that the Chinese have been trying to influence US political campaigns through illegal contributions since at least the 1990s. He points to the huge row raised in 1996 when the Washington Post reported that the US Department of Justice was investigating possible illegal Chinese contributions to the Democratic National Committee (DNC) in an effort to influence both the Presidential and Congressional election that year. After getting into a handful of pertinent details about two Chinese businessmen, Johnny Chung and John Huang, Olson explains that the FBI determined that the 1996 illegal funding operation was coordinated from the Chinese Embassy in Washington. Olson says the issues at stake for the Chinese government are not difficult to devine: US support to Taiwan, intellectual property law, trade policies, the environment, human rights, and Asian security. China denied any role in the influence buying. Going a step further, Olson warns that candidates of both political parties have been targeted for influence buying. Chinese hackers have been detected in the campaign websites of both candidates in every presidential election since 2000, another indication that the threat of Chinese election tampering has not gone away. In 2016, Virginia governor Terry McAuliffe was notified by the US Department of Justice that he was the target of investigation for allegedly accepting a questionable campaign contribution of $120,000 from Chinese businessman Wenqing Wang. McAullife was not charged with any crime. There has been considerable controversy lately about alleged Russian tampering in the US presidential Election of 2016. Such allegations, Olson duly notes, should  be investigated thoroughly, of course, but he points out that the Chinese have been engaged in such activities for 20 years.

Olson notes that in a May 20, 2017 New York Times article informed that 18 to 20 of the CIA’s best spies inside China had been imprisoned or executed. The New York Times based its information on “ten current and former American officials” who chose not to be identified. According to Olson, the losses actually occurred between 2010 to 2012 and effectively wiped out the CIA’s excellent stable of assets inside the Chinese government. Olson proffers, “If true, this disaster is eerily reminiscent of the decimation of the CIA’s Soviet agent program in 1985.” The fact that Olson would even discuss the New York Times report in To Catch a Spy, gives the story far greater credence than it would have otherwise. With regard to what occurred from 1975 to 1985, the CIA built up a remarkable inventory of well-placed agents inside the Soviet Union–only to see them disappear, one by one, because of what Olson describes  “the perfidy” of Edward Lee Howard and Aldrich Ames. According to the New York Times report, the CIA’s counterintelligence theories about what went wrong in China have mirrored the same avenues that  it explored after 1985. Olson laid out a few of the questions that were asked by US counterintelligence services: “Could our compromises have been the result of sloppy tradecraft? We’re we being beaten on the street? We’re our secret communications being intercepted? Or did we have a mole?”

Olson says arrests in rapid succession in a compressed period usually point to a mole. In fact, a former CIA case officer, Jerry Chun Shing Lee, was arrested by the FBI in January 2018 and charged with espionage. After Lee left the CIA in 2007, he moved to Asia with his family and was doing business there. In 2010, he was allegedly approached by Chinese intelligence officers. If, as alleged, Lee gave up the identities of CIA spies in China, Olson believes he either took notes with him when he left the agency in 2007 or remembered who they were. Olson reports that the FBI, as part of its investigation, was looking closely at deposits made to Leeds bank account. It took 9 years to catch Ames. Olson states: “I hope it will not take that long to figure out what happened in China and, if the problem is in fact human, to bring the traitor to justice.

Olson submits to the reality that enormity of the Chinese espionage effort is staggering, noting that the FBI announced in 2015 that it had seen a 53 percent increase in economic espionage against US companies over the previous year, and most of it from China. US companies remain extremely vulnerable despite being aware of the Chinese threat. According to Olson, the MSS and PLA primarily play the ethnic card in their recruitment operations. They target a large number of ethnic Chinese–the “overseas Chinese”–who live in the US and virtually every other country in the world. Still, the MSS and PLA would also engage in nonethnic recruitment of US citizens. Those nonethnic recruits, Olson says are few in number, have done serious damage given reports on their activities.

Olson presents the statistic that approximately 4 million ethnic Chinese in the US are only a generation or less from the mainland and great numbers of them still have relatives in Communist China. He says many of them also still feel pride and sympathy for the culture and accomplishments of China, particularly the build up of economic and military strength under Mao and his successors. Olson states that the common tactic is to play on loyalty to Mother China and to exert pressure via relatives still living in China. A Chinese-American working in the US government or in a high-tech firm would usually be approached on that basis, but he notes that venality and greed can also play a large role in any recruitment of a spy. Olson says that all US citizens who visit China are assessed as potential recruitment  targets–and those who he access and show susceptibility are singled out for aggressive development. To emphasize how well Chinese recruitment efforts work, Olson provides a partial listing of Chinese-Americans who have fallen to this trap, the information they were instructed to collect, and where they were located: US Navy Lieutenant Commander Edward Lin, caught providing classified military information; Szuhsiung Ho, caught recruiting six other US engineers to provide nuclear technology to China; Peter Lee, caught providing naval technology and defense information to China; China Mak, caught passing classified information on surface ships and submarines; Fe Yei, caught stealing computer microprocessor technology for China; Walter Lian-Heen Liew, caught providing chlorides-route titanium dioxide production technology to China; and, Greg Chang, caught providing proprietary information on the US space program to China. Olson then devotes a page and a half to the case of Katrina Leung, whose objective was not to steal technology but to infiltrate US counterintelligence. His account provides less about tradecraft, having been errantly recruited by the FBI as a counterespionage agent, she used and told more about the details of her relationship with two FBI counterintelligence officers, James Smith and William Cleveland.

As for nonethnic recruits of the MSS and PLA, Olson presents summaries of the cases of Benjamin Bishop, caught passing classified defense information to his young Chinese girlfriend; Candace Claiborne, having served in Shanghai and Beijing as a State Department employee, she was caught cooperating with Chinese intelligence; and, Glenn Duffie Shriver, recruited by MSS while visiting China as a student was caught delivering stolen military technology to his intelligence handlers. Curiously, even though Olson explains that he has presented only a partial list of ethnic and nonethnic recruits caught by US counterintelligence services, the list appears rather diminutive given his own admission that there is a vast Chinese intelligence collection effort currently underway in the US. There would surely be some reason for US counterintelligence services to be proud of the outcome of investigations into the activities of those captured. However, far more will need to be done before they begin to even stem Chinese espionage in the US. (A discussion of the transition from ethnic to non-ethnic recruitment by can found in greatcharlie’s July 31, 2020 post entitled “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”

Olson touches on two recurring themes in discussions on Chinese intelligence: students and cyber attacks The question of Chinese students in the US, is especially pertinent. According to another statistic that Olson offers, in 2016-2017 there were 350,755 Chinese nationals studying at US colleges and universities, accounting for approximately one third of the total of international students in our foundry. He points to that fact that a large majority of Chinese students are studying science or engineering, fields that have direct relevance to China’s industrial and military aspirations. Olson reveals that many Chinese students are encouraged by Chinese intelligence to remain in the US, to obtain employment, and to acquire lawful permanent resident status. Lawful permanent residents can apply for US citizenship after five years of residence, three years if they are married to a US citizen. Naturalized US citizens are eligible for US government security clearances after five years of citizenship. Olson says these regulations represent a trade off between our need for certain skills–particularly technical skills–and security. Olson notes that the US Intelligence Community feels any intelligence service worthy of the name would jump at the chance to infiltrate its officers and co-optees into government agencies, national laboratories, and high technology firms of a priority target country. While admitting that he had no data to support that position, he says it is inconceivable to him that the MSS and PLA would have overlooked this enticing and easily exploitable path to access.

Regarding cyberattacks from China, Olson notes that they are nothing new. The first major attack was discovered in 2005, but it was quickly determined that infiltrations of US government computer networks had been going on since at least 2003. Olson relates that the 2003 operation, dubbed Titan Rain, was a coordinated attack by Chinese cyber spies to download sensitive Data from networks at the US Departments of Defense, State, Energy, and Homeland Security, as well as a host of US defense contractors. In one day, the hackers stole reams of sensitive aerospace documents with schematics of propulsion systems, solar paneling, and fuel tanks for NASA’s Mars Reconnaissance Orbiter. Other targeted locations included the US Army Information Engineering Command, the Naval Oceans Systems Center, the Missile Defense Agency, and US national laboratories. Olson says cyber attacks such as Titan Rain present a unique challenge in terms of attribution. In the case of Titan Rain, however, Olson explains that it is not credible to conclude that a multifaceted and sophisticated operation of this magnitude could be anything other than a Chinese government-sponsored activity.

In 2010, Google announced that the company had detected a “highly sophisticated and targeted attack on [its] corporate infrastructure originating from China that resulted in the theft of intellectual property from Google.” While China’s involvement in cyber attacks was by no means surprising, Olson supposes Google’s decision to publicize the breach was unusual. Typically, companies are wary of publicizing such leaks for fear that perceptions of insecurity could negatively affect their business. The explanation may lie in the fact that Google executives, who had continually met resistance from the Chinese government regarding censorship since the company had entered the Chinese market in 2006, finally decided enough was enough.

Google first learned of the attack from Chinese human rights activists in the US who had reported that their Gmail accounts had been accessed by unknown users. As details of Operation Aurora, as it was called, surfaced, it became clear that the attack was highly tailored and complex. The cyber spies exploited a flaw in Internet Explorer 6.0 to gain access to targeted computers. Once the vulnerability was identified, the hackers determined which officials at various companies had access to sensitive information. Emails that, once opened, installed malate on the target computers were then sent from servers in Taiwan to the chosen company officials. The hackers from then on had unfettered access to the officials’ computers and could steal any information they deemed valuable. Google was not the only US firm targeted by the Aurora cyber spies. No less than 34 companies, to include Yahoo, Symantec, Adobe, North run Grumman, and Dow Chemical, were victimized. The Washington Times reported, “Each of the companies was targeted differently, using software developed from the attackers’ knowledge of the individual networks and information storage devices, operating systems, the location of targeted data, how it was protected, and who had access to it.” According to federal cybersecurity experts, attacks of Aurora’s precision and sophistication could be achieved only with substantial the government’s support.

Perhaps the most egregious of all the attacks on US computer systems became public in June 2015, when the Office of Personnel Management (OPM) announced that its database had been breached by unknown persons. The personnel records of 21.5 million US government employees, past and present–including Social Security numbers, biographical information, and the results of security background investigations–were stolen. The information, in Olson’s informed view, would be a gold mine for any intelligence service seeking to spot, access, and develop US government employees for future recruitment. The US Intelligence Community placed blame for the attack squarely on China. Beijing denied any official responsibility for the breach and, in fact, announced in December 2015 that it had arrested a small group of nongovernmental hackers for having committed the crime. No information was provided on the hackers’ identities, place of deployment, or sentencing. Skeptics suspected a convenient cover-up to ease tensions with the US before a scheduled visit of People’s Republic of China President Xi Jinping. Olson s that the only Chinese entity, state sponsored or otherwise, that he could think of that would have a motive for stealing all the OPM data is the MSS. The administration of US President Barack Obama signed a bilateral agreement in September 2015 pledging that neither side would use cyber attacks to steal intellectual property for commercial purposes. According to Olson, a US cybersecurity company documented a Chinese cyberattack on a US company the day after the agreement was signed. In the three weeks that followed, there were at least seven more attacks from China against US high-tech companies. 

The current director of the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Sergey Naryshkin (above). Second place on Olson’s list of  counterintelligence threats to the US goes to the Russian Federation Following the Soviet Union’s collapse, the monolithic Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. was divided into two new agencies, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB and Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Despite the democratic posturing and economic liberalization of the early years, in the end, not to much changed about Russian activity in the US. Many of the KGB’s old and young guard stayed on and simply moved into new offices in Yasenevo for the SVR or the Lubyanka for the FSB.

Russia

Second place on Olson’s list of  counterintelligence threats to the US goes to the Russian Federation (Russia). Despite the democratic posturing and economic  liberalization of the early years following the collapse of the Soviet Union, Russian security services did not change much. Intelligence was reorganized in Russia in 1991. The monolithic Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. was divided into two new agencies, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB and Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Unlike the former satellite countries of the Eastern Bloc (e.g., Poland, Bulgaria, Czechoslovakia, East Germany, Romania, Hungary, Latvia, Lithuania, and Estonia), where intelligence services of the new democratic regimes purged old Communist apparatchiks, many of the KGB’s old and young guard stayed on and simply moved into new offices in Yasenevo for the SVR or the Lubyanka for the FSB. The Russians did not consider it professionally disqualifying for someone to have served previously in the repressive and undemocratic KGB.  When Olson mentions that organization, it must be made clear that he viewed it as “a ruthless and vicious organization that oppressed its own people, crushed religion, sent political dissidents to gulags or psychiatric hospitals, and killed its enemies.” Olson describes the FSB as being responsible for Internal security in Russia, specifically counterintelligence, counterterrorism, domestic unrest, state crimes, and border security. Meanwhile, the SVR is responsible for external intelligence collection and covert action. With this structure Russia has aligned itself more closely to the US and United Kingdom models , in that the FSB is the rough equivalent of the FBI or the Security Service (popularly referred to as MI5) and the SVR corresponds to the CIA or the Special Intelligence Service, popularly known as MI6. (An explanation of the United Kingdom’s nomenclature of MI5 and MI6 is provided in some detail in greatcharlie’s December 11, 2020 post.) Russian military intelligence is the responsibility of the Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU which has operated under that name since World War II. 

Olson says that there was real optimism, even a belief in some quarters, that the US Intelligence Community could forge a new relationship with the Russian intelligence services on the basis of trust and cooperation, particularly in areas of common concern, transnational interests. They included counterterrorism, narcotics, and organized crime. Olson said that some of the early talks between representatives of the two services were so encouraging that “the US side decided it did not want to jeopardize this potential intelligence détente by getting caught in any kind of provocative spying against our new ‘friends.’” The problem with that line of thinking was illustrated by Olson when pointed to the episode of former KGB archivist Vasil Mitrokhin. Mitrokhin provided MI6 with a gold mine of documentary intelligence on Russian espionage information from the revolution to the 1980s. However, Mitrokhin had initially attempted to provide the information to the CIA, but Olson explained he was rebuffed based on the rationale that the CIA did not want to antagonise the SVR given its aims of establishing a cooperative relationship with that Russian intelligence service. 

Then what Olson describes as an avalanche of bad news came when it was discovered that both the SVR and the GRU intelligence operations against US personnel and installations worldwide had never ceased. They were in fact being conducted aggressively. Olson then points to the cases of CIA officers Aldrich Ames, Edward Lee Howard, Harold James Nicholson, FBI special agents Earl Edwin Pitts and Robert Philip Hanssen, and the US Army’s George Trofimoff.

Another Russia concern to which Olson draws the reader’s attention was the case of a group of illegals–described by Olson as professional intelligence officers living in the US under false identities–intercepted by the FBI in 2010. The case was made very public and news stories on it garnered considerable public interest, with focus placed on a divorce, Anna Chapman, who held dual Russian and United Kingdom citizenship. Olson remarks on the politics of the illegals detainment, trial, and exchange. Olson also gives attention to Russian information warfare, which he explains supplements their human intelligence efforts. 

Cyber spying is widely used by Russia to interfere in the politics of other foundries, to manipulate their populations, to spread disinformation, to conduct unconventional warfare, and to collect intelligence. The Russian objective is to harass, to discredit, to disrupt, to deceive, and to spy on rival states. The last ten years have seen not only a dramatic increase in the frequency of Russian cyber activity, but also, what Olson alarmingly characterizes as a quantum leap in the brazeness, sophistication, and destructiveness of the attacks.

Olson reports that the FSB has taken the lead in launching denial-of-service attacks on foreign governments and sponsoring anonymous “web brigades” that bombard political blogs and other forums with disinformation and pro-Russian propaganda. The GRU’s cyber capabilities are primarily directed at supporting military interventions, but the GRU is suspected of also having carried out cyber attacks on non-military objectives, such as the German Bundesamt and French television station. The lines of responsibility between the FSB and GRU are blurry and overlap, leading to a possible duplication of cyber efforts. The SVR uses cyber operations to support human intelligence operations. Although it is not as directly involved in cyber operations  as the FSB and GRU are, it plays a planning role in overall cyber strategy.

According to Olson, Russian cyberspying first surfaced on the world stage in a big way in Estonia in 2007. Russian-Estonian relations fell to a new low over the removal of a Russian war memorial. At the height of the controversy, Estonia was hit by a massive denial-of-service attack on government offices, political parties, banks, and media outlets. In 2008, as a prelude to the Russian armed forces invasion of the Republic of Georgia, the voluntary was victimised by well-orchestrated cyber attacks creating disarray. Internet services were rerouted and blocked, websites were defaced with pro-Russian propaganda, and news agencies websites were attacked, and in some cases brought down. The Russian annexation of Crimea in 2014 was followed by waves of sophisticated cyber attacks against Ukraine’s central government in Kiev. Separate attacks on energy suppliers, the power grid, the financial sector in Ukraine, as well as the Ministry of Defense in years since.

Olson asserts that unlike Chinese espionage, which he characterized as being based on China’s cold, objective attitude toward the US, an impersonal self-interest, Russian spying is predicated on a certain animus toward the US. Olson concludes that Russian Federation President Vladimir Putin “does not like us,” and says his grudge is personal. Olson believes that in sheltering Edward Snowden, who he describes as a “contemptible US turncoat,” Putin is showing his disdain for the US.

Olson informs that when the US Intelligence Community is interviewing applicants for employment today, it sometimes refers to the “Big Five” foreign languages that are in highest demand: Chinese, Arabic, Farsi, Korean, and Russian. The Russian language is still on the list for good reasons, not the least of which is that the SVR and the GRU are all over us. Olson believes that Russia will remain a major counterintelligence concern for the US for the foreseeable future. He concludes that the US would be naive in the extreme to believe that it could ever expect good faith from Putin.

Ana Montes (above) was a Defense Intelligence Agency analyst arrested in 2001 on charges of committing espionage on behalf of Cuba. According to Olson, the Cuban DGI was the most effective intelligence service the US counterintelligence faced. A noteworthy aspect of Cuban intelligence activity in the US is the quality of the tradecraft. In the case of Montes, for 16 years she passed the DGI everything she could get her hands on related to US counterintelligence efforts against Cuba. It was no small feat for the Cubans to run her case and others as long as they did and in hostile territory under the noses of US security and counterintelligence officials without getting caught. (Olson gives the Montes case substantial treatment in Chapter Eight.)

Cuba

Olson’s review of the Cuban threat was perhaps the best written of the three assessments. Olson declares that the Cuban Intelligence service may be the most effective service that US counterintelligence services face. The Cuban Intelligence Directorate, formerly known as General Intelligence Directorate or DGI was established by the First Secretary of the Communist Party of Cuba, one time Cuban Prime Minister, then Cuban President, Fidel Castro, in 1961 to preserve the Revolution; to collect intelligence on Cubans enemies, both foreign and domestic; and, to carry out covert action operations as directed. Castro was aware as early as 1961 that President Kennedy and his brother Robert Kennedy, the US Attorney General, were trying to have him assassinated through a variety of CIA plots that never came anywhere near fruition. The DGI reportedly became Castro’s tool of choice to carry out his vendetta against the CIA and the US.

Olson states the Cuban DGI cannot compete with the Chinese or the Russians in terms of overall damage to US national security, but that is primarily a function of its smaller size, narrower objectives, and limited resources. However, perhaps  it should  have been added, as Olson is surely aware, under furtive cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked or position themselves, to support the intelligence efforts  of other countries when there is a common interest or considerable benefits of all kinds. Reportedly, friendly foreign intelligence services are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and  inside the US. Many foreign intelligence services of other countries, particularly medium to small sized organizations actually love being brought into US intelligence operations of any kind. It gives them the opportunity to have a place at the table with the US, there will usually be important lessons learned, supposedly good relationships with US counterparts will be enhanced or created, and most of all, there will be financial benefits courtesy of the US taxpayer.

In their recruitment operations against the US, Olson reveals that the Cubans, much as the Chinese, often benefited from non-monetary inducements, ideological  in the case of the Cubans, ethnic in the case of the Chinese. That sort of recruitment is often facilitated by the fact that many of the US citizens who worked for the DGI and the MSS essentially volunteered their services. Another noteworthy aspect of Cuban intelligence activity in the US that Olson points to is the quality of the tradecraft. The longevity of an espionage operation is largely a result not only of the skill of the handling officer but also the techniques and equipment used to run the operation securely.

Olson reveals that in 1998, the FBI broke up a large Cuban espionage operation in South Florida called the Wasp Network (Red Avispa). This network consisted of fourteen or more Cuban spies who had the mission of penetrating anti-Castro organizations in Florida. Evidence against some of the members was too thin for prosecution, but five ringleaders stood trial and we’re convicted of espionage and other crimes. One of the Cuban-American groups, the Wasp Network, infiltrated was an organization named Brothers to the Rescue. Brothers to the rescue flew aircraft in and around Cuban airspace to assist people fleeing in boats and to drop anti-Communist propaganda leaflets. The organization was clearly a thorn in Castro’s side. As the story goes, a member of the Wasp Network found out the flight plan of Brothers to the Rescue flight to Cuba in February 1996. Cuban fighter aircraft shot down the plane in international airspace, and all four Cuban-American on board were killed. (It stands to reason that the Soviet Union, which in its day essentially armed the Cuban military and security forces, would have provided Cuba with more than a rudimentary capability to monitor nonmilitary flights from the US that did not use electronic countermeasures as well as the weapons systems to shoot down from the ground and fighter-jets that could scramble and intercept Brothers to the Rescue missions. Perhaps there was a greater reason to shoot down the 1996 flight, due to someone in particular being on board or to demonstrate Cubans capability to some operatives or informants that supported the collection of the flight plan, that led to what occurred.)

While Olson gives the case of Ana Montes greater treatment in Chapter 8 “Counterintelligence Case Studies,” notes in this chapter that due was a Defense Intelligence Agency analyst arrested in 2001 on charges of committing espionage on behalf of Cuba for at least 16 years. During that period Montes passed the DGI everything she could get her hands on related to US counterintelligence efforts against Cuba. Olson writes that the tradecraft the Cubans used in handling Montes was fantastic, a credit to the art of espionage. Olson comments that it was no small feat for the Cubans to run cases as long as they did and in hostile territory under the noses of US security and counterintelligence officials without getting caught. Montes was sentenced to 25 years in prison. 

Interestingly, Olson notes here that the CIA could penetrate the KGB and sometimes count on it to make tradecraft mistakes, but it was not so fortunate when dealing with the the DGI. Perhaps Olson was a bit exuberant about presenting the DGI as a formidable foe or maybe there was some simple oversight, but the notion that the Cuban intelligence was somehow less able to make mistakes somewhat contradicts what was one of the more remarkable aspects of the Montes case as recounted in the text. As Olson describes in Chapter 8, Montes was coached by DGI on tradecraft to include erasing everything incriminating from her hard drive. He notes that Montes either did not follow instructions or they did not work because the FBI recovered a treasure trove of espionage traffic on her Toshiba laptop.

Olson goes on to discuss the case of a retired State Department official, Kendall Myers, and his wife, Gwendolyn Myers, who were arrested on charges of having been DGI agents for almost 30 years. Myers joined the US Foreign Service with a top secret clearance in 1977. Later he was given even higher clearances when he was assigned to the highly sensitive Bureau of Intelligence and Research  at the State Department. Myers sympathised with the Cuban Revolution and believed that the US was subjecting Cuban government and people to unfair treatment. His response, probably beginning in 1979, was to spy for Cuba. With help from his wife, Gwendolyn, he engaged in a full-fledged espionage relationship with the DGI. Until Myers’ retirement in 2007, he passed top-secret documents and other classified material to the DGI in a sophisticated system of dead drops and brush passes. During their trial, it became known that the Myers had received personal congratulations from Fidel Castro. The damage they did to US national security was incalculable.

As for the CIA’s recruitment of DGI officers, it was more likely that there would be a walk-in, attempting to escape from problems of their own making with the DGI. The case Olson points to is that of Florentino Aspalllaga Lombard. Referred to by Olson as Aspillaga, he was the highest ranking defector from DGI that the US ever had. Olson was directly involved in his case. In 1987, while Olson was posted to the US Embassy in Vienna, he was summoned to his office by an agreed parole indicating that there was a walk-in. That walk-in was Aspillaga, and he was accompanied by a teenaged girl who was his mistress and the daughter of an official of the Cuban Embassy in Prague. Aspillaga, had left his wife and three children and was on the run, hoping to find a new life as a couple in the US. Aspillaga offered their services to the CIA as barter.

In what Olson called a sensational revelation, Aspillaga told the CIA that former CIA officer Philip Agee had cooperated with the DGI and had been paid close to $1 million. Agee’s role as a DGI agent was later confirmed by former KGB officer Oleg Kalugin, citing his memoir, Spymaster: My 32 Years in Intelligence and Espionage against the West (Smith Gryphon, 1994) as his source. Kalugin said Agee had walked into the KGB in 1973, had been turned away as a suspected provocation, and then had gone to the Cubans. Agee, a graduate of the University of Notre Dame, joined the CIA in 1957. He served in a series of undercover assignments in Latin America in the 1960s, supposedly becoming more and more disillusioned by what he considered CIA support of right wing dictatorships. While assigned to Mexico City in 1968, Agee resigned from the agency, moved to Europe, and began his new career of neutralizing the CIA. In 1975, he published a book, Inside the Company: CIA Diary, a detailed description of his career and exposé of CIA activities in Latin America. Most damaging of all, he included the names of 250 CIA undercover officers and foreign agents (operatives and informants). thereby disrupting CIA officers’ clandestine careers and subjecting them to considerable personal risk. The foreign agents he identified were exposed to the even worse fate of possible imprisonment or execution. The CIA chief of station in Athens in December 1975, shortly after he was outed by Agee. Agee’s guilt has never been proven conclusively, but few CIA officers believe that the timing of Welch’s killing was a coincidence.

Olson states that Agee’s US passport was revoked in 1979, but he still traveled widely, mostly in Europe, for the next several years using passports provided by the leftist governments of Grenada and Nicaragua. In subsequent books and magazine articles, Agee continued his denunciations of the CIA and the US government and disclosed the identities of an additional one thousand CIA officers and agents. Olson states here that it was clear at that point that he was not operating on his own but was getting help from a foreign intelligence service. Olson does not explain or support this fact with any data. Hopefully, he is not theorizing on a hunch but is rather presenting an inference that he can support. Whenever one theorizes in such a way without fact, one makes a capital mistake. Olson goes on to explain, unfortunately, under US law at the time, the unauthorized disclosure of the names of undercover US personnel was not a crime, so Agee could not be indicted and extradited to the US. Additionally, he remarks that Agee was operating on behalf of the DGI could not be denied after 1989. Then by Olson to state Agee’s involvement with the KGB was a near certainty  because of the close relationship that existed between the DGI and the KGB. To support this, Olson points to a statement by Kalugin in Spymaster that he read reporting from Agee that the DGI passed to the KGB. Olson claims it is inconceivable to me that the KGB would let its client service run a source of this magnitude without inserting itself into the operation.

Yet, despite what Olson inferred, the data may suggest otherwise. By Olson’s own admission, the KGB rejected Agee for recruitment in 1973. Senior executives and managers at Moscow headquarters would need to reverse a decision. They may not have been that flexible. The DGI apparently rejected the KGB’s original evaluation of Agree. That seemed even more interesting to consider. Olson then reveals that in 1989, Agee played a key role in a DGI operation against the CIA. He posed as a CIA official from the inspector general’s office in a fiendishly clever recruitment operation against a young CIA officer stationed in Mexico City. Mexico City was once Agee’s beat for the CIA, at least until 1968. Still, Agree was completely unrecognizable to US Embassy security as well as Mexican authorities. Mexico City was also being watched closely as it had a well-known role as launch pad for Soviet and Eastern Bloc operations against the US, particularly California, Nevada New Mexico, Arizona, and Texas. Reportedly, Agee contacted the CIA officer and told her that he was conducting a sensitive investigation of alleged wrongdoing by the CIA in Mexico City, possibly involving senior management. He asked for her help in carrying out a discreet investigation that would not alert the targets. Agee ordered her on behalf of the inspector general not to discuss his approach with anyone. He managed to elicit significant information from the young officer.

As far as recruiting DGI officers, Olson did not provide any information on such operations being successful. Rather, from another revelation by the DGI walk-in, Aspillaga, it was discovered that all 38 of the Cubans the CIA thought it had recruited over the previous 26 years were double agents, controlled and running  against the US by the DGI. This was a devastating indictment of CIA counterintelligence, one of the worst and most embarrassing compromises we ever had. Olson laments, “The DGI beat us–and beat us soundly.” According to Olson, the CIA’s damage assessment was long and painful. The intelligence that the CIA disseminated from  the bogus agents had to be recalled since it was all DGI-concocted disinformation. The CIA’s tradecraft handling the controlled agents had been completely exposed to the DGI, which later ridiculed the CIA in a TV special for the agency’s alleged amateurishness and sloppiness. The CIA lost all the clandestine equipment it had provided to the Cuban assets, including a then state-of-the-art burst satellite communications system. Olson also considers that the cash that the CIA paid to the Cuban doubles in salaries and bonuses, ended up in the DGI’s coffers.

In a rare expression of analysis in this segment of To Catch a Spy, Olson looks at how the CIA could have walked so far into the DGI’s counterintelligence trap. Olson pointed to the following factors. First, he explains that the CIA was so eager to have sources in Cuba that looked the other way when none of the agents produced any real intelligence of value. Many of the double agents reported that they were “on the verge” of meaningful access, but they never quite got there. The CIA settled for chicken feed. Second, intelligence officers always want their recruitment service to turn out well. They do not want to admit that they have been duped by a double agent. In their desire to succeed against the Cuban target, the CIA’s handling officers rationalised away the questionable reporting, anomalous behaviors, and ambiguous polygraph results of their agents. Third, the quality of counterintelligence at the CIA during much of this period was undermined by the poor leadership of James Jesus Angleton, whose obsessive focus on the KGB and overall paranoia blinded him to other counterintelligence threats. Fourth, the CIA grossly underestimated the skill and sophistication of the DGI.

A few low key remedies may have mitigated or capitalized on the possibility the CIA’s double agents were still working for the other side. Perhaps one might be added to what Olson offered by noting that there should have been an established practice of constantly interviewing agents, even in debriefings to collect intelligence and discuss requirements. It would put extra pressure on those controlling them to try to alleviate what may be concerns of fidelity, and either improve what is being offered to placate or across to board changes in methods of communicating indicating some central control exists for all that are active. The CIA could have suddenly asked that all active agents from DGI  produce information away from the area of an existing expressed interest and measure the timing it took each to deliver the information, the sources they used to gather the information, and interview the agents to discover what background they agents would use to assure the quality of the source and identify similarities that sounded more like a scripted story. It may not  immediately smoke out and identify who were  the double agents and who was true, and none were true in the Cuban case, but it might have gone a long way to encourage the CIA to consider the possibility of deception and that their double agents were fake. 

Perhaps to go a step further, the CIA needed to ensure that those handling agents were not biased pro or con toward the double agents, and were open minded to consider the possibility of deception in a way that would not color interactions with them. (That would recognizably have been less possible in a less socially conscious agency of the past.) In some cases, CIA officers perhaps could have very steadily, yet gradually sought to convince their double agents that they, themselves, might be open to recruitment by DGI. The task then would be to wait and see if there would be an effort by their double agents to manipulate and push them to some DGI operative or officer to size them up for recruitment or whether a DGI officer would simply step up out of nowhere to size them up for recruitment. That surely establishes the double agent’s loyalties, but may lead to the opening of an entirely new door to penetrate the DGI’s operations in the US. Potential must be seen in all directions when sources are limited as in the Cuban case then, and the China case now.

These three chapters are among those in which complaints arose over Olson’s decision not provide enough answers to, and copious insights on, the many “whys” of adversarial foreign intelligence activities, left gaps in understanding the reasoning behind them. For example, there is no discussion of how within not only the respective bureaucratic system, but also under the political systems in which those adversarial intelligence services work, unwavering parameters for operating are set. From that one might better conceptualize how ongoing and future operations of those services could be sorted and categorized from apples to nuts. From that analysis, antecedents in US counterintelligence would be better enabled to understand and effectively fashion operations to defeat in going and future efforts by those adversaries.

However, it must be reminded that Olson, as he reveals in his introductory Acknowledgements, submitted To Catch a Spy to his former employer, the CIA. The Publications Review Board surely stopped anything from going into the text  before it got too close to classified information. That preliminary screening might explain why some reviewers commented that the book reads at points much as a heavily redacted document

In Olson’s case, his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any information that would provide some nuance on how the US detects and catches spies would be of the utmost interest and importance to the foreign intelligence services of adversaries as well as allies. Facts are somewhat easy to judge as they may be classified and one can reasonably determine what their value might be to an adversary. Hypotheses and arguments are a bit more challenging to judge for security reasons as certain facts, even if left out, can be viewed as being confirmed by them, seeing that those facts might alone be the sole solid basis upon which a particular inference could logically be made. Surely those hypotheses and arguments might be helpful to an adversary in developing any Red Team exercise. To that extent, security considerations may be the main reason why Olson avoids drawing too many inferences and presenting too many theories in the text. Olson would hardly be the type to neglect any precaution. However, his former employer likely preferred to be safe, not sorry.

All of that being stated, greatcharlie would to some degree concur that the portraits Olson paints of the Russian, Cuban and Chinese intelligence services are somewhat two dimensional. Drawing a perspective from military science, recall that an opposing force should not be viewed as some inert, non thinking body, waiting to be acted upon. There is an aphorism trained into the minds of mid-level Army officers at the Command and General Staff College that “the enemy has a say.” It falls in line with a teaching of the 19th Century Prussian military thinker, Carl Von Clausewitz, that: one’s opponent (in just about any endeavor, not just war) is “a living force” and military plans must factor in that what is being planned is “the collision of two living forces.” One must have respect for what an opponent thinks to be successful. More specifically, one must objectively gauge what the opponent thinks and what the opponent can do. What greatcharlie would have preferred to read would be an exposition of his presence of mind, inspiring insights, written in a clear and elegant style that would make Marcus Aurelius proud and would fit in beautifully in Meditations or Epictetus’ Discourses. One might have expected that along with an insistence the novice US counterintelligence officers become and remain dedicated to improving themselves. Such will always be a worthy theme and purpose of an offering from the expert veteran to the junior worm.

Olson’s Ten Commandments 

Of interest to greatcharlie was Olson’s discussion of his Ten Commandments of Counterintelligence. Those commandments ostensibly reflect the general sensibilities, perspectives, strategies, and tactics of US counterintelligence services. In his conclusion of this chapter, Olson states: “These are my Ten Commandments of Counterintelligence. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as a counterintelligence community, we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics or the priorities. What we should all agree on, is that strong CI must be a national priority. He then proceeds to set out what he views as the Ten Commandments of Counterintelligence. Previously published in 2001 as an article in the CIA’s periodical, Studies in Intelligence, these commandments include such concepts as playing offense rather than defense, owning the street, paying attention to analysis, and not staying in the profession too long.

The 20th century French Algerian philosopher, author, and journalist. Albert Camus, in his Notebooks, 1935-1942 stated: “You cannot create experience. You must undergo it.” Olson is not attempting to promote such through his efforts at this point in To Catch A Spy. Indeed, at this point in the text, Olson presents future and novice counterintelligence officers a leg up by providing a heads up on what they might expect. Understood is his desire to prevail upon the novice to heed certain realities and precepts that would not be included in their initial training. Two issues are in play in Olson’s discussion of his commandments, competence and commitment. Looking at each issue covered by a commandment, he seeks to instruct and counsel in advance, but he wants officers to focus on being competent in their work and understand the commitment that counterintelligence work requires. This is all very handsome of Olson. Clearly, a fair and decent man of honorable intent. His scruple does him great honor.

A concern for greatcharlie however is that at no point in his discussion of his Ten Commandments does Olson offer a thought about innocent citizens caught in a US counterintelligence web. With so many investigations that can get underway when so many foreign intelligence services are working hard in the US, as indicated in Olson’s first three chapters concerning People’s Republic of China, Russian Federation, and Cuban operations, innocent private US citizens can get caught in the mix erroneously with calamitous results for the citizen through no fault of their own. In a Constitutional republic, that is a grave error and greatcharlie believes such matters if utmost importance must be broached with those moving along in the counterintelligence track. Nil magnum nisi bonum. (Nothing is great unless it is good.)

Unpacking everything about Olson’s commandments here would require dedicating too much of this review’s analysis to it and shift its focus. It may be enough to say that greatcharlie found some disconcerting and a few exceedingly problematic. The information provided by Olson in his discussion of them sets off a kind of warning light that flashes “Beware” to free citizens of a Constitutional Republic. His commandments of particular note are: The Tenth Commandment; the Ninth Commandment; and, the Eighth Commandment. By focusing on these three of his ten commandments, the opportunity to understand and taste what creates concern is provided. They are presented in reverse order here to better illustrate the cascading development of Olson’s perspectives within them on some key matters.

Captured FBI turncoat Robert Hanssen (above). Olson states from the outset that it is a profession in which officers will go for months and even years without perceptible progress or accomplishments. Olson explains: “A typical CI [counterintelligence] investigation starts with a kernel, a fragment, or a hunch that is hard to grab onto but that demands attention. He further explains: “There is no statute of limitations on espionage, and we should not create one with our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep.” Still, he calls attention to a misdirected investigation tied to the counterintelligence case against special agent Robert Hanssen that uncovered him as a Soviet spy, He notes that investigation went on longer than it should have because time and energy wasted on chasing an innocent man. Olson does not comment on how much harm and torment, the innocent man suffered as a result of the wrongful investigation of him as a spy. No matter how singular one’s percipience, until one personally suffers an injustice of a wrongful counterintelligence investigation, one cannot really fathom how damaging, even life changing, it can be.

In his “Tenth Commandment,” Olson explains that counterintelligence requires tenacity and persistence, and that is a slow, plodding process that rarely rewards its practitioners with instant gratification. He advises that one chooses to pursue a career in counterintelligence, one should know from the outset that it is a profession in which officers will go for months and even years without perceptible progress or accomplishments. Olson explains: “A typical CI [counterintelligence] investigation starts with a kernel, a fragment, or a hunch that is hard to grab onto but that demands attention. He lists what types of information qualifies as such. He then explains how counterintelligence investigations usually start with little and face an uphill fight.” He further explains: “There is no statute of limitations on espionage, and we should not create one with our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep.” As for a rationale behind what could very well turn out to be a Quixotic search for evidence that is not there against a target who may very well be innocent, Olson states: “If we keep a CI [counterintelligence] investigation alive and stay on it, the next defector, the next penetration, the next tip, the next piece of CI analysis, the next wiretap, the next surveillance report, the next communications intercept, i.e. the next four will break it for us. If US counterintelligence ever had a mascot, it should be the pit bull.” Readers must be reminded that this would all be done at taxpayers’ expense.

Hypotheses and conclusions should be predicated and driven by hard evidence, not appearances, presumptions, and surmisal, supporting a preconception of guilt. A type hubris ensnares and overwhelms the investigator much as the fisherman in Ernest Hemingway’s The Old Man and the Sea (Charles Scribner’s Sons, 1952). When moving into the realm of conjecture, anything becomes a possibility. In that realm, everyone is entitled to a hypothesis. Each one, within reason, is likely equally correct or incorrect. Less elevated reasons may have a familiar ring to some involved in counterintelligence: “Somethings got to be there because I can tell!”; “I know he is bad because I feel it!” To get an investigation of a subject where a counterintelligence officer wants it to be, the focus can shift from The actual matter at hand to a secondary search through extraneous matters–sifting through dust figuratively–for “good” information that is just not there. That will lead those officers to settle for something close enough to the truth that should never pass muster among somber and astute supervisors, but it could for others.

Preconception is abhorrent to the cold and precise mind. The pure objective truth must be the focus. It may be harder to find, but it is the true pathway to success in an investigation. True evidence must be there. Must be predicated only on a reasonable standard, logic, and the law. A thorough review of superiors, auditors is needed not simply to curtail but to provide another voice, extra eyes on the matter. Sometimes an ally looking into a matter to see and call attention to issue an investigator too close to it may overlook. The situation worsens when bent information, which can always be found or sought, may be used to support very wrong ideas. Intuition and hunches can be colored, or better yet poisoned, by extraneous matters. Before placing the full force of the powers of secret intelligence services upon a citizen to impinge on his or her rights, something more than a hunch or feeling must guide the pursuit. Tools available to US counterintelligence services for surveillance and investigation have become far more powerful and intrusive than the US Congress and even the federal courts could have imagined or conceptualized while promulgating laws on their use. A tragic consequence of a lack of strong supervision is that the punishing weight of government power that can potentially be placed on the subject with those tools, who may actually be innocent, can be harmful, damaging, and destructive. There must be constraint on the use of powerful, highly intrusive government tools to pursue a subject of an investigation. Knowing when to say when, especially since a human life is in the balance, is the mark of a true professional in any field. There must be an inner-voice or one from a supervisor that warns that an investigation could be going down a totally wrong path. In his Discourse on the Method of Rightly Conducting One’s Reason and of Seeking Truth in the Sciences, 17th century French-born philosopher, mathematician, and scientist, Rene Descartes, explained: “The first precept was never to accept a thing as true until I knew it as such without a single doubt.”

Conducting a heavy-handed counterintelligence investigation of an individual not yet found guilty of anything in a court of law can ruin that individual’s life permanently. The damage counterintelligence services can do to a subject’s psyche is well understood to be grave and considerable. Use of surveillance methods of all kinds, invasion of privacy, discussing the subject with family, friends, work colleagues in a manner that skirts defamation or fully crosses the line, using informants among neighbors work colleagues, friends, as well as family, eliminating the possibility of normal human contact, and more, all ensures nothing normal with be left in the subject’s personal life. The soul and the spirit of the subject is typically seared. Reversing the damage, is extraordinarily difficult, if not impossible. The psychological capsule in which strong willed subjects will seek refuge in order to hold on to the remainder of themselves, to survive, is never easy to break open in an effort to find them. However, there seems to be little sensitivity with US counterintelligence services to the harm done to the innocent from wrongful investigations. Olson actually calls attention to a misdirected investigation tied to the FBI’s famed counterintelligence case against Special Agent Robert Hanssen that uncovered him as a Russian [Soviet] spy, He notes that investigation went on longer than it should have and essentially glosses over the fact that time and energy was wasted chasing an innocent man. Nowhere does he mention how much harm, how much torment, the innocent man suffered as a result of the wrongful investigation of him as a Soviet spy. That speaks volumes. No matter how singular one’s percipience, until one personally suffers an injustice of a wrongful counterintelligence investigation, one cannot really fathom how damaging, even life changing, it can be.

Habet aliquid ex iniquo omne magnum exemplum, quod contra singulos, utilitate publica rependitur. (Every great example of punishment has in it some tincture of injustice, but the wrong to individuals is compensated by the promotion of the public good.) The failure to practice what the US Constitution preaches regarding life and liberty and law is reflective of an individual engaged in an investigation going off the rails. However, that individual’s frustration or any other internal conflicts, must not allow for devaluation of the system, and a devolution that can comfortably lead US counterintelligence services to regularly mimic the tactics, techniques, procedures, and methods of an authoritarian security service as stated earlier. The way of life in the US, the country’s values and interests, are not being defended. Indeed, something very different would be happening. The US and liberal democracies must be different. Government actions are founded under laws that amplify morals, Judeo-Christian values of its founders. If all that Olson declares as essential to a counterintelligence investigation is permissible as a practice in a free society, a liberal democracy as US, it stands to reason the possibilities and capabilities make the potential for harsh behavior in search of enemies far worse in China’s authoritarian–arguably totalitarian–regime.

Olson begins the discussion of his Ninth Commandment in his purest tone with the statement: “Counterintelligence is a hazardous profession. There should be warning signs on the walls of CI [counterintelligence] offices around the intelligence community: ‘A steady diet of CI can be dangerous for your health.'” Following some interesting anecdotes about officers and senior executives in CI who seemed to lose themselves in the work, Olson explains: “I do not believe anyone should make an entire, uninterrupted career out of CI. All of us who have worked in counterintelligence have seen the old CI hand who has gone spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling prey to creeping paranoia, distortion, warping, and overzealousness in one’s thinking. It is precisely these traits that led to some of the worst CI disasters in our history.” In addition, Olson notes that following a lunch with a CIA colleague who had worked for a time in counterintelligence said: “Jim, after doing CI for two years I felt the occupational madness closing in on me. I had to move on and do something else before I lost my bearings.”

Olson argues that differences in sensibilities and approaches among CIA case officers, FBI special agents, and military intelligence officers are great/disparate enough that when working together on a case, insular thinking is mitigated. Thereby, he suggests officers from different US counterintelligence services should rotate among their offices to exploit the benefits cooperation can bring. However, despite some differences among the officers in some lines of thinking, they are all from the same national security bureaucracy and their collective thinking would more likely tend to manifest greater commonalities, more similarities, than differences, having been trained and functioning in the same system. That may not be as discernible from the inside. To be frank, but not impolitic, so far, in the case of Chinese intelligence efforts in the US, no marked positive impact has been evinced from the aggregated efforts of the services.

With all of the pearl clutching being done among senior executives in the US counterintelligence service about Chinese intelligence successes in their country, taking the approaches presented in those “Ten Commandments,” out of sort of desperation, overlooking, or turning a blind eye, to aberrant situations, prolonged investigations, “tabs” being kept on former operatives and informers for no logical reason or constructive reason, obsessive surveillance, use of dirty tricks, services ou les activités pour traquer ou nuire à autrui. They can often end up becoming huge expenditures with no constructive results, only destructive ones. Being able to claim that one is on the trail of some questionable former ally might achieve some meretricious effect in a meeting to review cases–the errant officer may want to create the appearance of being a sleuthhound with a never surrender attitude–but such efforts will typically accomplish nothing to protect the US from its adversaries or enhance the country’s national security. The dreadful consequences for those incorrectly targeted, would be, as has been, the recipe for disaster. US counterintelligence, not a foreign adversary, has, and will always be, harming innocent, private US citizens in those cases. 

Supervisors and those managers of US counterintelligence services close enough to the rank and file and their operations in the field must judge the actions of officers against US citizens based on the seriousness and dignity of the claim. If there are strong concerns, there may be other avenues along which the potential problem could be managed. Suffice it to say that an investigation of a private US citizen using tools designed for trained foreign intelligence officers and networks have no good reason to be used on a citizen in a Constitutional republic. That will always be a dangerous and destructive undertaking in terms of the well-being of the US citizen. (One wonders how inspired those US counterintelligence officers who are often anxious to spend so much time, energy, and especially money on chasing tenuous leads and entertaining the slender appearance of a private US citizen’s guilt or complicity, if money was short and was being appropriated from their personal accounts. Perhaps none!)

As for another pitfall reality that taking such a harsh, seemingly ego driven approach to counterintelligence in the present day, it could lead to self-inflicted walk down a garden path and into the hands of US adversaries. Newly minted MSS counterintelligence officers in “on the job training,” which is how they do it, may very well be actually working in the field, using decoys under their trainers direction as a type of net practice for gaining and retaining the attention of foreign counterintelligence services and luring their resources, energies, and time, into endless, fruitless pursuits. The indications and implications of what is provided in Olson’s, albeit well-meaning, “Ten Commandments” are that US counterintelligence services would be susceptible to such a ploy. MSS counterintelligence could surely offer just the right amount of chicken feed here and there to support a misguided belief that the perfect “kernel” of information will be found to make a case. Such an effort could effectively distract, divert, and disrupt elements of US counterintelligence officers from engaging in more worthier pursuits against what may very well be in many cases, potentially vulnerable networks and operations of Chinese intelligence services in the US. (Interestingly, in public announcements by the US Department of Justice of a Chinese intelligence and counterintelligence operation being cracked or disrupted, there is never mention of any apparent plot to lure US intelligence services into a trap. Perchance, since Chinese intelligence services have been so successful in the US, there is no reason, no impetus to play such games. In the eyes of senior executives and managers of the MSS and senior commanders of the PLA, US intelligence and counterintelligence services may no longer be worth the candle.)

Taking draconian steps against a US citizen for allegedly, presumptively, or imaginably being tied to a foreign intelligence service when that is in reality not the case could very well compound an already difficult situation with regard to recruiting adversarial intelligence officers, operatives, and informants. The rationale for making that representation is if a US counterintelligence service accused a US citizen of providing some assistance to a specific foreign intelligence service, and the assertion is false, no group other than that adversarial service would know for a fact that the accusation is false. Even more, observing the US counterintelligence service initiate some severe, intrusive investigation of the citizen, ostensibly to better understand US practices. Surely such behavior, such practices by some US counterintelligence services would create a decidedly negative impression of the US among members of an adversarial foreign intelligence service.

“Once upon a time” there was a near universal notion of the US being “the good guy,” known for its largesse. That reputation has become a bit tarnished over time quite possibly as result of such aggressive actions by a US counterintelligence service against their own innocent citizens. If a foreign intelligence officer, operative, or informant would ever consider what would befall him or her if they left their service and country and turned to the US, the individual would need to ask himself or herself: “If they treat their own people that way, how would they treat an adversary.” Through Olson’s compendium of US activities by adversaries and his case studies, one could infer that since the end of the Cold War, foreign intelligence officers were more likely to turn to the US only if they ran afoul of their own organizations after making some egregious, irreconcilable misstep on a professional or personal level, either by their own volition or through entrapment. Such individuals would prefer to save their skins in any way possible with an intelligence service willing to accept and protect them, rather than face their superiors. One might speculate on how many occasions the choice was made by a foreign intelligence officer to turn to another country’s intelligence service such as the United Kingdom’s Security Service or Secret Intelligence Service rather than walk-in into a US Embassy or Consulate to prostrate himself or herself. Perchance some venturous officer in a US counterintelligence service might want to apply a bit of the preceding logic to the Chinese intelligence conundrum.

Perhaps one should also consider that adversarial foreign intelligence officers may chalk up actions of US counterintelligence officers performed against them, such as monitoring an opponent’s telephone and electronic communications, surveilling their movements, or striking up clandestine conversations, as a matter of them simply doing their jobs. Such thinking would form the basis of a tacit, or even an explicitly agreed upon, modus vivendi. However, it is another thing altogether for US counterintelligence officers to use “dirty tricks” against adversarial foreign intelligence officers or their families and make their circumstances unviable in the US while deployed under official cover. Boiling it all down, there must be hope, even assurance, that there will be an intelligent connection for the one who defects not a bullying connection with a US counterintelligence officer. The one coming over of course wants help in doing so, needs help in betraying his own. Those individuals are the proverbial “bigger fish to fry.”

Infamous former chief of CIA Counterintelligence, James Jesus Angleton (above). Olson initially mentions Angleton in Chapter 3 when he discusses how his obsessive focus on the KGB and overall paranoia blinded him to other counterintelligence threats. In his Ten Commandments, Olson makes note of the counterintelligence failures and abuses of Angleton, the FBI’s J. Edgar Hoover, and their subordinates, reminding of the obsessive harassment of Martin Luther King in the 1950s and 1960s, Olson states “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness. To take the discussion of such problems further, he notes: “Counterintelligence officers must be wary of what I call the ‘self-righteousness trap,’ that is, our objective cannot be so righteous and our motives so pure that we can justify inappropriate and illegal methods.”

In his explanation of his Eighth Commandment, Olson begins by reminding readers of what was mentioned in his “Second Commandment” that “some people in the intelligence business and elsewhere in the US government do not like counterintelligence officers.” He makes note of the counterintelligence failures and abuses of the CIA’s James Jesus Angleton, the FBI’s J. Edgar Hoover, and their subordinates and reminding of the obsessive harassment of Martin Luther King in the 1950s and 1960s, and then states “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness. To take the discussion of such problems further, he notes: “Counterintelligence officers must be wary of what I call the ‘self-righteousness trap,’ that is, our objective cannot be so righteous and our motives so pure that we can justify inappropriate and illegal methods.”

To explain the reaction within the national security bureaucracy and among government contractors to counterintelligence officers, Olson simply states that case officers, special agents, commanders, and other managers have a natural tendency to resist counterintelligence scrutiny. As a rationale for that, Olson asserts that they believe that they are practicing good counterintelligence themselves and do not welcome being second guessed or told how to run their operations by so-called counterintelligence specialists who are not directly involved in the operation and not in the chain of command. He acknowledges that defense contractors and other civilian bureaucrats running sensitive US government programs have too often minimized counterintelligence threats and resisted professional counterintelligence intervention. As a rationale for that perspective, Olson says they view counterintelligence officers as only stirring up problems and overreacting to them. They perceive counterintelligence officers “success” in preventing problems as being invisible and their damage assessments after compromises as usually being overblown.

In the face of such resistance, Olson proffers that counterintelligence officers must act heroically, stating: “A counterintelligence officer worthy of the name must be prepared to speak unpopular truth to power, even at the potential cost of poor performance appraisals or missed promotions. It is not an exaggeration to say that a good CI [counterintelligence] officer must be a nag–and as we all know, imperious managers do not like persistent and vocal dissent.” Intriguingly, In this discussion, Olson leaves the reader with the impression that all counterintelligence investigators are first class individuals, straight as a dart. Across all of the US counterintelligence services, a majority probably are. However, in his Ninth Commandment, he clearly indicates personal problems among them are known to arise as a consequence of the work, to repeat  included:  creeping paranoia, distortion, warping, and overzealousness in one’s thinking.  To reiterate what he writes even in this “Eighth Commandment,” Olson mentions the “self-righteousness trap” and acknowledges: “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness.” When Olson recalls from his experience how senior executives and managers in CIA shied away from acceptance of counterintelligence officers in their divisions and shops, surely he is fully aware that they could only express that choice through tidy, plausible and professional statements such as those. He also had to know that they were very likely aware of the same problems Olson, himself, indicated could exist among some counterintelligence officers. Not presuming or expecting to learn of a connection between stories of aberrant behavior by counterintelligence officers and concerns that raises among managers of departments and units, the issue may escape the impressions of many readers. To that extent, Olson, perhaps unconsciously, does say enough to invite such concerns to be among reader’s impressions either.

Iniqua raro maximis virtutibus fortuna parcit; nemo se tuto diu periculis offerre tam crebris potest; quem saepe transit casus, aliquando invenit. (Unrighteous fortune seldom spares the highest worth; no one with safety can long front so frequent perils. Whom calamity oft passes by she finds at last.) With such problems among counterintelligence officers in mind, as a “good shepherd,” the goal of any attentive and prudent manager would be to keep a potential source of undue trouble from his flock. Letting counterintelligence officers in has really become a high stakes gamble. The slightest suggestion that a manager might refuse to receive a fellow officer due to unsubstantiated concerns that he or she may be potentially psychologically unfit to carry out his or her duties appropriately or concerns that he is she may be of questionable judgment–again, based on Olson’s own statement about problems that can arise among counterintelligence officers, it could always be a possibility–could lead to sanction from the top. Olson surely must have understood was likely a tad sympathetic to such underlying sensibilities among managers within the CIA and the other national security bureaucracies about counterintelligence. If there is so much concern within the federal bureaucracies over US counterintelligence, certainly the unsuspecting, unprotected citizen has far more to fear from it. Gnawing again at the subject of the “potential” abuse of power by US counterintelligence officers, as long as there is the actuation and potential for transgressions of innocent citizens’ rights exists, there may be less to fear about China expropriation of the US role as the dominant power in the world and its usurping of citizens rights, primarily through infiltration of elite circles and election interference, than the prospect of being torn to pieces as a result of the acts, benign or malicious, of a few trusted men and women in the intelligence services and law enforcement.

Very easily the innocent, with no connection to the hideous business of a spy ring, can be caught in the same net as the guilty. It is among the innocent, carrying on by appearance in the same manner as them, that the foreign intelligence officer, operative, and informant conceals himself or herself. Suppositions based on assumptions can result in an officer initiating a case green-lit with all the necessary approvals from the top. Sentimentality to the concept of beginning, middle, and end should not compel the endless pursuit of one who may upon informed consideration may equally be found innocent. Wrongs already done cannot be righted, but an energetic effort should be made to prevent future wrongs of the same kind. Pause for thought! 

Once the track to find an individual is guilty has been taken, no one among the officers in the shop will aim to prove the individual’s innocence. The individual’s innocence becomes by the by. In these matters, perception errantly means more than reality. That imbalance in thought unfortunately has likely served to allow all formulations based on available evidence, easing in tragic results. Surely adversarial foreign intelligence services would prefer US counterintelligence service would become immersed in an investigation of an innocent party than put their time and energy on any actual part of their networks. As discussed in somewhat greater detail in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2),” it cannot be overemphasized that misidentifying an innocent citizen as an  agent of an adversarial foreign power engaged in espionage or some other act on its behalf by initiating an investigation against the individual, to include securing warrants for the most intrusive and egregious acts contrary to his or her First and Fourth Amendment Rights under the Constitution is a tragedy of unimaginable proportion and can have enormous consequences upon the life of the one mistakenly, even wrongfully targeted. 

In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. As the investigation into his alleged espionage began, Lee was fired from his job at Los Alamos by the University of California, Los Angeles (UCLA) on March 8, 1990, under pressure from the US Department of Energy, which oversees the laboratory. The news media was informed of his dismissal by an unknown source and the stories were widely reported. While his alleged espionage was being reported, the FBI had determined that Lee could not plausibly have been the source of information on the W88 passed to China. The normative hope, yet perhaps a bit of an optimistic one given the players involved, would be that once exculpatory information is discovered that could prove one’s innocence, a FBI investigation would have been halted. However, the FBI moved forward with its investigation of Lee. Although the original espionage charge was dropped by the FBI, Lee was still charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Later, Lee filed a lawsuit against the US government and five news organizations–the Washington Post, New York Times, Los Angeles Times, ABC NEWS, and the Associated Press–for leaking information that violated his privacy.

Lee and his supporters have argued that he was unfairly singled out for investigation because he was Chinese-American. Wen Ho Lee was not the enemy but has been called a victim of the blind, unfettered power of a few men with authority. That bit of humanity that should exist in each human heart was in such insufficient quantity in the counterintelligence special agents handling his case. In his book Securing the State, David Omand, former United Kingdom intelligence and security coordinator, wrote security intelligence operations—such as counterterrorism and counterintelligence—require cooperation between security officials and civilian populations among whom threats wish to hide. In the case of Chinese intelligence, this includes ethnic Chinese émigré communities, which, at least in the US, are now suspicious of the FBI. The botched investigation of Wen Ho Lee, in Ormand’s view, appeared to be politically (or racially) motivated witch hints rather than the serious security investigations they were. To Chinese-Americans, these suspicions and resulting investigations are the natural result of an unwillingness to analyze Chinese intelligence more rigorously on the basis of evidence.

Intelligence enthusiasts may find it interestingly that in a September 25, 1977 New York Times interview, John le Carré, the renowned espionage novelist of the United Kingdom who served in both MI5 and MI6, just after publishing The Honourable Schoolboy (Alfred L. Knopf, 1977), was asked about a view implied in his earlier works that no society was worth defending by the kind of methods he had set out to expose in his books. In reply, the author stated in part: “What I suppose I would wish to see is the cleaning of our own stable and the proper organization, as I understand it, and the sanitization, of the things that we stand for. I hope by that means and by those examples perhaps to avoid what I regard as so wrong with the Soviet Union.”

Double-Agent Operations and Managing Double-Agent Operations

Olson follows his commandments with a chapter on preventing counterintelligence incursions through the development of better workplace security. Improvement may be achieved, he explains, by following his “Three Principles of Workplace Counterintelligence”—careful hiring, proper supervision, and responsible promotions. Afterward, comes the chapters of To Catch a Spy that greatcharlie appreciated the most were “Chapter Six: Double-Agent Operations” and “Chapter Seven: Managing Double-Agent Operations.” In these two chapters, Olson finally presents a classical series of demonstrations. Indeed, in both chapters, Olson provides nothing less than a mini manual for precisely what the titles indicate. Readers are favored with many of the logical principles that Olson would practice and expound during training while working in CIA counterintelligence. He provides a list of benefits US counterintelligence seeks to gain from a double agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Nihil est aliud magnum quam multa minuta. (Every great thing is composed of many things that are small.)

The tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination possessed and creative ways in which double-agents were dangled to garner interest from the adversarial intelligence service, the transmission of chicken feed, ostensibly useful yet actually useless information, for the adversary to grab, and management of nuanced communications between the double agent and his handler. Olson does not indicate whether any among the practices discussed was used by him to achieve some crowning glory of his career. Again, for readers such as greatcharlie, what was presented in this chapter was meat and drink. None of the precepts included were beyond the understanding and the abilities of most readers who would be interested in the book. He tells it all in an apposite way.

Case Studies

In “Chapter Eight: Counterintelligence Case Studies,” Olson goes into some greater detail on the principles and methods of counterintelligence. Olson carefully avoids offering what may seem to some as a mere series of tales. However, it seems that Olson’s relaxed writing style, present throughout the text in fact, may distracted some previous reviewers’ attention away from the instructive nature of the discussion. In the 12 case studies he presents, Olson also illustrates the tradecraft of counterintelligence, and where counterintelligence breaks down or succeeds. He presents, to the extent that he could, how US counterintelligence officers became fully engaged on each matter. To some degree, Olson also looks at the other side of things and discusses why people spy against their country.

Each case study is followed by a “lessons learned” section. Lessons learned are the pertinent qualities and deficiencies that Olson ascribes to each case pertinent to the ongoing work of US counterintelligence services. The lessons learned are given greater value for Olson selects only what he deems most pertinent from what he witnessed, experienced, and endured as is not presumed. Again, nothing presented in To Catch a Spy is considered in the abstract. Some might observe that absent again is the severe reasoning from cause to effect that helps to solve the case. Instead, he highlights a few points of interest in each and considerable focus is put into placing color and life into his discussion of them. Two good examples of his case studies are those concerning Ana Montes and Richard Miller.

Scott Carmichael (above) was the senior security and counterintelligence investigator for the Defense Intelligence Agency and the lead agent on the successful spy hunt that led to Ana Montes. Concerning the Montes case, Olson does not deny the fact that the DGI had done the thing very completely. Of the lessons learned, the three most important to Olson appeared to be that the DIA was wrong not to require polygraph of its new employees. He applauded the DIA for having in place a policy that encouraged employees to come forward with any workplace counterintelligence concerns that they had. The report of Montes’ suspicious behavior in 1996 turned out to be inconclusive but still served the purpose of putting her on the counterintelligence radar of DIA investigator Scott Carmichael, who he heaps praise upon. Olson also notes that penetration is the best counterintelligence. Without the FBI source to raise the alarm and put Carmichael back on the scent, Olson says Montes might have stayed in place.

Ana Montes

Concerning the case of Ana Montes, which Olson touched upon in his country report on Cuba in Chapter 3, he leaves no doubt that it was a very complicated and abstruse case. He does not deny the fact that the DGI had done the thing very completely. Olson referred to Ana Montes as a classic spy. Montes worked for Cuban intelligence for sixteen years. She was indeed the embodiment of an ideological belief concerning US policy in Latin America and most of all, a pro-Cuba sentiment, as she carried out her espionage duties for the DGI diligently and effectively. Before the smash of her unmasking, Montes was believed to be a thoroughly trustworthy officer. When colleagues learned of Montes’ betrayal, it was a crushing blow to them.

Olson reports that Montes’ views against the US role in world affairs were hardened while she studied abroad in Spain as a student of the University of Virginia. Nevertheless she would eventually find employment in the US Department of Justice and receive a top secret security clearance required for her position. The espionage problem started outright when Montes, already a federal employee, began attending night courses at the Johns Hopkins School of Advanced International Studies in Washington. Montes, likely spotted by someone working for Cuban intelligence once she was heard voicing her negative views toward US policy in Central America during the administration of US President Ronald Reagan. The Cubans, appreciative of her enthusiasm, Olson believes, Cuban intelligence insisted that she leave her job at the US Department of Justice and move to a national security organization. She secured a job with DIA. Starting as an analyst on El Salvador and Nicaragua, Montes rose to become the senior DIA analyst on Cuba.

As for her espionage work for the Cubans, Montes would memorize contents of documents she saw, summarized it at home, and encrypt the material on diskettes. She received instructions from Havana by shortwave radio broadcasts, which she deciphered on her Toshiba laptop using a special program the Cubans provided her. She would contact her handler by calling from a public phone booth and sending a coded message via her pager. She would have dinner with her handler once or twice a month with her Cuban handler in a Washington restaurant to provide him with the diskettes. Montes was lavished with praise but never accepted payment.

In 1996, an alert DIA employee, practicing good workplace counterintelligence, reported his concerns about Montes to DIA counterintelligence officer Scott Carmichael. The employee noted that Montes appeared sympathetic to the Cuban cause,  and inappropriately aggressive in seeking expanded access to sensitive intelligence on Cuba. Carmichael interviewed Montes and eventually dropped the matter. However, as Olson explained, he filed away his suspicions of her for future action. In 2000, Carmichael became aware that the FBI was looking for a Cuban mole inside the US intelligence community. Only soupçons were known about the identity of the spy, except that he or she was using a Toshiba laptop to communicate with Cuban intelligence. Carmichael immediately thought of Montes, but he had little evidence to support his suspicions against her that he had great difficulty in convincing the FBI to open an investigation.

Carmichael remained persistent in pushing the FBI to open an investigation (never give up), egged on by further aberrant pro-Cuban attitudes displayed by Montes, and his efforts finally succeeded. In May 2001, the FBI threw its notorious full court press at Montes, starting with extensive physical surveillance. It did not take long for the FBI to conclude that she was involved in illegal activity. First, she was obvious and amateurish in her surveillance detection routes, often entering a store by one door and quickly leaving by another. Second, she made a succession of one minute phone calls from public phone booths, even though she owned a car and carried a cellphone. Montes’ behavior was suspicious enough to the FBI that it was able to obtain a warrant for surreptitious entry of her apartment on May 28, 2001. She was away on a weekend trip with her boyfriend. The FBI knew that this entry would be particularly dicey if Montes was a Cuban trained spy, she could have trapped her apartment to determine the intrusion. There was, however, no evidence of trapping and the entry was successful. The FBI found a shortwave radio of the type used by spies to listen to encrypted broadcasts and a telltale Toshiba laptop. On the hard drive, which the FBI drained, were multiple messages from the Cubans to Montes on her intelligence reporting, giving her additional tasking requirements, and coaching her on her tradecraft. Olson says he is certain that the FBI computer experts chuckled when they read the instructions from the Cubans to Montes on how to erase everything incriminating from her hard drive. He further comments that she either did not follow the instructions or they did not work because the FBI recovered a treasure trove of espionage traffic. One message thanked Montes for identifying an undercover US intelligence officer who was being assigned to Cuba. It was later determined that she gave the Cubans the names of other US intelligence personnel in Cuba. She blew their cover and sabotaged their mission.

As the remainder of the story goes, the FBI continued its surveillance of Montes for another four months in hope of identifying her Cuban handler or handlers. That effort was not successful, but the FBI was able to search her purse when she was out of her DIA office to attend a meeting. Inside her purse the FBI found more incriminating material, including the page rhinestone number she used to send short corded messages to the Cubans. Olson said the fear was that if Montes detected the surveillance, she would flee. When Montes was about to gain access to US war planning for Afghanistan in the aftermath of September 11, 2001, the FBI and DIA decided that they could wait no longer. Montes was arrested at DIA Headquarters on September 21, 2001. She pleaded guilty on October 16, 2002  and was sentenced to 25 years in prison. 

Of the lessons learned, the three most important to Olson appeared to be that the DIA was wrong not to require polygraphs of its new employees. He applauded the DIA for having in place a policy that encouraged employees to come forward with any workplace counterintelligence concerns that they had. The report of Montes’ suspicious behavior in 1996 turned out to be inconclusive but still served the purpose of putting her on Carmichael’s counterintelligence radar. Olson also notes that penetration is the best counterintelligence. Without the FBI source to raise the alarm and to put Carmichael back on the scent, Montes might still be in place. DGI’s activities in the US were really a mystery. Olson did well in presenting readers with a sense of the elusive nature of DGI operatives. 

As it turned out, the case did not reach its optimal potential for counterintelligence officers engaged in the investigation were unable to use available information to track down and capture Montes’ handlers or any other elements of the Cuban espionage network of which she was a part. In his investigation, the DIA counterintelligence officer, Carmichael, was able to observe, reflect, and intuit connections based.on facts not conjure a false reality based merely on appearances. Again, it is always a capital mistake to theorize in advance of hard facts. Nevertheless, it is a common errant practice. With hard facts, one is better enabled to grasp the truth.

With regard to Olson’s suggestion that the FBI computer experts likely chuckled over the failure of Montes to eliminate incriminating evidence from her Toshiba laptop, a concern is raised. Perhaps some in US counterintelligence services may feel greatcharlie is making the whole matter seem more urgent and important than it really is, but the proper comportment, displayed and demanded by supervisors and line managers, would instead have been to remain collected and aplomb with noses to the grindstone in the squad, knowing that an unexpected opportunity to exploit a failing on the part of the adversary has shown itself. It may signal that other missteps by the adversary may be present that will allow counterintelligence officers to net an even greater quarry of foreign intelligence prey. Recognizably, stresses can cause attention to shift. (Take charge of your emotions!) However, there is the need to concentrate solely on performing the duty of the moment as best as possible. Once the case is resolved, there would be time then to reflect on its many aspects. The reputation of US counterintelligence services will not suffer shipwreck over this particular matter. Olson surely did not view at all out of order as he freely revealed it in the text.

When Montes’ handlers and the managers of her undiscovered network evaded capture, they took with them all their lessons learned. (Recall her activities were not a small matter in the DGI as the informative walk-in Olson dealt with in Prague, Lombard, was read-in on her fruitful work while he was posted in Vienna.) One could have no doubt that meant it would certainly be decidedly more difficult, after the DGI presumably made necessary corrections, to uncover their activities of officers, operatives, and informants in their networks on later occasions. Surely, they would be back. (Rather than display any good humor about the matter, it should have been handled from start to finish with solemnity, especially given the indications and implications of the case.)

KGB operative Svetlana Ogorodnikov (above). As described by Olson, Richard Miller was a disaster as a counterintelligence officer, and an FBI special agent in general. However, that aspect is key to understanding the lessons the case presents not only to senior executives and managers of US counterintelligence services, but among the rank and file of each organization. Working out of the Los Angeles FBI Office, Miller was tasked to monitor the Russisn émigré community in Los Angeles. In May 1984, a well-known member of the Russisn émigré community called Miller suggesting that they meet. It turned out the caller, Svetlana Ogorodnikov, was a KGB operative dispatched in 1973 to infiltrate the Russian emigre community in Los Angeles. She got her hooks into Miller. Miller, figuratively tied to a tether right in front of the KGB, was exactly the type of FBI Special Sgent that an adversarial foreign intelligence officer would look for.

Richard Miller

As described by Olson, Richard Miller was a disaster as a counterintelligence officer, and an FBI special agent in general. However, that aspect is key to understanding the lessons the case presents not only to senior executives and managers of US counterintelligence services, but among the rank and file of each organization. Miller was a door left open that an adversarial foreign intelligence service, in this instance the KGB, was happy to walk through, and one could expect in similar circumstances that will almost always be the case.

Olson notes that Miller was hired by the FBI in 1964. After having spent time in a number of FBI field offices, Miller landed in the Los Angeles FBI Field Office where he should have found peace. However, as Olson explains, Miller, as a result of his own incompetence did not find a happy home in that office. Olson leaves no doubt that Miller was a disaster as an FBI special agent. He was a laughingstock at the office. His FBI colleagues scratched their heads in disbelief that he had been hired in the first place. In the buttoned down world of the FBI, he was totally out of place. He was poorly dressed and noticeably careless with his grooming. His weight and physical fitness did not meet the FBI’s rigorous standards. At 5’9″ tall and weighing as much as 250 pounds, he never came close to matching the stereotypical profile of the trim and athletic FBI special agent. 

To make matters worse, Miller was hopelessly incompetent. Olson says Miller begged his FBI colleagues to give him assets because he was incapable of developing any on his own. At various times, he lost his FBI credentials, gun, and office keys. His performance reviews were consistently bad, but somehow his career chugged on. In Olson’s own words, Miller was part of the FBI culture that did not turn on its own, even at the cost of carrying dead weight. With eight children, on a special agents salary, Miller was always on the lookout for extra income. Reportedly, he stole money from his uncle in a far fetched invention scam. He pocketed money that was supposed to pay assets. He ran license plates for a private investigator. He sold Amway products out of the trunk of his office FBI vehicle. He even bought an avocado farm to profit from but it went under. Miller would eventually be excommunicated from the Church of Latter Day Saints for adultery and divorced while serving in Los Angeles.

Miller’s initial work in the Los Angeles FBI Field Office was in criminal work but he was unsuccessful at that. He was transferred to goreign counterintelligence where it was ostensibly though he would receive vlossr supervision and mentorship from the Gordian counterintelligence chief. Olson notes that additionally, foreign counterintelligence was considered a dumping ground for under performing employees Counterintelligence was not highly regarded and the best people stayed away.

In foreign counterintelligence, Miller was given the job to monitor the large Russian émigré community in Los Angeles. To do that job he was expected to mingle with the émigrés and develop contacts inside that community who could keep him informed of any indications of Russian espionage. It was not hard to imagine how Miller was perceived by the Russians with whom he came in vintage. There is no indication that Miller did anything significant during that period. His career and personal life was still spiraling downward. He would later tell estimators he sometimes took three hour lunches at a 7-Eleven store reading comic books and eating shoplifter candy bars. Viewing Miller’s behavior was becoming increasingly erratic he was counseled by his supervisor and sent in for a mental health assessment. Although found emotionally unstable, and subsequently suspended for being overweight, Miller was krot pn at foreign counterintelligence. He was allowed to hang on until he reached retirement age of 50.

In May 1984, one of the well-known members of the Russisn émigré community called Miller suggesting that they meet. The caller,, Svetlana Ogorodnikov, immigrated from the Soviet Union in 1973 with her husband Nikolai. She worked as a low level source for the FBI at one point but dropped out. Her husband worked as a meatpacker. It turned out that Svetlana was a KGB operative, dispatched in 1973 to infiltrate the Russisn emigre community in Los Angeles, and if possible, assess and develop US citizens for recruitment. She was known to make trips to the Soviet Consulate in San Francisco which the FBI would later assess were occasions when she met her KGB contact.

Olson assesses due to the timing of Ogorodnikov’s call, she likely was aware from her contact in the community that Miller was in trouble at the FBI and his personal life had become a shambles. Olson also supposes that the KGB green-lit her call after they were satisfied with an assessment of him. After traveling to the Soviet Union, where Olson believes she met with the KGB to discuss Miller, Ogorodnikov returned to the US and continued contact with him in August. She promised him cash for secrets and Miller agreed. He supplied her with secret FBI documents to prove his bona fides. Miller then met with a KGB officer. Olson explained that the KGB was not immediately satisfied with Miller. He gave his FBI credentials to Ogorodnikov who presented them to heathen  contacts in the San Francisco Consulate. The KGB wanted Miller to travel to Vienna with Ogorodnikov to meet with more intelligence officials. However, the FBI never allowed that to happen; other special agents became aware of Miller’s unauthorized relationship with Ogorodnikov. Miller was placed under surveillance by use of wiretaps, bugs, and operatives on the street.

Olson assumes Miller detected the surveillance. On September 27, 1984, he tried to convince the FBI that he was engaged in his own effort to catch Ogorodnikov. However, while being polygraphed he admitted to his malign activities. He gave Ogorodnikov a secret document. He then started keeping several other documents in his home and was prepared to present them to the KGB. Miller and the Ogorodnikovs plead guilty to conspiracy to commit espionage on October 3, 1984.

In his lessons learned, Olson focuses on the decision of Miller’s FBI superiors to keep Miller in place. He does not fault the other special agents in the office for not reporting him because Miller’s situation was well-known in the office. Olson, to some extent in the role of apologist, offers reasons for such behavior among Miller’s colleagues. Misfortune can easily come at the hands of an evil influence such as alcohol. Miller had a weakening nature to which his supervisors should have responded. Perhaps they figured they had to stretch a point in favor of a man who served for so long. However, by keeping Miller on the job, his supervisors and managers, surely inadvertently compounded the problem. They went too far to screen his many disqualifications from their own superiors, presumably to allow him to reach retirement. Miller seemingly marked his zero point when he was approached by the KGB. It stands to reason that an astute counterintelligence officer may often discover weaknesses and blind spots in himself or herself. An effort to correct the deficiency would then be in order. However, Miller was different. By all appearances, he was spent, no longer qualified to serve, but he was kept on.

On reflection, the matter seems almost ridiculous. Miller was exactly the type of FBI special agent that an adversarial foreign intelligence officer would look for. He was not a dangle, nor was he really on the prowl. He was simply a door left open to the achievement of some success by the KGB, figuratively tied to a tether right in front of them. Perhaps at the time their agents presented him as a prospect, in Moscow, they could hardly believe their luck. The opportunity was there, and the KGB operatives among the émigrés supplied the audacity to take advantage of it. 

Through his own insufficient and perhaps sympathetic investigation, he discovered no one and nothing significant among the émigrés. Anyone getting involved with an émigré community as part of a counterintelligence investigation must gird one’s loins, for with some certitude adversarial foreign intelligence services will very.likely be quietly operating among both suspicious and unwitting émigrés. The powers of such officers or operatives may seem far superior to opportunities that may present themselves, but they are deployed among the émigrés nonetheless. The erstwhile KGB and DGI, and current SVR and MSS, each organized special departments for such work. Indeed, an emigre community can very often be a milieu for spies. Perhaps Miller’s FBI superiors thought he would unlikely find trouble in the Russian émigré community, and Miller had effectively been sent to some empty corner of the room. However, they confused the unlikely with the impossible. By their experience and instincts, his supervisors should have been against Miller’s conclusions. Nevertheless, they were satisfied with his totally erroneous conclusions.

Given his history of behavior, it is very likely that during his contacts with the Russian émigré community, Miller betrayed himself with an indiscretion or two. Whatever it may have been, it was clearly significant enough to cause KGB operatives–who he was unable to detect as tasked under his original counterintelligence mission–to seize upon him as their prey. The case highlights the KGB’s–and presumably now the SVR’s–ability to figuratively pick up the scent of blood much as a shark, and recognizing there can be a good soup in an old chicken. Even more relevant to the discussion in proceeding parts of this review, it illustrated the real possibility for errant officers ro exist in plainview within the rank and file of other hardworking, diligent counterintelligence officers. Such license could only lead to some great evil. The KGB Rezident at the time would have been derelict of his duties if he had not recruited Miller, a wayward FBI special agent, who due to that errant choice made by his superiors, was placed in counterintelligence. And, given his deficiencies, it would have been a serious blunder for the KGB not to exploit all possibilities with Miller to the maximum extent.

It is likely that any other KGB comrades, who may have concealed themselves in the same roost among émigrés in which Svetlana and her confederate had set themselves and had perhaps taken to their heels once they learned those two and Miller were captured, is unclear. Further, it is unclear whether any concern was raised that there was any increased concern that other KGB operatives had continued to secrete themselves among Soviet emigre groups throughout the US. For whatever reason, Olson does not go into such details on what would have been legitimate counterintelligence concerns.

No one should imagine that this review, or any other for that matter, fully covers what Olson offers in To Catch a Spy. It presents the essence of the book, but there is so much more to discover. As humbly noted when the review started off, there nothing that greatcharlie appreciates more about such a book than its ability to stir the readers curiosity, inquiry into the author’s judgments, greater consideration of their own views on the matter, and elicits fresh insights based on what is presented. That is exactly the type of book that To Catch a Spy is. One can ascribe these positive aspects to it and many others. What one finds in To Catch a Spy is of the considerable quality. The book remains steady from beginning to end. Readers are also enabled to see the world through the lens of a man with years of experience in the world and a thorough understanding of humanity.

Whenever greatcharlie feels so enthusiastic over a book, the concern is raised that its review may be written off as an oleagic encomium. However, that is not the case, and readers will understand once they sit with the book. Despite concerns about what To Catch a Spy is missing, it would be worth reading to see what appears to lie at the base of such positions and take one’s own deeper look into Olson’s discussion. Having engaged in that process itself, greatcharlie found it thoroughly edifying. It is assured that after the first reading To Catch a Spy in this manner, one would most likely go back to the book and engage in that stimulating process again and again.

With To Catch a Spy, Olson confirmed his reputation as an excellent writer in the genre of intelligence studies. The book will also likely serve for years as an inspiration to future author’s on the subject of counterintelligence. As aforementioned, the book will surely be consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. The rudiments of counterintelligence tactics, techniques and procedures, and methods offered by Olson, to some degree, may also serve as a source for guidance Indeed, much of what is within can aptly serve as a foundation upon which they will construct new approaches. 

Further, both by what he includes and ironically by what he omits in the text, became the supplier/purveyor of a foundation upon which an honest discussion can be had among people inside and outside of counterintelligence services in free societies–well-known constitutional republics and liberal democracies in particular–can look at themselves and their organization’s work relative to the rights and interests of the citizens of the respective countries they defend. It is a conversation to which greatcharlie believes To Catch a Spy can lend support. It is a conversation in current times, especially within the US, that many citizens greatly desire to have. Without hesitation, greatcharlie recommends To Catch a Spy to its readers.

By  Mark Edmond Clark