Infrequently Raised Issues Concerning Taiwan Likely Influencing Decisions of Communist Party of China Leaders and PLA Commanders

Map of Taiwan (above). Note on the map that part of Taiwanese population lives on islands in the Taiwan Strait and the East China Sea, perilously close to the shore of Mainland China. Despite being a tacit ally, and over the years occasionally directly declared one by some hardline US politicans, Taiwan is understood internationally to be part of China, and Beijing refers to it as a province. China says it has held claim over the island since 239 AD. There could be no greater insult to Beijing than to hear Washington come close in words to declaring Taiwan to be an ally and within its sphere of influence and that maintaining its independence falls within US interests. It is uncertain how much longer People’s Republic of China President Xi Jinping and other Communist Party of China leaders will be able to stomach what they likely perceive as the shameful global image of their new China, after literally centuries of subservience to Western powers, still unable to claim its own sovereign territory from them. Examined here is how this sentiment and others infrequently broached likely influence Party and People’s Liberation Army decisionmaking on Taiwan.

It is uncertain whether the US and its allies through their words and actions have successfully mitigated the People’s Republic of China’s plans to take control of Taiwan or Beijing is simply approaching the task very methodically, on its own schedule, leaving no appearance of feeling rushed to act militarily. What is clear however, under both circumstances, it is clear that perceptions in Beijing on either will ultimately determine how China will act. What those perceptions may prove to be is of concern among the US public. An April 3, 2021 Pew research study found that 89 percent of adults in the US “consider China a competitor or enemy rather than a partner.” The percentage of those who harbored “cold” feelings toward China increased from 46 percent in 2018 to 67 percent in 2021. During the same interval, poll participants in the US who held “very cold” feelings toward China more than doubled, from 23 percent to 47 percent. More than a few foreign and national security policy officials in the US and its allies, likely hope the status quo will hold fast. Imaginably, enough simple facts could be aggregated that might go some way to explain and support that position, which might be reasonably recognized as charitable. A temper of the soul wants to live in illusion. However, it must be accepted that convincing Beijing to surrender what it declares to be its sovereignty over Taiwan, may be akin to convincing a devoted mother to surrender her child. The Communist Party of China may even say its lead by an even deeper sense of a rightful custody. This is a very dangerous business and it appears less than likely that some peaceful resolution will be found to satisfy Beijing regarding Taiwan given how both sides have staked their respective interests. Peior est bello timor ipse belli. (Worse than war is the very fear of war.)

In attempting to inspire thinking beyond the typically raised geostrategic issues concerning US dominance in the Indo-Pacific and China’s challenge to that and the stature it has acquired as it continues to grow as a regional hegemon, and get beyond the geopolitical dynamics of East versus West, Chinese Communism versus capitalism, the eventual victory of the Communist Revolution worldwide, and so on, one might successfully discover that there are other aspects to consider in looking at key elements that drive the thinking of the Communist Party of China on Taiwan. Further thinking on matters is always possible.

The intent of greatcharlie with this essay is to offer a few new ideas that may stimulate others to peer more deeply into Beijing’s ongoing actions and intentions. Most were inspired following it’s reread of Robert Spalding’s Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019), on which greatcharlie posted a book review on November 30, 2021. It is unlikely that all readers will find what greatcharlie presents as agreeable, this is most likely possible in the portions of the discussion that concerns how China may approach Taiwan militarily and the discussion on the possible influence of race and history upon thinking on the US by Communist Party of China leaders. However, sometimes making the effort to stimulate new ideas requires stepping a bit onto what might be deemed shaky ground. Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.)

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above). There could be no greater standing insult to a more audacious and assertive China than to stand by while Washington declares Taiwan, China’s own province, to be an ally and within its sphere of influence and that maintaining its independence is in US interests. According to the facts as one knows them, the US and China since 1971 have had an implicit understanding that Washington would not recognize Taiwan as a sovereign country, and China would take control of Taiwan by force. As the US since then has done as much as possible, short of recognition of Taiwan as an independent country, to provide support for the government in Taipei, one might reasonably sense that in the eyes of the Communist Party of China, the US, through its policy approaches toward the island, exercises its power over China. There is an art in the way Xi moves. If there is a way he can take control of Taiwan with acceptable loss by his calculus, he will very likely act.

Immediate Thoughts on US Regarding Taiwan That Likely Beat the Brains of Leaders in Beijing

Assessing the aggregate of sentiment expressed by the leadership of the Communist Party of China, one might posit that they believe their country’s stand, one-on-one with the US, which at one time for most of them appeared to be an indomitable power, is nothing less than heroic. At the same time, however, there is very likely some quiet recognition that Taiwan is a manifestation, a very apparent sign, of US dominance in the Asia-Pacific region. Despite being an tacit ally of the US, Taiwan is understood internationally to be part of China, and Beijing refers to it as a province. China says it has held claim over the island since 239 AD. There could be no greater insult to a more audacious and assertive China than to stand by while Washington comes close in words to declaring Taiwan to be an ally and within its sphere of influence and that maintaining its independence falls within US interests. The US approach on Taiwan has been conspicuously at variance to that taken toward China for decades on the economic front.

According to the facts as one knows them, the US and China have had an implicit understanding that Washington would not recognize Taiwan as a sovereign country, and China would take control of Taiwan by force. It is an agreement that resulted from US Secretary of State Henry Kissinger’s secret visit to Beijing in 1971. As the authorized version of the story goes, during talks with the People’s Republic of China First Premier Zhou Enlai, Kissinger agreed the US would “recognize the government in Beijing, not Taipei, as the only legitimate China.” During a November 15, 2021 virtual meeting between US President Joe Biden and Communist Party of China under People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, the issues of Taiwan’s status and security were broached. Reportedly, Biden underscored that the US was still committed to the “one China” policy, guided by the Taiwan Relations Act, the three Joint Communiques, and the Six Assurances. However, he also explained that the US was strongly opposed to any unilateral efforts to change the status quo or undermine peace and stability across the Taiwan Strait.

Given that the US for quite some time has been doing as much as possible, short of recognizing Taiwan as an independent country, to provide support for the government in Taipei, one might reasonably sense that in the eyes of the Communist Party of China, the US, through its policy approaches toward the island, exercises power over China. There may also be a belief within the Party that the US enjoys exercising that power. It is uncertain how much longer Xi and other Communist Party of China leaders will be able to stomach what they may likely perceive as the shameful image presented throughout the world of their new China, a supposed power, after literally centuries of subservience to Western powers, still unable to claim what is, by its own declarations, its own sovereign territory. All of China’s taunts of becoming the dominant power in the world appear to amount to nothing more than whistling in the wind. Certainly, regarding Taiwan, China does not display itself as the rising world power that it pretends to be. 

Surely, some foreign capitals have begun to believe Its military power and capabilities have been subject to hyperbole. Indeed, many in the world, watching it all transpire might be left with the impression that there is not a thing China can do about except lie back and take it, as unpleasurable as it may feel. An October 12, 2021 Newsweek article indicated that such feelings about the unlikelihood of China doing anything about Taiwan were recorded in a poll on the island. According to a public opinion survey released on September 29, 2021 by Taiwan’s opposition-run think tank, Intelligentsia Taipei, it was revealed that despite the apparent gathering shadows, 50.2 percent of respondents were little concerned about the prospect of war with China compared to 42.5 percent who were. Moreover, 58.8 percent believed a war with China was unlikely to happen in the next 10 years, compared to 17.6 percent who thought it was probable. A slender 2.2 percent were certain war was coming within this decade.

“Peace in Our Time”

Admirably discussed in Spalding’s Stealth War, are the matters of past US administrations’ blindness towards China’s actions and intentions and the importance of how Beijing assesses how Washington would respond to a move to retake Taiwan. In his search for a reason, a rationale, a purpose, for the current state of relations with China, Spalding, led by the data available to him explains it was the “errant” policy positions of former US administrations. At the core of those policies pursued, according to Spalding, was the misguided belief that economic development would lead the way to China’s transformation to a more democratic form of government and away from Communism. As he explains it, one is left to contemplate how such a horrifying blunder could continue on for so long. Attractive lies can worm their way into the intellect.

Regarding Beijing’s assessments on Washington’s most likely response to its taking control of Taiwan, pertinent is Spalding’s focus on how preceding US administrations perceived, constructed policies, and acted on China. It would appear that in current times, the way in which the US and its allies will respond to a move against Taiwan is how it will perceive China’s action toward its overall interests in the region. Despite what most might imagine, war may not be the obvious choice. Parsing out such concerning the US must be an ongoing process, an obsession, in Beijing at the moment. It would be part of the effort to determine how the US might react when presented with a situation as an assault on Taiwan.

Quod bellum oderunt, pro pace cum fide laborabant. (Because they hated war, they were working for peace with fidelity.) Presently from Washington’s perspective, the door must be left open to type of contrition in diplomacy. Within time perceived to be available as conflict appears to draw, there must exist an opportunity to amend a position. Hypothetically, there may be an epiphany within logic and reason that leads one side to align itself with a view closely matching the other. The expectation is for senior policymakers to master the situation through their management of it. When this is the case, they can often be more precise, to an extent exact, in policy planning, formulation, and implementation. On the other hand, policymakers can sometimes be out of touch with the real situation and act on mere perceptions and perhaps faulty inferences. Errant consilia nostra, quia non habent quo derigantur; ignoranti quem portum petat nullus suus ventus est. (Our plans miscarry because they have no aim. When a man does not know what harbor he is making for, no wind is the right wind.)

There remains the real possibility that a train of atrocious, unimaginable, grave events may come to such a head that it might be impossible to wait even an hour before taking the correct action. Fighting the type of war that the US might be required to prosecute, defeat China, thwart China’s ambitions, drive it off and forever away from Taiwan might not be characteristic of certain leaders. In taking that course, there would be the potential for millions to die in China, unacceptable losses on the side of the US and its allies. Additionally, as grotesque as the thought may be, China could potentially level an unexpected, crippling blow to US naval and air forces could also result. Indeed, what might be hoped in Beijing to be a limited lighting war attack launched in the name of protecting China’s sovereignty, could become total war, a war of national survival. (Note that there is no intention by greatcharlie to put into question the personal qualities of the men and women who have honorably chosen to dutifully serve the people to the best of their abilities.) As noted in greatcharlie’s November 30, 2021 review of Stealth War, perhaps in Washington, a decision has already been made on how to proceed in such a contingency. Perhaps the decisions on the defense of Taiwan have been established as protocols. In defense of its ally, US political leaders may be obliged to comply with them. If no such protocols exist, in the end, it will boil down to what the US political leaders want from the situation, a war ending in a type of Pyrrhic victory with losses or a struggle resulting in some acceptable or tolerable new paradigm that allows for an Irenic victory, in which the two opposing sides find some resolution and at least a modicum of satisfaction. 

During the Cold War, US assessments of a possible conflict initiated by the Soviet Union and its Warsaw Pact satellites was a surprise attack across the Iron Curtain initiated with conventional weapons. As discussed in greatcharlie’s March 16, 2014 post entitled, “Obama Urges Putin to Pursue Diplomacy; After Crimea Is Firmly Under Russian Control, Perhaps He Will”, Bernard Brodie explained in his renowned work on military affairs and statecraft, War and Politics (Macmillan, 1973): “The attack might be general along the line, intended to wipe out NATO and take over Western Europe to the Pyrenees.” However, Brodie also suggested that “there might be some variation in diminished form, like what became known as the ‘Hamburg grab.’  In the latter instance, the Soviet forces would slice around the important city of Hamburg and then leave it up to us to try to take it back—which without large conventional forces we obviously could not do unless we were prepared for a nuclear holocaust.” In contemporary times, the question of how the US and its NATO allies might respond when Russian Federation forces marched in Crimea which was the sovereign territory of a NATO partner–not a Member State–in 2014. The manner in which the US responded on the Crimean matter could possibly have enormous implications concerning Beijing’s thinking on Taiwan.

Lex talionis. (The law of retaliation.) As far as one knows, central to arguments made in Beijing to take military action to gain and retain control of Taiwan, may very well be what was central to the argument on taking all available steps to subtly exploit the US investment in China’s possible development into a more democratic society; the character of the US political leadership. Indeed, as consideration of the character of US political leaders did much to place the US in the current challenging position with Beijing, it may influence a decision by Beijing to go to war. To that extent, the nature of the one who would make the decision in the US on how to respond to China’s aggression will make all of the difference.

People’s Liberation Army Ground Force General Li Zuocheng, Chief of the Joint Staff Department of the Central Military Commission (above). As far as one knows, central to arguments made in Beijing to take military action to gain and retain control of Taiwan, may very well be what was central to the argument on taking all available steps to subtly exploit the US investment in China’s possible development into a more democratic society; the character of the US political leadership. Indeed, as consideration of the character of US political leaders did much to place the US in the current challenging position with Beijing, it may influence a decision by Beijing to go to war. To that extent, the nature of the one who would make the decision in the US on how to respond to China’s aggression will make all of the difference.

Begrudging Acceptance of a New Paradigm?

Tacit and explicit threats of a military response to an assault by China on Taiwan may with difficulty be recognized as a failed effort at deterrence. Domino theories and arguments based on the like predicting China’s systematic conquest of one US ally in the Indo-Pacific region after another may fail to gain traction among the most senior decision makers in Washington. That case would be made that all along it was recognized that Taiwan’s case was quite different from that of sovereign countries in the region. If anything, in the face of Taiwan being grabbed by a People’s Liberation Army (PLA) blitzkrieg, regional allies will need to strengthen their military partnerships and coordination with the US more than ever. In the capitals in which wisdom is exalted, leaders will immediately recognize that reality.

Though very aggressive statements may be made and every coercive tool other than war, particularly economic, would surely be used, military action that may lead to devastating attacks on regional allies, increasing the loss of life, may not be seen as the best way to establish a new dynamic with a relative world power. China in control of Taiwan might be albeit reluctantly accepted as a new paradigm.

Possible War with China over Taiwan

Forecasts of all types have been made on how a conflict between China and US and its allies will ignite. Perchance there may be points in each of some value. Perhaps some are worthy of great consideration. Still, in the end, they may prove to be in the aggregate, a mass of mistaken theories, indicating that there is no certitude or uniform position established on how the PLA will come at Taiwan. For long-time China watchers and the newly interested, the near deluge of newspapers, magazine, and broadcast and online reports up to journal articles and scholarly studies on Taiwan has left available a mass of diverse assessments, making the possibility of twinkling out the most likely scenario from the pack far more difficult. Ficta voluptatis causa sint proxima veris. (Fictions should approximate the truth in order to please.)

Reuters’ Predictions

Warplanners of the armed forces of the US and its allies surely without fail have established in their professional judgment what they believe to be the most viable. There is a fairly popular theory discussed in the US newsmedia that the PLA is waging so-called gray-zone warfare against Taiwan, lending support to the theory that China’s effort to retake the self-governed territory is already underway. Gray-zone warfare reportedly includes: an almost daily campaign of threatening military exercises, aerial and naval patrols, and all manner of surveillance. China has also used sand dredgers to swarm Taiwan’s outlying islands. In response, the US and its allies have accelerated, weapons sales to Taiwan, Taiwanese regular and reserve forces have improved readiness, stockpiled munitions, organize for asymmetric warfare: It disperses and conceals hundreds of lethal, long-range missiles capable of striking at the PLA’s superior force of warships, aircraft and targets inside Chinese have been dispersed. Further reports indicate that military planners in China, the US, Taiwan, Japan and Australia are expectedly gaming out scenarios for how an attack should launch, how the island’s defenders should act, and what the likely outcome will be. As the attacker, experts recognize that China has a range of options. Options suggested include seizing Taiwan’s outlying islands such as Quemoy and Matsu and the remote Pratas Islands, military and economic blockades, or least likely, invasion. 

An intriguing November 5, 2021 Reuters online report entitled, “Reuters Investigates T-Day: The Battle for Taiwan,” examined some of the conflict scenarios. It is based on interviews with close to a dozen military strategists and 15 current and former military officers from Taiwan, the US, Australia and Japan and drawing from articles in US, Chinese, and Taiwanese military and professional journals and official publications.

It is assessed by many of Reuters‘ military experts that top PLA commanders would likely convince Xi that an invasion, even under the most volatile circumstances, would be the biggest and most complex amphibious landing ever attempted, and is beyond the PLA’s capabilities. The alternative they foresee is an effort by China to launch a devastating air and missile attack on the island’s defenses. The military objective would be to destroy Taiwan’s military, demoralize the population and force Taipei to the negotiating table before the US and its allies can intervene.

Four PLA Dong Feng-26 (DF-26) ballistic missiles (above). The DF-46 missile is feet long, 44,000 pounds, and built to carry both conventional and nuclear warheads–was designed to obliterate aircraft carriers. It has a range of 2,500 miles, which means it can strike US warships in the western Pacific Ocean, including ships based in Japan. In order to deploy a carrier’s bombers on a mission in the South China Sea, a US aircraft carrier would have to come within the range of DF-26 and other missiles that would destroy it. The sheer amount of smaller, long-range ballistic missiles at China’s disposal and the blazing speed with which these weapons travel–six thousand miles in thirty minutes–pose, at the moment, an enormous threat to US warships.

What Must Be Remembered from Stealth War

In Stealth War, Spalding tosses into the debate on the defense of Taiwan the reality that China has thousands of precision warheads tied to a sophisticated command and control system. He expounds on this by pointing out that the Dong Feng-26 (DF-26) ballistic missile–46 feet long, 44,000 pounds, and built to carry both conventional and nuclear warheads–was designed to obliterate aircraft carriers. The DF-26 has a range of 2,500 miles, which means it can strike US warships in the western Pacific Ocean, including ships based in Japan. He gets across the idea that in order to deploy a carrier’s bombers on a mission in the South China Sea, the carrier would have to come within the range of DF-26 and other missiles that would destroy it. Though noting that the US Navy has SM-6 interceptor missiles, thought to be capable of destroying the DF-26, Spalding leaves no doubt that the sheer amount of smaller, long-range ballistic missiles at China’s disposal and the blazing speed with which these weapons travel–six thousand miles in thirty minutes–pose, at the moment, an enormous threat to US warships. To that extent, he writes: “It is conceivable that an undetected conflict might end in thirty seconds. Game over.” That is a hard saying.

Gnawing on the subject a little bit more, Spalding explains that when assessed from an economIc standpoint, the PLA constructed a $1 billion dollar missile system designed to destroy a $30 billion ship. Spalding says that there is no doubt our carriers are valuable and powerful machines. However, in plain English he also states that “their effectiveness in policing the Pacific is now extremely limited.” To that extent, ironically, the wrong message may have been repeatedly sent at an exorbitant cost. Again, introspectively, the value of the option for the US and its allies is the opportunity to rehearse cooperation, display joint power, and appreciate benefits of US leadership. Other than that and attendant technical accomplishments, in deterring China the move is valueless. In fact, no matter how necessary some action, some display would be in the face of challenges presented by Beijing to Taiwan, no greater support could be provided to the cluster of expressive hawks within the leadership in the Communist Party of China under Xi, mustering for a national war with the US.

The Digital Battlefield: A Decisive Factor?

Information and the technology used to generate, transmit, process, store, and manipulate it, has well become the primary means of obtaining an offensive or defensive advantage. Perhaps readers can cast their minds back to the era when strategists, tacticians, and military analysts were exploring the many possibilities resulting from its use in warfare. One article that greatcharlie recalls was entitled “Information Warfare: Good News and Bad News,” published in 1997 by then US Army Major Keith D. Anthony in Military Intelligence. In the 25-year-old article–which greatcharlie fortuitously discovered online, posted by the Federation of American Scientists, the author explained that military history is replete with examples of how information has been used in conflicts. He stated, “It has always been sought; sometimes it has even been used effectively, and sometimes it has been vital. The common thread, though, has been that physical engagements were still necessary to impose one’s will upon the enemy. Information warfare changes the rules.”

In the 1997 Military Intelligence article included the discussion of a translated “Military Forum” column by Zhang Feng and Li Bingyan, “Historical Mission of Soldiers Straddling 21st Century Roundup of ‘Forum for Experts on Meeting Challenge of the World Military Revolution’,” in Beijing Jiefangjunm, 2 January 1996. It reveals that over 25 years ago, the two authors recognized that this significant change had occurred in the nature of warfare, even calling it a military revolution. To that extent, one author explained, information technology is the nucleus and foundation of this revolution, for it is information and knowledge that bring change to the old practice that the military strength of an army was measured simply by the number of its armored divisions, air force wings, and aircraft carrier groups. He further stated that today, a number of invisible forces need to be taken into consideration, which include the calculation capacity, the telecommunications volume, and the reliability and real-time reconnaissance ability of relevant systems.

In the aforementioned 1996 conference paper on the burgeoning role of information technology in warfare, the notion of a digital wing of the PLA or intelligence services was nominal, only conceptualized. However, it soon became a reality. As Spalding explains in Chapter 5: “The Digital Battlefield”, in Stealth War, in making it so, it was determined that the PLA, an official security wing of the Communist Party of China, would become more than a national army, in the traditional sense of the term. Spalding goes on to explain that an organization, designated Unit 6139, became the PLA’s massive cyber warfare division. He deems it a politically sanctioned hostile military force built to prey on the West day in and day out. To that end, the PLA engages in digital assaults to access data that are both destructive–entrapping and disrupting the West by setting off digital landmines, raids, and intelligence operations–and constructive. The results of these operations–covertly harvested data–have allowed China to amass influence and power. In a political warfare mode, the goal of such work is to obtain and use influence to force other countries to cede to its way of looking at the world–how to organize society, what rights citizens should have, and encourage economic decisions that will benefit China

Spalding writes that by 2008, several published reports indicated that the Chinese government was paying tens of thousands of citizens 50 Chinese cents–the equivalent of 7 US cents–each to write an independent post promoting Party policy. By 2013, China’s state-run media reported that the propaganda wing of the Communist Party of China had hired 2 million “public opinion analysts.” Spalding assesses that number has climbed since, aided by an estimated 10 million student volunteers, who also engage in monitoring and disinformation work, both at home and on foreign websites. Meanwhile, the PLA’s force of hackers, continued to wander with near impunity, hidden, putting US counterintelligence in their shade, and continues to bombard US companies, government agencies, and political parties today

Perhaps it is bitter thIs, but an assault on Taiwan will be the occasion that among the near countless pieces of secret information, intellectual property, and actual technologies collected by China’s intelligence services, there was everything needed to thwart a successful defense of Taiwan. For the those wretched citizens and legal permanent residents of the US, who were accepted and ascended to positions of importance enough in their government, corporate, high-tech, or academic institutions to be sought out by Chinese intelligence officers and due to venal, self-interest, ideology, conspiracy, or dispaysment and love of homeland, chose to betray their country, as well as their organizations, colleagues and fellow citizens, perhaps there will be satisfaction knowing their villainy led to a prospective tragedy. For those whose responsibility was to halt the capture of key information and technologies that may have led to some tragic outcome and intercept Chinese intelligence officers who encouraged betrayal, there would surely be, among those really interested, a great burden of failure and loss, guilt and regret, to bear which could potentially take a lifetime to heal, if ever

Xi (above) during an inspection of the command center of PLA’s Joint Battle Command. The battle-dress camouflage uniform indicates that he is Commander-in-Chief of the PLA’s supreme Joint Battle Command. Xi is the long-time Chairman of the Central Military Commission. How China manages to pull Taiwan back in its fold permanently may not be as important to Xi as just getting hold of the island. Securing the island quickly with as few losses in personnel and material as possible, may require something a far cry from using the operational art, and acting with combined arms decisively to conquer territory. That may require both the complete destruction of the military capacity of Taiwan, and the complete and total destruction of property and eradication of those living there. A strategy of this type is known in military terms as a “battle of annihilation.” PLA commanders and warplanners would surely be prepared to execute such.

Pertinent Concerning Thinking of Communist Party of China Leadership and PLA Commanders about Taiwan

How China manages “to pull Taiwan back in its fold permanently” may not be as important to Xi as just getting hold of the island, again, as it is what the Communist Party of China “knows” to be China’s sovereign territory. There are military options available for reclaiming Taiwan that take a turn toward the sinister. Securing the island quickly with as few losses in personnel and material as possible, may require something a far cry from using the operational art, and acting with combined arms decisively to conquer territory. Achieving that military objective may require both the complete destruction of the military capacity of Taiwan, and the complete and total destruction of property and eradication of those living there. A strategy of this type is known in military terms as a “battle of annihilation.” PLA commanders and warplanners would surely be prepared to execute such.

Such thinking should not be deemed too fanciful or alien. To keep the discussion of the postulation brief, a model to ponder in order to better understand such an approach could be measured against how China’s military partner, the Democratic People’s Republic of Korea (North Korea), has made the complete destruction of the capital of the Republic of Korea (South Korea), its most likely adversary, central to its defense. Indeed, it is well-accepted that North Korea has had an estimated 200,000 artillery pieces aimed at Seoul for quite some time. Ostensibly, the threat of the destruction of Seoul from the North Korean perspective was established as a deterrent to any thoughts the South Korea’s most powerful ally, the US, might have of invading and reuniting the island by force. Yet, from another perspective, the destruction of Seoul would avoid the need to capture it by ground assault. The decisionmakers and warplanners in Pyongyang have never been under any illusion that the government in Seoul would allow the North’s control of its capital and an urban battle similar to those witnessed during World War II in places such as Stalingrad (1942), Caen (1944), Manila (1945), Berlin (1945), to name only a few would delay offensive action and drain resources for initial attacks on other critical points as well as likely plans for decisive engagements in depth. With this in mind, it may not be as difficult to consider that thinking in Beijing concerning a PLA assault against Taiwan, mutatis mutandis, may be similar in concept to that of Pyongyang for Seoul. The destructive effort, of course, would be on a far larger scale. The defense of Taiwan will be ferocious. Its struggles against China’s opening attacks, however, would appear self-destructive and self-defeating. Ostensibly, the sheer weight and power of the PLA juggernaut as organized would overcome whatever defense Taiwan might have in place. On Taiwan, the scene would be nothing less than apocalyptic.

With regard to a likely decision to attack essentially all structures on Taiwan, it must be considered that the independently minded Taiwanese government falls into one of the categories of what the Communist Party of China declared to be the “five poisons.” Those five include: Uyghur advocates of the East Turkestan Independence Movement; Tibetan advocates of the Tibetan independence movement; believers of the Falun Gong; followers of China’s democracy movement; and, adherents of the Taiwan independence Movement. Looking at the matter from that angle, one might imagine leaders of the Communist Party of China long ago recognized that even if China captured the island and gained control of what remained of its civilian population, surely the work of re-education could far surpass the level of exertion put into the Uyghurs, Tibetans, and people of Hong Kong combined. Re-education indeed may have been assessed to be so difficult that it may not at all be a part of reconstruction and rejuvenation planning for the island. The sinister solution would be to mitigate the problem during the military assault. Those Taiwanese who might remain, the survivors, would most likely be relocated, probably dispersed. Far worse acts against the people–for instance the Great Leap Forward and the Cultural Revolution–blaze on the pages of Communist China’s history. The Communist Party of China’s leaders would likely be concerned that spectacle of re-education camps on the island, following a destructive assault, would hinder any post-assault diplomatic efforts to create normalcy and do much to put China’s claim to a world in jeopardy, especially given the world’s reaction to camps in Xinjiang.. Imaginably, Xi would want to avoid that after the military assault

Among those in the world rightly concerned with the circumstances of ethnic and religious minorities in China, the moral fiber of Xi has certainly been looked upon darkly by. As aforementioned, the Uyghurs, Tibetans, as well as Falun Gong and Christians are roughly handled, pressured to uncouple from their culture and traditions, philosophies, and religious tenants and assimilate into culture and beliefs of Chinese Communism. If Xi can be viewed as contorted morally on those issues and just for being able to direct state security organs to act monstrously against his own citizens on mainland China in the name of preserving the integrity of the Communist Movement and the country, and putting counterrevolutionaries and reactionaries, and organized and individual criminals, there should little doubt that Xi would do whatever he thought was necessary to gain and retain control of Taiwan.

Ethnic Uyghurs standing in formation in a secured facility (above). China’s Xinjiang region is home to around 10 million Uyghurs, Turkic Muslim people by identity. In a report released on April 19, 2021, Human Rights Watch accused the Chinese government of engaging in a systematic campaign of human rights violations against Uighur Muslims in northwestern Xinjiang, an autonomous region in the country. Up to 1 million people, or about 7 percent of the Muslim population in Xinjiang, have been incarcerated in an expanding network of “political re-education” camps, according to US officials and UN experts. One might imagine leaders of the Communist Party of China long ago recognized that even if China captured Taiwan and gained control of what remained of its civilian population, surely the work of re-education could far surpass the level of exertion put into the Uyghurs, Tibetans, and people of Hong Kong combined. Re-education indeed may have been assessed to be so difficult that it may not at all be a part of reconstruction and rejuvenation planning for the island when captured. The sinister solution would be to mitigate the problem during the military assault. Far worse acts against the people–for instance the Great Leap Forward and the Cultural Revolution–blaze on the pages of Communist China’s history.

Taiwan Pummeled?

The prospective unending aerial and naval bombardments and a long range missile onslaught from mainland China would not resemble what may already be expected and planned for. As aforementioned, there is the belief that attacks with firepower will be used not only to weaken Taiwanese forces, but destroy morale on the island and force the Taipei government to the negotiating table. However, that would take a considerable amount of time to achieve. There is a line of thinking characteristic of analyses of what is likely to happen in the event of a Chinese assault on Taiwan that leaves time available for friendly action. Sentiment should never serve as a substitute for true feeling and fact. One could be assured that the lapse of time between a prospective Chinese assault on Taiwan and the movements of the US and its allies in response has been factored into any strategy developed by PLA commanders and warplanners. Within that interval, whatever calculation of that time and distance has been predicted by PLA warplanners for the movements of their opposition, would likely be the time frame set for successful action. It would be that anticipated time frame the Communist Party of China will expect Taiwan to fall into its hands.

The bombardment of Taiwan hypothesized here would be of a size that would exponentially surpass even those witnessed during the earliest days of Operation Enduring Freedom in Afghanistan in 2001. More structures would likely be destroyed on Taiwan in the initial hours of the attack than had been built in its first 50 years. The number of lives lost on the island after a pummeling as foreseen might possibly be qualified as Biblical. 

The situation that Taiwanese military and security forces face brings to mind the French song and military march, “Le Régiment de Sambre et Meuse” by Robert Planquette and Paul Cezano. The lyrics concern a regiment that battled the Austrians in 1794 to defend the emerging French Republic. The march was composed in 1870 in an effort to raise patriotic feelings within the French public following their country’s defeat during the Franco-Prussian War. “Sambre et Meuse” is the name of a former French province that is now part of Belgium. In the fourth verse, the lyrics state: “Le nombre eut raison du courage / Un soldat restait – le dernier! / Il se défendit avec rage / Mais bientôt fut fait prisonnier. / En voyant ce héros farouche / L’ennemi pleura sur son sort / Le héros prit une cartouche / Jura, puis se donna la mort.” (Numbers prevailed over bravery. / A soldier was left standing. The last one! / He defended himself furiously, / but soon was taken prisoner. / Seeing this fierce hero, / the enemy took pity of his fate. / The hero loaded a cartridge, / cursed, then took his own life.) There is ample reason to believe China would do its worst in an effort to take control of Taiwan. If it takes untrimmed, the drastic, destructive course described here, it is likely that much as the “Régiment de Sambre et Meuse,” Taiwan as it exists today, after its capture by China, would attain immortality in memory, and perhaps also go on living only in verse. C’est une situation extrêmement désagréable.

Taiwanese soldiers in training (above). The bombardment of Taiwan hypothesized here would be of a size that would exponentially surpass even those witnessed during the earliest days of Operation Enduring Freedom in Afghanistan in 2001. More structures would likely be destroyed on Taiwan in the initial hours of the attack than had been built in its first 50 years. The number of lives lost on the island after it was pummeled might possibly be qualified as Biblical. Both pleas and demands for China to halt its action as well as fierce protests and condemnation from capitals world-wide and international and regional bodies would surely be expected and most likely be disregarded. Beijing doubtlessly would have some plan formulated well in advance to deal with such matters after Taiwan was firmly in China’s hands.

Assessing Beijing’s Likely Thinking Correctly

In greatcharlie’s February 26, 2021 post entitled, “Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts,” included was an excerpt from an intriguing story by Clarice Lispector published in the Winter 2011 edition of the Paris Review, entitled, “A Story of Great Love.” Lispector writes a sentence that is conceptually germane as well to what is discussed here: “Once upon a time there was a girl who spent so much time looking at her hens that she came to understand their souls and their desires intimately.” The leaders of the Communist Party of China and PLA Joint Military Staff are certainly not hens. Still, the notion that deeper look into their respective thinking to include emotional concerns and reactions is surely valid, even if it requires giving room to intimations and “informed speculation” in the abstract. Here are a few thoughts on other ways in which Beijing may view the Taiwan matter through its lens.

Political and Economic Competition

Most often in US newsmedia commentary on China’s arguments on the difference between the US and itself, centrality is given to the difference in political systems. In a November 8, 2021 article in the Economist, it was explained that if all goes to plan for the Communist Party of China in 2022, political events in the US will ostensibly offer a study in contrasts that humiliates the US. The article suggests that China’s leaders, reading opinion polls, expect the Democratic Party to suffer a considerable set-back in the mid-term Congressional elections in November. Beijing hopes a divided government with all of its uncertainties, including gridlock, would be the possible result. If all of this transpired, supposedly China’s propaganda machine would be presented with a new chance to declare that “China enjoys order and prosperity thanks to one-party rule,” while US-style democracy “brings only chaos, dysfunction and decline.” Interestingly, if such is indeed their strategy, then the Communist Party of China’s propaganda wizards will likely find themselves moving down a blind alley. The outcome of this premeditated ideological collision would be nothing to signify.

If economics were the determining factor of a choice by the Communist Party of China to move on Taiwan, on its face there would be little chance of military action. Capitals world-wide and international and regional bodies would react harshly and the impact on China’s economy would be catastrophic. Recognizing that and hope Beijing could be brought back to reality, on the onset of an assault, both fiery demands for China to halt its action, some even accompanied by threats of military action. However, such would surely be expected and most likely be disregarded. Beijing doubtlessly would have formed a picture of what that period would look like and some plan formulated well in advance to deal with such matters after Taiwan was in China’s control. 

The Communist Party of China may calculate that China through its products and the production of those for others is sewn into the lives of nearly everyone in the world. Although foreign capitals, particularly those of highly industrialized countries, would strenuously condemn and do the maximum to isolate China, ensure its status as a pariah, they would not really want to do so. While they would take every measure possible to inflict pain and bring China to its knees, they would very unlikely cut themselves off from it for the long-term. Beijing would likely assess that political leaders in capitals world over would need to calculate what cutting their countries off from China would mean for their own economies, businesses, and institutions, as well as their own citizens’ pocketbooks. An improvement in relations sooner than later would be expected. Finely detailed plans for rejuvenating China’s economy have likely been formed and continuously updated and upgraded in case events move in the direction of war. However, until a positive change in relations got underway, the people of China would need to make do, but do so knowing that the Taiwan province was firmly in their hands.

Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi (center), and People’s Republic of China Foreign Minister Wang Yi (left), in Anchorage, Alaska in March 2021. Communist Party of China leaders–though not being absolutely certain, greatcharlie will nevertheless go out on a slender thread here to ascribe the trait to Xi himself–appear to hold considerable animus toward the US. Of course, there have been waves of what has been dubbed anti-foreigner sentiment propagated by Communist Party of China leaders before. The primary case was China under Mao in the 1950s and 1960s. However, the issue of race as posited here is something different as the sentiment is not some political tool or mechanism for social control. It goes to self-esteem. self-worth, self-image. Indeed, an inner awareness, sentiment intérieur, of the racial dimension of China’s history with the US may attend Communist Party of China thoughts, beliefs, sensations, and passions, albeit very negative, toward it. To that extent, the impact on individual leaders, their attitudes and policies could possibly be strong.

Race and History

What is rarely broached is the Communist Party of China leadership’s thinking on the somewhat inviolable issue of race and history. Indeed, though seldom in the forefront of discussion and analyses, it may have a greater importance in thinking on China’s side than one might imagine. To that extent, it might influence decisionmaking on Taiwan as it concerns the US response. Further, it may influence the Party’s perceptions and actions in the face of rebuke and “punitive actions” from the US in the aftermath of Taiwan’s capture.

Communist Party of China leaders–though not being absolutely certain, greatcharlie will nevertheless go out on a slender thread here to ascribe the trait to Xi himself–appear to hold considerable animus toward the US. Of course, there have been waves of what has been dubbed anti-foreigner sentiment propagated by Communist Party of China leaders before. The primary case was China under Mao in the 1950s and 1960s. Things foreign were purged. The foreigner was the enemy. However, the issue of race as posited here is something different as the sentiment is not some political tool or mechanism for social control. It goes to self-esteem. self-worth, self-image. Indeed, an inner awareness, sentiment intérieur, of the racial dimension of China’s history with the US may attend Communist Party of China thoughts, beliefs, sensations, and passions, albeit very negative, toward it. To that extent, the impact on individual leaders could possibly be strong.

Perchance, on some far deeper level, the leadership of the Party may want to leave no doubt that the men calling shots today in China are not little coolies who came to the old West to labor on the railroads sporting shaved heads and queues–ponytail first worn by the Jurchen and Manchu peoples of Manchuria, and later was required to be worn by male subjects of Qing Chinai–an indication of submission, who unfortunately suffered incalculable indignities at the hands of their exploiting hosts.

Party leaders likely want to leave no doubt that China’s military is not the same lesser-skilled and equipped, albeit courageous force, that suffered atrocious losses nearly a century later during the Korean War. China, then under Mao Zedong chose to go into North Korea to support the Communist Movement led by Kim Il-sung, providing far more than their partners in the Soviet Union. Apocalyptic size casualty lists resulted from frontal assaults, human wave attacks, on hilltops dubbed by US forces with names such as the Ice Cream Cone, Punchbowl, Heartbreak Ridge, Hill Triangle, Hill Eerie, Jane Russell, Old Baldy, T-Bone, and Pork Chop. Although these battles are long forgotten to the great majority in the US, are doubtlessly firm in the minds of Communist Party of China leaders and one might imagine stories of relatives lost are likely still told within a sizable number of families in China, too!

Party leaders likely want to leave no doubt that they are aware of, what they may believe are, prevailing images and impressions of the Asian male, particularly the Chinese male, are in the West. Statistics may show that some change has occurred and more positive, politically acceptable images of Asians in the US and the West in general are now the norm. According to a new Pew Research Center survey produced in this era of COVID-19, the vast majority of Asian adults (81%) also say violence against them is increasing, far surpassing the share of all US adults (56%) who say the same. To go further, it appears to be the case empirically that negative impressions of the Asian male, and most relevant here, the Chinese male, have seemed to stick. Suffice it to say they are still often portrayed appallingly in Western entertainment media as amusing little men, most often comedic, socially inept, even pathetic, stubborn and suspicious, brash and insufferable, and exuding scattered energy.

An awareness of Western impressions of the Asian male as noted here appears to factor into thinking, planning, and action at many levels in international affairs. As reported in greatcharlie’s May 24, 2021 post entitled, “Food for Thought for US Companies Maintaining Robust Operations in China despite Beijing’s Strained Relations with Washington”, during a bilateral meeting in Anchorage, Alaska in March 2021 between a US delegation led by US Secretary of State Antony Blinken and US National Security Adviser, Jake Sullivan, and a People’s Republic of China delegation led by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi, there was a heated diplomatic exchange. As the story goes, Blinken started the meeting off by telling the delegation from China that the US intended to address “deep concerns” over the treatment of the Chinese citizens in Xinjiang and Hong Kong and the situation with Taiwan. However, Yang responded boldly, taking a bit of time to express sharp criticism of the US over what he described as its struggling democracy, poor treatment of minorities, and over its foreign and trade policies. Yang, as well as Wang when he spoke immediately after him, comported themselves with a certain astringency. Their words were unkind and ungenerous, ostensibly designed to embarrass the new administration in Washington.

A large part of communication comes down to tonality, how one sounds. The choice by Chinese officials to respond angrily was at the time explained by and large in the US newsmedia and foreign policy circles mainly to be a matter of expediency. Perhaps instead, the words of the Chinese officials reflect more what greatcharlie has previously described as the Communist Party of China’s unsheathed antipathy toward the US. One might not be going too far to state the words spoken by Yang, a senior member of the Communist Party of China. smacked of something more personal.

Sensibilities on race and history may also account in part for the popularity and acceptance of the Communist Party of China and the population in general of the recent compensating and repairing image of “Wolf Warrior” in the Chinese film industry. Released in 2015, “Wolf Warrior” presents the adventures of Leng Feng, a PLA special operations sniper who is as tough as nails, smart, and near invincible. He is also popular with females, including his special operations commander, the beautiful Long Xiaoyun. Its sequel, “Wolf Warrior 2,” released in 2017, was the highest grossing film of all time in China.

Stirring poster for the film “Wolf Warrior” (above). Sensibilities on race and history may also account in part for the popularity and acceptance of the Communist Party of China and the population in general of the recent compensating and repairing image of “Wolf Warrior” in the Chinese film industry. Released in 2015, “Wolf Warrior” presents the adventures of Leng Feng, a PLA special operations sniper who is as tough as nails, smart, and near invincible. He is also popular with females, including his special operations commander, the beautiful Long Xiaoyun. Its sequel, “Wolf Warrior 2,” released in 2017, was the highest grossing film of all time in China.

Perhaps the mere thought of these indignities, as well as others, super charges the desire among leaders of the Communist Party of China, at the far end of the spectrum of possibilities, to obliterate both the memory and the progenitors of the offenders, generally. As such, it might also be an attendant element of Xi thinking, it may not be too fanciful to believe that he would enthusiastically take on the West via an assault on Taiwan to do his part to forever wipe away the image of the little people of China who are available to be bullied and a country, despite its achievements is merely tolerated as a player on the international stage, and spoken of in foreign capitals as an annoyance or nuisance as much as anything else. Lessons of China’s Communist Movement perhaps suggest to him that the habit of a lifetime for many in the world of viewing the Chinese people in such a condescending way cannot be altered by anything except an appropriate display of force. Etiam sapientibus cupido gloriae novissima exuitur. (The desire for glory is the last infirmity to be cast off even by the wise.)

While one could imagine that thoughts of issues concerning race and history might often inflame even Xi’s sense with ardor to lash out with China’s newly minted military might. Yet, to the knowledge of greatcharlie, Xi is not at all known for being hotheaded or indiscreet when discussing national security issues or  foreign relations, at least not publicly. Surely, if such moments of madding fever have at all occurred, doubtlessly sangfroid and equanimity have prevailed over them. Any strong feelings are harnessed and redirected in calibrated ways in actions against the interests of what might be deemed in Beijing as the main opponent. From what has been presented publicly, it seems that national leaders who have talked with Xi have not encountered or have failed to discern any thinking or attitude of this kind. If he has been able to hold such within, perhaps it could be said that Xi, a complex man, perhaps has mastered the art of being all things to all people, but never at last to be a particular thing to anyone. What is also known publicly is that national leaders leave talks with Xi feeling they understand him and have handle on matters concerning China. Alas, they very seldom do. 

While the issue of race and history may be looked upon as a supposable issue and among those belonging to the far side of analyses on Communist Party of China thinking concerning a possible military assault on Taiwan or worse viewed to be of no-account. Some internationally may perceive this discussion as a projection of the dysfunction on race and ethnicity that has long-plagued the US. Nevertheless, race and history may indeed be a very impactful factor if the US hopes to negotiate an agreement with China that will help sustain the relative peace, slow the marshaling of forces and other requisite preparations on the mainland for an assault on Taiwan. The influence of thoughts about race and history, as partially outlined here, is surely within the bounds of possibility. Issues of race would not be some element alien to the consciousness and the decisionmaking of the leaders of the Communist Party of China. If one were only remotely aware of how the Communist Party of China has responded to the Tibetan, Uyghur, and other Muslims, as well as people of Christian faith and others, issues aforementioned in this essay, the claim could hardly be made that race would unlikely be an issue of concern to the Party’s leadership.

A fuller discussion or argument on these points will certainly not be presented here. Imaginably, there may be the urge among some reading what little has been discussed here to dismiss the matter as a possible peripheral issue, however, for all one knows the matter may very well factor into the thinking of the Communist Party of China leaders specifically on the Taiwan issue. That makes it worthy of consideration. All doors inside the thinking within the Communist Party of China leadership must be opened and the interiors that they open to must be fully examined.

A rare public expression of disapproval in Xi’s countenance (above). While one could imagine that thoughts of issues concerning race and history might often inflame even Xi’s sense with ardor to lash out with China’s newly minted military might. Yet, to the knowledge of greatcharlie, Xi is not at all known for being hotheaded or indiscreet when discussing national security issues or  foreign relations, at least not publicly. Surely, if such moments of madding fever have at all occurred, doubtlessly sangfroid and equanimity have prevailed during them. Any strong feelings are harnessed and redirected in calibrated ways in actions against the interests of what might be deemed in Beijing as the main opponent.

The Way Forward

Est tempus quando nihil, est tempus quando aliquid, nullum tamen est tempus in quo dicenda sunt omnia. (There is a time when nothing may be said, a time when something may be said, but no time when all things may be said.) While recognizing in current analyses that major challenges exist, it may be worth giving consideration to the idea that too much of what is intrinsic to the thinking of US policymakers and warplanners–at least on the surface for that cadre–is being projected on Xi, the Communist Party of China leadership, and the Chinese military command and warplanners. Perchance in Beijing, they would gladly accept that outcome as there would be nothing better than to have decision makers of their main opponent blind as beetles. They would relish discovering that those decision makers have been clouding and obscuring their own thinking and negating what may be a deeper awareness when the pieces of what is known are out together in the subconscious, absent thoughts of political leaders’ expectations. Of course, they indubitably hold themselves to the duty of speaking truth to power as Spalding has in Stealth War and throughout his military career, but they may be ignoring and obviating what may twinkle in their intuition and intimations, and as a result, some analyses perhaps are being driven in the wrong direction. There may be the chance that greatcharlie is ruminating on something here that some US warplanners may feel unable to say themselves under current circumstances. The odds are not enormously against this theory being a reality. Yet, entertaining a discussion of these issues would doubtlessly disrupt routine examinations and responses. That is a hard saying. Hopefully, there is currently no place for intransigence. Certainly, discernment is always required, but with regard to China, no precaution should be neglected.

In previous posts on Chinese intelligence operations in the US, greatcharlie has suggested that if firm understandings of how the Chinese operate in the US and lessons learned regularly are aggregated with thinking from outside he national security bureaucracies, new lines of sight may be opened into difficult problems by which old hands in the US counterintelligence services would surely find advantage by including in their analyses. Ostensibly, the thinking of those fromm the outside would not be biased by any existing theories and prescriptions. Perhaps a similar recommendation could be made on the matter of how China may move against Taiwan. Based on how things appear and continued lack of real success, it would seem greatcharlie’s cautious appeals for US counterintelligence services to seek assistance from certain recherché thinking individuals from outside the national security bureaucracies, who could possibly help to resolve the conundrum of the Chinese espionage storm, amounted to watering dead plants. One might reasonably get the impression the matter is just not a real emergency, not that important. Alas, with that track record as a measure, it seems unlikely there would be a belief that any step in the direction of seeking assistance from external sources on the Taiwan matter would accomplish anything greater. Somehow, left to their own devices, they may move from where they are to where they ought to be. Fata volentem ducunt, nolentem trahunt. (Fate leads the willing, and drags the unwilling.)

Book Review: Robert Spalding, Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019)

A B-2 “Spirit” Stealth Bomber (above). Though Robert Spalding’s Stealth War: How China Took Over While America’s Elite Slept bears the name of the exquisite machinery depicted, the book actually concerns something different. Stealth War refers to how China has quietly waged a six-front war on the economy, military, diplomacy, technology, education, and infrastructure of the US, and has been winning. Spalding provides piercing judgments, a novel-like reporting of actual events, and a clarity that allows him to cast a cold eye on China policy analysis and intelligence analysis both past and present. He has interestingly taken his own dissatisfaction, disappointment, and anger over how badly the US has handled China, placed the country in some danger, and safely expressed it on paper, turning it into a positive force to better understand how things have taken shape and how events are unfolding before the eyes of every US citizen.

As of late, there has been an altogether different spring in Beijing’s step. Without a shadow of doubt, Beijing now has a broader attitude towards Asia, a broader attitude towards the world, than it ever had before. Very convinced men and women in China awake each day invigorated with the idea that their country will soon be the dominant power in the world. Some might say it has been a long-standing perspective held among Chinese Communists. However, it would appear this view is being clinged to stronger now than ever. Long ago, Beijing formulated a long-term plan to eventually become the world’s dominant power. That plan has been underway without pause for decades. Few who planned it, lived to see the type satisfying results that have blossomed in recent years. Surely, People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping hopes that under his leadership, the long sought goal of dominance will be achieved. In statements and speeches, he has often assured the Chinese people that the hopes and dreams of the Party and the people will be manifested. Though the idea of China being the world’s dominant power may be a pleasurable thought in Beijing, the moral and ethical implications are remarkably overwhelming. The notion of China achieving that goal is a frightening prospect, terrifying leaders in other countries whether its friend or foe.

US President Joe Biden recently reminded before a Joint Session of the US Congress that “Our greatest strength is the power of our example, not just the example of our power.” Perhaps many Asia observers and analysts would agree that such is not the case for China. Despite having the structure, a perceptible veneer to those unfamiliar with its ways, of being a multiparty system at the national level, for all intents and purposes, China is a single party, Communist, authoritarian state. The course of its leadership of the world might follow the same pattern as China’s censorship approach. Whatever China wanted would be dictated and punishment would closely follow behind its threats to those who disobey Beijing. The dynamics of relationships with cautious allies as the Russian Federation, for instance, would change, as China would likely want it at least to be tacitly understood that it was the “senior partner,” the leader. Discussion about China and its moves toward becoming the dominant world power is no longer outside the realm of even everyday conversation among the US public. If the people were provided with the full facts on China’s rise in competition with the US it would likely take the breath away of many. China stands convinced of the correctness of both its points of view and its actions.

The subject of this review, Robert Spalding’s Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019), has been promoted as a book which discusses how China has quietly waged a six-front war on America’s economy, military, diplomacy, technology, education, and infrastructure, and has been winning. It might be enough for greatcharlie just to describe Spalding’s exceptional achievement with Stealth War as providing piercing judgments, a novel-like reporting of actual events, and a clarity that allows him to cast a cold eye on China policy analysis and intelligence analysis, both past and present. However, Spalding, even more, has interestingly taken his dissatisfaction, disappointment, and anger over how badly the US has handled China, placed the country in some danger, and safely expressed it on paper, turning it into a positive force to better understand how things have taken shape and how atrocious events are unfolding right before the eyes of every US citizen.

Although packed with excellent suggestions, the book is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, military, diplomatic, economic, political, and information (media) power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction. Have no doubt that as a retired US Air Force Brigadier General, Spalding is well up on how the US could take on China militarily, and win. Spalding has presented his findings and judgments in such a way to plant good, well-thought out, seeds with the hope they will take root well. It is difficult to see how policy analysts and policymakers in the US, Democrat or Republican, would not recognize that Spalding is largely in the right.

In this review of Stealth War, greatcharlie hopes it can demonstrate how those reading the book for the first time will be provided a full picture on the matter. Hopefully the review will spark their exploration of the book to see what they can draw from Spalding’s meditations. For those who have already read Stealth War, this review hopefully will provide an opportunity to consider perspectives not thought of during their first look. In this review, greatcharlie will not run through Stealth War chapter and verse as it typically has in preceding book reviews. While still offering what it may humbly call its well-considered opinions and commentary, greatcharlie will discuss what it feels is the essence of the work, how Spalding stirs the development of perceptions and insights through the manner in which he presents his facts. Admittedly, being somewhat assiduous over facts in reviews, greatcharlie has often been somewhat prolix. A conscious effort has been made by greatcharlie to avoid again presenting what one reader acidulously, and lyrically, described as “a typical edifying, yet verbose greatcharlie review.” There is no desire to create a challenge for some readers to stay onboard with a post until the end of the ride. (Despite our deeming it necessary to do so, greatcharlie apologies to all readers for severely curtailing the discussion of the text of Stealth War in this review. It is recognized that Stealth War is a book of such quality that some readers might view taking such a step as a sort of malfeasance.)

Acknowledged as the master of the heroic couplet and one of the primary tastemakers of the Augustan age, British writer Alexander Pope was a central figure in the Neoclassical movement of the early 18th century. In “An Essay on Criticism,” a didactic poem first published anonymously in 1711 when the author was 23 years old, in greatcharlie’s humble view superbly gets to heart of the reviewer’s mission, explaining: “But you who seek to give and merit fame, / And justly bear a critic’s noble name, / Be sure your self and your own reach to know, / How far your genius, taste, and learning go; / Launch not beyond your depth, but be discreet, / And mark that point where sense and dulness meet.”

The author of Stealth War, Robert Spalding (above), is by no means an outsider with special access, looking in on the situation. He is an erstwhile insider, who worked within the deepest points, most grave points, of the US military and other national security bureaucracies. It must be noted that being a former US Air Force brigadier general, B-2 Stealth bomber pilot and unit commander, among many other accomplishments, Spalding was a member of an unique, elite caste of military officers who are not quick to speak out, do not lightly show emotion, at least publicly or react because of it, never fret over a perception without the full facts, would hardly speak idly, and whose views when expressed should be taken very seriously. Spalding spoke truth to power at the Pentagon and the White House, and speaks of only what he knows to be the truth in Stealth War. His scruple does him much honor.

The Author

Robert Spalding retired from the US Air Force as a brigadier general after more than 25 years of service. If US Air Force officers were listed by achievements–perhaps they are somewhere in the Pentagon, Spalding would surely be among the luminaries. His Air Force biography provides the best picture of the experience and knowledge he possess. Minus his list of educational accomplishments, it reads as follows: “General Spalding received his commission through Fresno State University’s ROTC program in 1991. He earned his doctorate in economics and mathematics from the University of Missouri at Kansas City in 2007. The general attended undergraduate pilot training in 1993, and was subsequently assigned as a B-52 Stratofortress co-pilot in the 5th Bomb Wing at Minot Air Force Base, North Dakota. He subsequently transitioned to the B-2 Spirit at Whiteman Air Force Base, Missouri. In 2001, he was selected as one of three Air Force Olmsted Scholars, and was a distinguished graduate of Mandarin Chinese language training at the Defense Language Institute in Monterey, California. Afterward, the general attended Tongji University in Shanghai as a graduate research student. He then returned to Whiteman Air Force Base as a B-2 evaluator pilot and assistant director of operations for the 393rd Bomb Squadron. The general was then assigned to the Office of Secretary of Defense’s Prisoner of War Missing Personnel Office as the military assistant for the deputy assistant secretary of defense. During the Iraq surge in 2007, General Spalding deployed to Baghdad and directed the Personal Security Coordination Center. After a stint at the Air War College at Maxwell Air Force Base, Alabama, he was reassigned to the B-2 at Whiteman Air Force Base. While at Whiteman Air Force Base, he was the chief of safety, operations group commander and vice wing commander. He was then selected as a Military Fellow at the Council of Foreign Relations in New York. General Spalding then served as the chief China strategist for the chairman of the Joint Chiefs, the Joint Staff at the Pentagon, Washington DC. His next assignment led him back to China as the Senior Defense Official and Defense Attache to China in Beijing, China. Prior to his current assignment he served at the White House as the Senior Director for Strategic Planning at the National Security Council, Washington D.C.”

Spalding is by no means an outsider, with special access, looking in on the situation. He is an erstwhile insider, who worked within the deepest points, most grave points of the US military and other national security bureaucracies. It must be noted that being a former US Air Force brigadier general, B-2 Stealth bomber pilot and unit commander, among his many impressive accomplishments, Spalding was a member of an unique, elite caste of military officers who are not quick to speak out, do not lightly show emotion, at least publicly or react because of it, never fret over a perception without the full facts, would hardly speak idly, and whose views when expressed should be taken very seriously. Spalding spoke truth to power at the Pentagon and the White House, and speaks of only what he knows to be the truth in Stealth War. His scruple does him much honor.

As of this writing, Spalding is set to publish a new book with Sentinel in April 2022, War Without Rules: China’s Playbook for Global Domination. In War Without Rules, readers are again presented with the perspectives and insights on US-China relations through the lens of a man with years of experience on such matters. Resolved that the Communist Party of China’s leaders believe that there is no sector of life outside the realm of war, Spalding illustrates how they have gone about that by use corporate espionage, global pandemics, and trade violations to achieve dominance. The ultimate goal of the Party is world dominance. Spalding provides insight into how US citizens can be made better aware of China’s tactics in order to mitigate its creeping influence.

Polybius (c. 204 B.C.-122 B.C.), the Greek “pragmatic historian,” and intriguingly an eyewitness to the siege and destruction of Carthage accompanying none other than Cornelius Scipio Aficanus as one of his commanders. In his noted work, The Histories, Polybius covers the period from 264 B.C. to 146 B.C., focusing primarily on the years 220 B.C. to 167 B.C., and detailing Ancient Rome’s conquest of Carthage, which allowed it to become the dominant force in the Mediterranean. Additionally in The Histories, Polybius offered what he believed were the process and traits required of a good historian. Among all things enumerated, he emphasized: “All available evidence must be collected, thoroughly sifted, soberly weighed, and, lastly, the historian must be animated by a sincere love of truth and a calm impartiality.”

Spalding’s book is far from a dispassionate clinical study of US-China relations. Spalding is not presenting Stealth War at any point in the book as an intermedial. If one is looking for a book written by such an author, Stealth War would be the wrong choice. Being that he is in every way a patriot, Spalding’s position concerning the US interests versus China or any other country for that matter is vigorously partisan for the US. Moreover, he is not reluctant to confide his thoughts on such matters either. Readers should expect his relative partisanship to be the dominant tone of the text. However, Spalding’s patriotic tone does not degrade into anything akin to jingoism or chauvinism. His partisanship does not impact the quality of Spalding’s analysis. He is in fact very critical of US decision making on China. To the extent that he vigorously engaged in the process of collecting relevant evidence and sought to present the absolute truth, Spalding demonstrates all of the traits that Polybius would likely agree qualifies him as a solid reporter of past events.

While Spalding puts readers in the full picture, at the same time, he does not attempt to squeeze every issue dry so to speak. What he does present, however, provides enough to leave no doubt as to China’s actions and intentions. It is his book, and his prerogative to preclose as his present the facts as he knows them.

As a read, the book is presented in a way by Spalding as not to be too heavy going. Often, analysis becomes more uncertain as it becomes more sophisticated. His examination admirably allows for safe passage on each occasion to the very heart of the matter. There are no exaggerated claims. There is nothing to debunk. Surely, China would insist and seek to create the impression that statements made by Spalding regarding election interference, cyberattack, espionage, theft of intellectual property are simply Innuendo and insinuation. The notion of a misunderstood China offends all of Spalding’s reasoning.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above) celebrating the Centennial of the Communist Party of China. Long ago, Beijing formulated a long-term plan to eventually become the world’s dominant power. That plan has been underway without pause for decades. Few who planned it, lived to see the type satisfying results that have blossomed in recent years. Surely, Xi hopes that under his leadership, the long sought goal of dominance will be achieved. In statements and speeches, he has often assured the Chinese people that the hopes and dreams of the Party and the people will be manifested. Though the idea of China being the world’s dominant power may be a pleasurable thought in Beijing, the moral and ethical implications are remarkably overwhelming. The notion of China achieving that goal is a frightening prospect, terrifying leaders in other countries whether friend or foe.

A Courageous Act by Spalding

Spalding speaks independently with his own points of view. It should be reminded that when he published Stealth War in October 2019, few from the ranks of his fellow military commanders with his experience had effectively and successfully reached an audience with such perspectives on China. Much as the man standing on high rock in the painting, Der Wanderer über dem Nebelmeer (The Traveler Contemplating a Sea of ​​Clouds) (1818) by the 19th century German Romantic painter Caspar David Friedrich. The “Dean of Cold War Historians” and Professor of Military and Naval History at Yale University, John Lewis Gaddis, suggests that the position of the character above the precipice and in front of a tormented landscape is contradictory because “evoking the domination over a landscape but at the same time the insignificance of the individual who is included in it.” In greatcharlie’s interpretation, Spalding could be represented by the man standing as he sees dangers that his country faces at the present and tries to imagine and consider responses to those unknown that it may face in the future. He fiercely desires to mitigate them, and thereby allow the US public to rest more easily. 

The practice of understanding the competition between powers and the clashes that result in the establishment of a dominant power was well-demonstrated more than two millennia ago by the Athenian historian and general, Thucydides (c 460 B.C.– c. 400 B.C.)  . The primary focus of Thucydides’ studies was the burgeoning competition and eventual clash of Athens and Sparta. Sparta was the superpower in the region, particularly militarily. As the Athenian empire rapidly grew with determination, to Thucydides, it clearly was just a matter of time before the two powers would clash.

In his book, Greek Political Thought from Homer to the Sophists (Cambridge University Press, 1995), Michael Gagarin presents Thucydides explanation for the Peloponnesian War which states the following: “I will first write down an account of the disputes that explain their breaking the Peace, so that no one will ever wonder from what ground so great a war could arise among the Greeks. I believe, however, that the truest reason for the quarrel, though least evident in what was said at the time, was the growth of Athenian power, which put fear into the Spartans and so compelled them into war, while the explanations both sides gave in public for breaking the Peace and starting the war are as follows.” 

There is a sense, a feeling, within the pages of Stealth War that Spalding believes the unwanted crisis, war between the US and China, will come. To that extent, he wants the US to be best prepared to fight that war and to win. There is a definite materiality in what he presents. Specific points of China’s attack on the US and suggestions on responses are clearly laid out by Spalding in the 11 chapters of his book’s 256 pages They are organized and titled as follows: Chapter 1: “Unrestricted Warfare”; Chapter 2: “How We Got Here”; Chapter 3: “Economy”; Chapter 4: “The Military Crisis”; Chapter 5: “The Digital Battlefield”; Chapter 6: “Modern Warrior 5.0: The 5G Future”; Chapter 7: “Politics and Diplomacy”; Chapter 8: “Stealing Intellectual Property”; Chapter 9: “World Domination via Infrastructure”; Chapter 10: “Sino Solutions: How to Combat and Stop China’s Stealth War”; and, Chapter 11: “Beating China at Its Own Game”. In his discussion of each issue, Spalding first looks from within, taking a deeper dive into impressions of the situation that he has developed over years of immersion in all aspects of the matter. His discussion of issues reflects the realist, the pragmatic thinker that he is. 

Support for Spalding’s pragmatic approach to examining China’s behavior vis-a-via the US, and the world, appears to have been provided more than two millennia ago by the aforementioned Thucydides. Thucydides is sometimes credited with founding of what is known as”political realism.” It is unknown to greatcharlie whether Spalding actually does or does not associate himself with the world of political realism, and it would go out on shaky ground to claim either was the case. Yet, Spalding’s discussion of China’s ambitions appears to manifest aspects of that theory. Central to political realism is the assumption that humans, deep down, are selfish, fearful, ambitious, and self-interested. As for countries, they are driven to safeguard national interests. To that extent, the tragic choice to go to war stand as indispensable tools in the management of state affairs and diplomacy: statecraft. As a result, the world has become a place in which each country may find themselves in conflict with competitors with similar interests, ambitions, and goals (targets charted by time).

In his search for a reason, a rationale, a purpose, for the current state of relations with China, Spalding, led by data available to him, explains it was the errant policy positions of former US administrations. At the core of those policies pursued, according to Spalding, was the misguided belief that economic development would lead the way to China’s transformation to a more democratic form of government and away from Communism. Given the manner in which he explains it, readers are left to contemplate how such a horrifying blunder could continue on for so long.

Even when the First Chairman of the People’s Republic of China Mao Zedong (left) was offering his olive branch to US President Richard Nixon (right), he reportedly regarded the US as the enemy, and that Chinese documents “likened it to Hitler.” Spalding notes Pillsbury recounts how People’s Republic of China Foreign Minister Zhou Enlai, during a meeting with US Secretary of State Henry Kissinger, proclaimed “America is the ba.” The Chinese interpreter rendered this statement as “America is the leader.” That was a blatant mistranslation: “ba,” as used in most political language, means “tyrant.” When the translator was later asked why he softened Zhou’s language to Kissinger, he said, “It would have upset him.” At the time, US policymakers and decisionmakers were too interested in embracing a policy of helping China in order to destabilize the Soviet Union to concern themselves with the Communust Party of China’s hostile attitudes toward their country.

China Well Exploited Pro-China Policies of the Past

Providing some framework for understanding the approach China took toward the situation, Spalding explains that war between countries in the 21st century looks much different than war in the 19th and 20th centuries. He notes that instead of bombs and bullets, it is about “ones and zeros and dollars and cents: economics, finance, data-information, manufacturing, infrastructure and communications.” He insists that today if one controls those fronts, “you can win a war without firing a shot.” Spalding calls it a simple logical strategy that leaders in the West have been very slow to grasp. To provide a taste from the text, Spalding elaborates further on matter in Chapter 1: “Unrestricted Warfare” on page 14: “Military might is only one way to express aggression, only one of many ways to attain power. In China’s view, economic power strengthens all the fields of potential engagement. In other words, money bolsters the military but also bolsters every other sphere of engagement imaginable. It can be used to influence and sway political leaders in foreign countries, silence ideas, and purchase or steal technology. It can be used to manufacture goods at dirt cheap prices and drive competitors out of business, or weaken rival economies. It can be used to create an army of academics, who fan out to gather scientific, technological, and engineering intelligence that can be used to further other goals.” 

To that extent, Spalding goes on to clarify the matter by stating that perhaps one of the most important and revealing documents of the Communist Party of China is a 1999 work entitled Unrestricted Warfare. Written by two senior colonels in the PLA, Qiao Liang and Wang Xiangsui, it discloses a number of prospective strategies that could possibly shift the balance of power throughout the world in China’s favor. Spalding insists that Unrestricted Warfare should be required reading for all branches of the US government and for business leaders because it outlines the strategy at the root of China’s policies in the world. He quotes a passage of the document that states: “The new principles of war are no longer ‘using armed force to compel the enemy to submit to one’s will,’ but rather are ‘using all means, including armed force and non-armed force, military and non-military, lethal and non-lethal means to compel the enemy to accept one’s interests’.”

Past US Administrations: Blind as Beetles

Given what Spalding reports, it seems at one point, opinion in nearly all foreign policy circles in the US were adverse to the suggestion of an aggressive China that would challenge the US position as a the world’s leader, or as Chinese government spokespersons and Communist Party of China leaders refer to as US dominance in the world. It is to go out on shaky ground to ask readers to remember that sentiment was heard during the 2020 US Presidential Campaign when then Presidential candidate Joe Biden referring to China stated: “I mean, you know, they’re nice folks, folks. But guess what? They’re not competition for us.”

Spalding notes that in The Hundred-Year Marathon: China’s Secret Strategy to Replace America as the Global Superpower (Henry Holt and Co, 2015), China observer Michael Pillsbury discloses that even when the First Chairman of the People’s Republic of China Mao Zedong offered his olive branch to US President Richard Nixon, he regarded the US as the enemy, and that Chinese documents “likened it to Hitler.” Spalding notes Pillsbury recounts how People’s Republic of China Foreign Minister Zhou Enlai, during a meeting with US Secretary of State Henry Kissinger, proclaimed “America is the ba.” The Chinese interpreter rendered this statement as “America is the leader.” Pillsbury said that was a  blatant mistranslation: “ba,” as used in most political language, means “tyrant.” When the translator was later asked why he softened Zhou’s language to Kissinger, he said, “It would have upset him.” At the time, US policymakers and decisionmakers were too interested in embracing a policy of helping China in order to destabilize the Soviet Union to concern themselves with the Communust Party of China’s hostile attitudes toward their country.

US President Bill Clinton (left) and General Secretary of the Communist Party of China, Jiang Zemin (right). From 1993 and 1998, there were several meetings between Clinton and Jiang. One the surface, US-China relations were mostly positive, a situation Spalding would explain was due to a desire in Washington to satisfy Beijing. Clinton signed a law passed by Congress establishing permanent normal trade relations with China. With the relationship codified, US investor confidence soared, as did business. China’s economy roared forward, too, due to a confluence of events: China was then accepted as a member of the World Trade Organization, Apple unveiled the iPod, and an eruption of digital goods turned into a stampede of international investment. Spalding makes the acidulous remark that many policy makers and business investors then, as well as years before, seemed to assume capitalism has special powers that could melt away authoritarianism and totalitarianism. Yet, despite China’s exponential growth, Spalding notes, as predicted by James Mann in his book, The China Fantasy: Why Capitalism Will Not Bring Democracy to China, the Communist Party of China only honed its brand of authoritarian capitalism.

Spalding remarks acidulously that many policy makers and business investors of the past seemed to assume capitalism has special powers that could melt away authoritarianism and totalitarianism. He goes on to discuss James Mann’s book, The China Fantasy: Why Capitalism Will Not Bring Democracy to China (Viking Adult, 2007), in which the author calls the West’s idea that China will morph into a liberal democratic society “the Soothing Scenario,” Mann summarizes the logic this way: “The country’s rapid economic growth will lead to far reaching political change as well. Eventually, increasing trade and prosperity will bring liberalization and democracy to China.” Spalding also points to Mann’s discussion of the opposite of the Soothing Scenario: “The Upheaval Scenario,” in which doubters envision China collapsing as a result of economic chaos or some kind of mass revolution. The result is turmoil and chaos. Spalding explains that Mann was way ahead of the curve when he wrote his book in 2007–a time when China was literally exploding with commerce and manufacturing. Six years earlier, then US President Bill Clinton signed a law passed by Congress establishing permanent normal trade relations with China. With the relationship codified, US investor confidence soared, as did business. China’s economy roared forward, too, due to a confluence of events: China was then accepted as a member of the World Trade Organization, Apple unveiled the iPod, and an eruption of digital goods turned into a stampede of international investment. Yet, despite China’s exponential growth, Spalding notes, Mann did not adhere to either the Soothing or Upheaval scenario. For Mann, all signs indicated that the Communist Party of China would continue to hone its brand of authoritarian capitalism.

There was not simply a gap between a perception of Chinese actions and intentions with a perception exemplar of the political realism school of thought as that of Spalding. Moreover, there appeared to be a gap between perception and reality on China among US political leaders and policy makers. They saw no urgency in responding effectively to what Beijing has been doing. The reality was hardly missed in Beijing that it would not be possible to simply rise to the mantle of the world’s dominant power. In order to possess the title of the world’s dominant power, China had to dispossess the US of it.

Spalding presents the subtle differences between logic and lunacy in expressing the actions of US political leaders and policymakers coddling a China determined to surpass the US, a thought many within policy circles and the general public in the US might still find difficult to wrap their heads around. Yet, Spalding curiously manages to forge an intriguing link for the US public, and imaginably the world at large, to what once quietly resided in the hearts and minds of senior military decision makers on China as well as what may generally reside in them now.

To that extent, the book has become, and will likely remain for some time, a stimulus to the discourse on US-China relations for a broader audience than other books on the subject. As awareness increases on the realities of that relationship, there has been an albeit gradual shift in perspectives on China. In foreign policy circles, it has been a gradual turn. In business circles, it has been an even slower transition, but somewhat steady. As he insists upon immediate change in response to developments, Spalding, himself, notes that “Some critics will accuse me of being alarmist or sensationalist.” Perhaps it will turn out in the end that the necessary change in thinking occurred too slowly.

Though not felt within the society as a whole but more so among a finite set of those in the national security bureaucracies whose responsibility is to keep an eye on China, there is a sense of foreboding similar to that which characterized the Cold War era when it was in full gallop during the 1950s and 1960s. Indeed, they are plenty worried. Many are worried enough to express their own concerns, if able, if permissible, in books after leaving the respective services, military, diplomatic, intelligence, sounding the klaxon loudly on China’s moves much as Spalding had already done with Stealth War. In Graham Greene’s The Ministry of Fear (Penguin Classics, 2005) is found the line: “He had been frightened and so he had been vehement.”

Indeed, since the time Spalding published Stealth War, more have joined him in shining increased sunlight China’s activities, not just on the coronavirus disaster or in the realm of national security, but a multitude of other actions, all, nonetheless, malign. Included among those actions would be: predatory investment scams directed against trusting governments of often small and less industrialized countries; intrusion of sovereign waters for mass fishing; intellectual property theft from companies and research labs that have invested millions in research and development into that which was stolen; and, demands of censorship insisted upon of those in any arena who have received funding from, or are doing business with, China, concerning anything the Communist Party of China does not want discussed. Beijing must accept that as a result of such actions, impressions of China have not exactly been positive worldwide.

The Key Chapter at the Moment: Chapter 4: “The Military Crisis

Spalding states on page 43 in Chapter 4: “The Military Crisis”, “Fortunately, for the moment, China has no interest in engaging in a ground war, or any kind of war that entails actual violence and physical destruction.” Nevertheless, it is a coming war between the US and its allies against China which haunts the story that Spalding tells and has kept many readers turning the book’s pages to find clues as to why and how it will all come about. Though Spalding admirably discussed the issue of a possible war between the US and China, he explained the situation as it existed at the time he wrote Stealth War. It appears that the problem has metastasized a bit on the diplomatic and economic front since. 

No doubt, the Communist Party of China is not expending enormous financial and material resources only to pose a potential threat to Taiwan’s self-rule and somewhat attenuated sovereignty out of academic interest or worse, some banal amusement; far from it. It is not Spalding’s message, but after aggregating what he explains with more recent events, what becomes clear can be stated in simple words for political leaders in Washington and Taipei: “The Red Chinese are coming!” If this assessment is in error, and upon greatcharlie proved, better news could not be reported for the sake of international peace and security, and humanity itself.

In the top senior policymaking offices of the civilian leadership of US and its Western and Eastern allies, officials surely believe uniformly that a show of force is the most effective option to respond to and deter: China’s territorial ambitions particularly regarding Taiwan and the waters of the Western Pacific, China’s displays of naval and air power and China’s threatening words in rebuff to US leadership and dominance in the region and the world. The most formidable show of force policymakers have used is joint exercises between US Navy aircraft carrier battlegroups and aircraft carriers of its allies and having US warships transit the Taiwan Straits. In addition to being a show of force, such deployments also serve as an excellent opportunity for the US and its allies to project joint power and demonstrate their commitment to collective defense, rehearse cooperation, and particularly allow allies to appreciate the benefits of US leadership. Based on what Spalding explains, some readers might conclude that such displays of force by the US and its allies more satisfy the need for some ostensibly strong action and serve more to soothe international concerns, provide a display of leadership, and domestic consumption. In reality, the aircraft carrier battlegroups, as mighty as they are, present themselves as easy prey for Chinese missiles.

Spalding explains that China has thousands of precision warheads tied to a sophisticated command and control system. He expounds on this by pointing out that the Dong Feng-26 (DF-26) ballistic missile–46 feet long, 44,000 pounds, and built to carry both conventional and nuclear warheads–was designed to obliterate aircraft carriers. The DF-26 has a range of 2,500 miles, which means it can strike US warships in the western Pacific Ocean, including ships based in Japan. In the specific context of defending Taiwan, he gets across the idea that in order to deploy a carrier’s bombers on a mission in the South China Sea, the carrier would have to come within the range of DF-26 and other missiles that would destroy it. Though noting that the US Navy has SM-6 interceptor missiles, thought to be capable of destroying the DF-26, Spalding leaves no doubt that the sheer amount of smaller, long-range ballistic missiles at China’s disposal and the blazing speed with which these weapons travel–six thousand miles in thirty minutes–pose, at the moment, an enormous threat to US warships. To that extent, he writes: “It is conceivable that an undetected conflict might end in thirty seconds. Game over.” That is a hard saying.

Gnawing on the subject a little bit more, Spalding explains that assessed from an economIc standpoint, the PLA constructed a $1 billion dollar missile system designed to destroy a $30 billion ship. Spalding says that there is no doubt our carriers are valuable and powerful machines. However, in plain English he also states that “their effectiveness in policing the Pacific is now extremely limited.” To that extent, ironically, having US and allied aircraft carriers sail within the range of the DF-26 may repeatedly send the wrong message at an exorbitant cost. In terms of deterring China regarding Taiwan, the move may have repeatedly demonstrated that the US and its allies would be unable to act in a way to halt an assault on the island while at the same time avoiding unacceptable losses. No greater support could be provided to the cluster of expressive hawks the leadership in the Communist Party of China under Xi, clamoring for an assault on Taiwan sooner than later.

China’s Dong Feng-26 (DF-26) ballistic missile (above) was designed to obliterate aircraft carriers. The DF-26 has a range of 2,500 miles, which means it can strike US warships in the western Pacific Ocean, including ships based in Japan. So do the math: in order to deploy a carrier’s bombers on a mission in the South China Sea, the carrier would have to come within the range of DF-26 and other missiles that would destroy it. The sheer amount of smaller, long-range ballistic missiles at China’s disposal under a sophisticated command and control system, and the blazing speed with which these weapons travel–six thousand miles in thirty minutes–pose, at the moment, an enormous threat to our ships. Spalding says It is conceivable that an undetected conflict might end in thirty seconds. Game over. It is a hard saying.

Following up on Spalding’s statement in Chapter 4 that the US cannot fight a ground war with China, he expounds on that point by stating products from China are crucial for the production and operations of much of the US military’s weapon systems and gear. He states directly that “the amount of goods that have been shipped and continue to be shipped from China for military use is mind-boggling.” Spalding goes into detail somewhat by offering examples of the daunting amount of military equipment that contain components made in China. He says the propellant that fires out Hellfire missiles, which are launched from helicopters, jets, and drones, is imported from China. He points the glass in night-vision goggles contains a metal called lanthanum, a large majority of which comes from China. He also points to computers that US military and naval officers write plans and reports and print them on come from China predominantly. Instructional videos are watched on screens made in China.

Spalding reminds that there are laws mandating that the US military buy goods that are made in the US. However, he believes that the US has gone too far with outsourcing and has reached a point where it is unable to defend itself and its interests without Chinese manufacturing and logistical support. If supply lines were cut from China, or even if a trade war broke out with embargoes, Spalding predicts the US military would have a nightmare sourcing its needs and getting them to the battlefield. Spalding quotes a 2015 essay by retired US Army General John Adams which states: “Our almost complete dependence on China and other countries for telecommunications equipment presents potentially catastrophic battlefield vulnerabilities.”

The Nuclear Dimension

On China’s nuclear capabilities, on page 201 in Chapter 10: “Sino Solutions: How to Combat and Stipop China’s Stealth War”, Spalding revealed that his greatest concern was that as the US seeks to balance our economic relationship, the PLA will continue to be left unrestricted. Spalding explains that unfortunately as a consequence, the US needs the threat of its nuclear arsenal as a deterrent. Spalding says the assumption is if course that these bombs will never be used. Nevertheless, he feels that “invoking fear of the unthinkable–the madman or Wildman theory of negotiation–often works.”

Delving a bit into the realm of conjecture, it is conceivable that warplanners in China may assess that they do not have the time to develop nuclear parity with US in order to offset the massive advantage the US has with its nuclear arsenal and that Washington would likely use as leverage to impact China’s choices in a conflict  However, they may have assessed that it might be feasible to create a sufficient nuclear counterbalance to threaten a rapid response retaliatory nuclear strike or sufficient first strike to convince the US that some resolution might be best to avoid incurring unacceptable losses of people and property.

From background to foreground: USS Carl Vinson (CVN-70), (Japanese Maritime Self-Defense) JS Ise (DDH-182), HMS Queen Elizabeth (R08), and USS Ronald Reagan (CVN-76). Spalding explained that from an economIc standpoint, the PLA with the DF-26 constructed a $1 billion dollar missile system designed to destroy a $30 billion ship. Spalding says that there is no doubt our carriers are valuable and powerful machines. However, he also states that “their effectiveness in policing the Pacific is now extremely limited.” To that extent, ironically, having US and allied aircraft carriers sail within the range of the DF-26 may repeatedly send the wrong message at an exorbitant cost. Other than providing the US and its allies the opportunity to rehearse cooperation, display joint power, and appreciate benefits of US leadership, in terms of deterring China, the move may have demonstrated that the US and its allies are unable to act in a way to halt an assault on Taiwan while at the same time avoiding unacceptable losses. No greater support could be provided to the cluster of expressive hawks within the Communist Party of China’s leadership, clamoring for an assault on Taiwan sooner than later.

Other Thoughts That Billowed Up in This Reader on Taiwan Via Spalding’s Dialectic Ladle

In the end, central to the argument to take military action to gain and retain control of Taiwan, is what was central to arguments on how the US managed to place itself in such a challenging position with Beijing: the character of US political leaders. That is stated not to put into question the personal qualities of the men and women who have honorably and admirably chosen to dutifully serve the people to the best of their abilities.  Rather, it is to suggest that fighting the type of war that the US might be required to prosecute, defeat China, thwart China’s ambitions, drive it off and forever away from Taiwan might not be characteristic of certain leaders. In taking that course, there would be the potential for millions to die in China, unacceptable losses on the side of the US and its allies, and as grotesque as the thought may be, China could potentially level an unexpected, crippling blow to US naval and air forces could also result. What might be hoped in Beijing to be a limited lighting war launched in the name of protecting China’s sovereignty, could become total war, a war of national survival. The nature of the one who would make the decision in the US on how to respond to China’s aggression will make all of the difference. Perhaps in Washington, a decision has already been made on how to proceed in such a contingency. Perhaps the decisions on the defense of Taiwan have been established as protocols. In defense of its ally, US political leaders may be obliged to comply with them. In the end, it boils down to what the US political leaders want from the situation, a war ending in a type of Pyrrhic victory with losses or a struggle resulting in some acceptable or tolerable new paradigm that allows for an Irenic victory, in which the two opposing sides find some resolution and at least a modicum of satisfaction.

Post factum nullum consilium. (Counsel is of no effect after the fact.) To race well, a jockey and horse must be one animal. The horse must be superbly harnessed. When a horse does not run well, it is typically considered that it may have a poor jockey. On China, military capabilities and resources, state diplomacy to include economic and public diplomacy, and policymaking must also function together as one figurative animal. The expectation is for senior policymakers to master the situation through their management of it. When this is the case, they can often be more precise, to an extent exact, in policy planning , formulation, and implementation. Evidence of that can be found in the fact that their figurative brush strokes will appear finer.

Policies that seem to be too far off from the realities of military capabilities and resources, military power, and awkward diplomatic exchanges and pursuits of inconsequential inroads may evince to competitors and opponents that policymakers are out of touch with the real situation and acting on mere perceptions and perhaps surmisal. Parsing out such concerning the US must be an ongoing process, an obsession, in Beijing at the moment. It would be part of the effort to determine how the US might react when presented with a situation as an assault on Taiwan.

In the US, producing the very best answers to situations is made more difficult because there are a variety of views and interests within the national security bureaucracies that must be balanced when policy is being made. if decisionmaking were directed, controlled by a single source, as in China under the Communist Party of China, under the command of Xi, a magician may seem to be somewhere in the mix who is clearly aware of what to do and how to do it in a way that keeps China a step or more ahead of its main competitor or opponent. Perhaps that is Xi, himself. On the other hand, some policy analysts perceive that for too long there has been a blindness to the best interests of the US that borders on madness. A sense is given off by them–to include Spalding it seems–that it may be too late to really change the course of things by implementing new approaches.

What might be hoped in Beijing to be a limited lighting war launched in the name of protecting China’s sovereignty, could become total war, a war of national survival. The nature of the one who would make the decision in the US on how to respond to China’s aggression will make all of the difference. Perhaps in Washington, a decision has already been made on how to proceed in such a contingency. Perhaps the decisions on the defense of Taiwan have been established as protocols. In defense of its ally, US political leaders may be obliged to comply with them. In the end, it boils down to what the US political leaders want from the situation, a war ending in a type of Pyrrhic victory with losses or a struggle resulting in some acceptable or tolerable new paradigm that allows for an Irenic victory, in which the two opposing sides find some resolution and at least a modicum of satisfaction.

At the outset of the review, greatcharlie explained that the book would not be broken down to the fullest extent possible, but hopefully enough so to raise interest in readers to take a look at the book. There is so much more to discover in Stealth War. The book is a steady flow of information, data, and expressions from beginning to end. Spalding is the purveyor of a foundation upon which an honest discussion can be had on US-China relations or simply the China Threat at all levels, from the senior government policymaker to the average US citizen.

There nothing that greatcharlie appreciates more than a book that stirs the readers curiosity, inquiry into the author’s judgments, greater consideration of their own views on the matter, and elicits fresh insights based on what is presented. That is exactly the type of book that Stealth War is. It is assured that after the first reading Stealth War, one would most likely go back to the book and engage in that stimulating process again and again. There is no telling what insights and how many might be brewed up from within readers after they have had a chance to read through it. Too much pleasure has been lost whilst abstaining from this delightful book. As greatcharlie suggested earlier here, those reading this review who have already read Stealth War would do well to go through the book again. 

Perhaps needless to say but it is nonetheless stated, with absolute conviction and relish, greatcharlie unequivocally recommends Spalding’s Stealth War to its readers.

 

By Mark Edmond Clark

Sidelights on Nicholas Eftimiades, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020)

China is currently engaged in a very aggressive, massive espionage, cyber, and covert action assault on the US with the goal of catching up with it technologically, militarily, and economically as quickly as possible. China hopes to eventually become the world’s dominant power. Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Victories on the intelligence front have likely most satisfied People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, as under his leadership, China’s intelligence capabilities have been greatly enhanced and have evolved. In his monograph, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that will shock its readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined.

Since the era of the People’s Republic of China’s Second Chairman Deng Xiaoping, from 1976 to 1994, the Communist Party of China’s leadership has lived in optimistic expectation of better fortune for the Chinese people in terms of economics and their standard of living. Party leaders covet the position the US holds as the dominant power in the world. In accordance with that thinking, long range plans were formulated. Such really should have been the expected response of Chinese national leaders who were first and foremost dedicated to a very aggressive revolutionary movement. It was determined in Beijing that espionage offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. At that time, many of China’s largest companies were state owned, or had close linkages to the government. From all accounts, China thereby embarked on what has become a very aggressive and massive espionage, cyber, and covert action assault on the US with the ever-fixed goal of catching up with it technologically, militarily, and economically as quickly as possible.

Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Chinese intelligence officers have experienced innumerable satisfactions in the spy war. According to a former chief of Counterintelligence for the Central Intelligence Agency (CIA), James Olson, in his superb book, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), China is presently in a class by itself in terms of its espionage, covert action, and cyber capabilities. (The January 31, 2021 greatcharlie post is a review of Olson’s To Catch a Spy.) The struggle on the intelligence front impacts the whole climate of the relations with China. Even when China is engaged in bilateral or multilateral talks, whether on trade, security, or the environment, Chinese intelligence services never cease engaging in robust espionage. Imaginably, victories on the intelligence front provide a most satisfying opportunity for People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, to cock-a-doodle, about how, under his leadership, China’s intelligence capabilities have evolved to the point at which the intelligence services can carry the battle to the home ground of the US itself and win. Senior executives and managers in US counterintelligence services doubtlessly stand exasperated over regular disappointments.

In A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that, although well-known within the US Intelligence Community and within other intelligence services worldwide, will shock nonpracticioners among his monograph’s readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined. As might be expected, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. The revelation will be that Chinese espionage activity is not the exclusive purview of China’s civilian and military intelligence services. In addition to government organizations, commercial entities, academic institutions, and private individuals, entrepreneurs are heavily engaged in espionage against preferred targets in highly industrialized countries. Chinese firms have proved themselves to be quite capable at performing such work. Surely, if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

Eftimiades examination is based on his study on the nature of Chinese espionage worldwide and in-depth understanding developed through decades of experience in the intelligence field. He reviews intelligence processes, setting objectives and tasking, organizations that engage in espionage, looks at their efforts through case studies and analysis of them. He also discusses how China’s espionage activities worldwide has had an impact on US national security, international security, the international political economy, and geopolitics. Eftimiades delves into the practical matters that concern intelligence officers of government organizations and employees of commercial entities and academic institutions as they engage in espionage, and how the Chinese government manages the hybrid government and “independent” civilian intelligence system it has created. While Series on Chinese Espionage, Vol. I: Operations and Tactics is the actual title of Eftimiades’ monograph, the monograph is listed on Amazon.com as Chinese Espionage Operations and Tactics (Vitruvian Press, 2020). The monograph is heretofore referenced in this essay by the latter title. (It might be best for those who may wish to possess a copy to research the text under the latter title. The publication date is September 3, 2020).

A sidelight, as defined by the Oxford English Dictionary, is a piece of information usually given by accident or in connection with another subject, that helps one to understand somebody or something. The goal of sidelights offered in this essay is to present Eftimiades’ monograph in a way that will give our readers a good sense of both what is in it and sort of ideas and insights they might draw from it. In effect, it is a review. For those who may excavate through the monograph and thoroughly and consider points of exposition concerning specific malign activities conducted by China, his work will prove to be substantially edifying. What is most impressive to greatcharlie about the monograph is the manner in which it stimulates thought on a grave issue concerning China. As stated in prior posts, greatcharlie prefers to review texts that can stir a fire inside a reader, and transmit the author’s passion for a subject. Those writings are the most memorable and most enjoyable to sit with. Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.)

The role of reviewer, an unsolicited intermediary between a text’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a work then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil. It is greatcharlie’s preference to provide reviews, sidelights here, that readers of the blog can enjoy and from which they may edify themselves. Nothing greatcharlie states in this essay is intended to give Eftimiades some stick–perish the thought. In greatcharlie’s view, he is brilliant, and works such as his monograph educate nonpracticioners as greatcharlie. They are very much appreciated. This review is not an inquiry into facts presented. All that is being presented here are insights greatcharlie birthed while parsing out the text. Although important details of Eftimiades monograph are discussed here, not everything is revealed. This is greatcharlie’s hard and fast rule on reviews, whether books, or as in this case a monograph. Plenty is left for readers to discover and draw their own insights upon.

Nicholas Eftimiades, the author (above), among other high level positions in the US government, was formerly the Director of Counterintelligence at the Central Intelligence Agency. He is highly regarded for his expertise on China and national security space issues. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. Eftimiades holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University.

The Author

Eftimiades, among other high level positions in the US government, was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. The Intelligence Community awarded Eftimiades with its highest honors to include the National Intelligence Council Achievement Award and DIA Director’s Intelligence Award. As of this writing, Eftimiades holds appointments on the National Intelligence Council as an Intelligence Community Associate, Homeland Security Advisory Council, Economic Security Subcommittee, and the Defense Science Board. Although he has left the CIA, one does not get the impression that Eftimiades has left the fight yet! Eftimiades has testified before several US Congressional and Presidential Commissions concerning National Security issues, future technology development, and the future of the US space program. 

Among several high level positions, Eftimiades was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University. He has lived and studied in Asia. He once served as a senior research fellow at King’s College, War Studies Department in London. During that period, Eftimiades authored books, reports, and a number of articles on China’s intelligence methodology, national security, technology, and space issues. Currently, Eftimiades is a professor at Pennsylvania State University, Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. 

As Eftimiades possesses such formidable credentials, it seems needless to say that readers should approach all matters of fact presented by Eftimiades as true to the best of his knowledge and belief. Eftimiades spoke truth to power within halls of the US national security bureaucracies and in the White House. He presents the monograph’s discussion essentially in that same mode, discussing only what he knows to be the truth on Chinese Intelligence Operations. His proceeding publication, Chinese Intelligence Operations is regarded as the seminal work in the field. In the period surrounding its publication in 1994, greatcharlie’s editor did not have the pleasure to read Nicholas Eftimiades, Chinese Intelligence Operations (CreateSpace Independent Publishing Platform, 1994) and in fact was not even aware of its existence. Having read through it in preparation for this review, the book impressed as being a damnably good breakdown of the organization departments, the missions, guiding concepts and intent of its leaders, and the tactics, techniques, procedures, and methods of each service of the “Chinese Intelligence Community” during what could now be called a bygone era. 

To the extent that it has relevance other than by mere subject matter with regard to Eftimiades Chinese Espionage Operations and Tactics. The preceding enables one, through comparisons of assessments of the work performed in varied operational and functional areas, to observe how far Chinese intelligence services have evolved, among many things, as organizations, within the country’s foreign and national security policy bureaucracy, and as vital tools in the hands of the leadership of the Communist Party of China. Interestingly, by examining both Chinese Espionage Operations and Tactics and Chinese Intelligence Operations, one is also provided the opportunity to examine an evolution in the experience, education, thinking and type of insights developed on Chinese intelligence services.. Perhaps readers will discover, much as greatcharlie did, that Chinese Espionage Operations and Tactics takes the reader to a higher level of understanding of the topics and raises the level of discourse to a seasoned intelligence analyst on China. For China watchers in particular, the monograph provides a loom from which new understandings and fresh insights can be crafted. Of course, for those who have not read or do not plan to read Eftimiades, Chinese Intelligence Operations, the opportunity still exists to prosper intellectually by plotting Chinese Espionage Operations and Tactics as the start point on the figurative charts of their respective learning curves on Chinese Intelligence.

Make no mistake, Eftimiades worked at the sharp end of intelligence work and knows the true value of each bit, even trifles, emphasizing in the text what is important to know in order to get the counterintelligence job done. Indeed, through his monograph, readers get a small taste of the discourse between intelligence officers within the bureaucracies in which Eftimiades served, and the flavor of its tone. One might as far as to say that by reading Eftimiades monograph, one gets a sense of the thinking within key US national security bureaucracies on Chinese intelligence activities in the US in the current climate.

Previous Reviews

Among reviews of Chinese Espionage Operations and Tactics published on Amazon.com are a few from former and current US senior executives and intelligence officers of the US Intelligence Community. Their glowing expressions of satisfaction and appreciation,reviews attest to the value, positive impact the monograph had on their thinking and their work. One such review was by Maryann Fialdini, Former Chief, Counterintelligence Operations of the US Defense Intelligence Agency (DIA). She explained: “Mr Eftimiades has broken new ground on his closely researched series on Chinese Espionage Operations and Tactics. His work on Chinese espionage spans 30 years in the intelligence community. In the 90’s he sounded the alarm on China’s rising espionage activities directed against US corporate and government entities. His current series on Chinese Espionage identifies for the reader China’s massive “whole of Society” approach to espionage activity and offers the exceedingly rare combination of insight and judgement from a professional who has a wealth of firsthand experience. Eftimiades work fills an important gap in US literature as it relates to Chinese intelligence. I highly recommend this book!” Another fine review was from David Tsai, formerly of the Library of Congress. He stated: “Most up-to-date comprehensive and detailed treatment of the subject based on the author’s objective analysis of close to 600 cases! An intelligence practitioner as well as academic scholar Mr. Eftimiades has given his readers a clear picture of Chinese espionage doctrine and tradecraft, based on a combination of his experience and scholarship. This excellent and insightful book is highly recommended for both professionals and novices who are interested in this subject.” A review from Nicholas Kikis, former Director of the DIA’s Defense Clandestine Service and Chief of East Asia Division, that appears on the back of the monograph, proffers: “A must-read for professionals in Counter intelligence, security and government affairs. The author has crafted the most detailed account ever published on China’s espionage operations and tactics . . . The USA is loosing its secrets and technology to China’s “whole of society” approach . . . Our Nation’s need for good counterintelligence has never been greater . . . Mr. Eftimiades is the real deal, a veteran of the Intelligence Community who describes the challenges and provides recommendations on how to do a better job in protecting America.”

Interestingly, Eftimiades does not mention anything about having to submit his monograph to the Publications Review Board of his former employer, CIA, for review. For security reasons, it is a requirement for officials from the US Intelligence Community with backgrounds as his. One might expect his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any of that information could possibly provide some important bit, some nuance on what the US knows about China’s espionage operations and tactics in the US. Surely, the Publications Review Board stopped anything from going into the text if in its view it even approximated classified information. Hypotheses and arguments are a bit more challenging to judge for security reasons. Certain facts, even if left out hypotheses and arguments, can be assessed as being confirmed by some clever sorts in an adversaries camp seeing that those facts might alone be the sole solid basis upon which a particular inference might logically be made.

Sidelights

Eftimiades’ monograph is divided into 12 sections. They are entitled as follows: Section1: “Preface”; Section 2: “Key Findings”; Section 3: “Introduction”; Section 4: “Analytical Methodology”; Section 5: “China’s Legal Framework for Espionage”; Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; Section 9: “Analysis of Espionage Tradecraft”; Section 10: “Impact”; Section 11: “Summary”; and, Section12: “Link to video Analysis of China’s Economic Espionage Tactics.” Since the monograph is only 56 pages in total, it seemed apropos for this review to condense the discussion of 8 of its 12 sections, highlighting from each what might be its most intriguing elements/aspects for our readers. For 9 of the monographs sections, to include one not précised, greatcharlie provides sidelights.

Section 1: “Preface”

From the outset, Eftimiades makes it clear that the focus of his monograph, although there is some emphasis on espionage activities against the US, is on China’s worldwide human intelligence operations. The monograph does not include a discussion of China’s intelligence analysis capabilities, technology collection, not domestic operations against perceived internal threats. He indicates that cyber espionage is only addressed in select cases which were enabled by humans providing insider access. Eftimiades notes that he brings his own experiences and perceptions into his interpretations of those cases.

Eftimiades also gives notice to readers that the monograph only reflects known Chinese intelligence operations. Even with a review of hundreds of espionage cases, he recognizes that certain matters are left open such as the number of individuals engaged in espionage activities worldwide for China, and whether the cases he analyzed represent as much as 90 percent of the total or as little as 10 percent. (The word “worldwide” qualified the former statement of the two. Perchance the number operating in the US is known!) Eftimiades insists that even the Chinese government does not know the precise number of individuals spying on its behalf. He suggests that uncertainty about that total would be due to China’s decentralized “whole of society” approach to intelligence collection. Still, he felt enabled due to the volume of cases and careful–experienced, astute–analysis of operational details, he could draw certain conclusions about China’s espionage operations and tactics.

Eftimiades’ statement about Chinese intelligence operations and tactics practiced in the US is a very bold one to make starting off from scratch in his “Preface”. Writing in that manner, Eftimiades was sure to create more questions than anything else. Reading what was stated by a number of reviewers of the monograph from outside the US national security bureaucracies, this point could perhaps be deemed as the metaphorical low-hanging fruit for criticism. Given the strength of the mind of a man as Eftimiades, it could be the case that he has dangled this statement on the number of Chinese officers and operatives around the world, aware that it would draw a strong reaction among close readers and light the fire that would ignite a lively discourse within and among them. He is a former director of CIA Counterintelligence, which makes him a member of a rather unique caste of singular individuals who would hardly do anything without considerable forethought. To go a bit further, given Eftimiades background one might think perhaps there is some counterintelligence benefit in refusing to confirm publicly, not allowing an adversary to discover what the accepted size and strength of its espionage operations are. Imaginably that information might aid them in planning around US thinking, potentially finding some advantage if the estimated figures are too high, too low, or spot on. 

The likely first impression of readers resulting from Eftimiades’ “declaration of nescience” on the numbers of would be Eftimiades could not have managed to effectively consider the ends, was, and means of Chinese organizations engaged in espionage if an important leg of the three leg “strategy stool”, means, which includes the resources, size and strength of those organizations, was unknown to him. Unaware of that it was harder to see how he could delve into a more elaborate discussion of their operations and tactics. Curiosity over how Eftimiades managed everything would surely compel the many readers to push forward into the text. However, it would very likely be regularly done with some reservation. To the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US, to be both above board and fair, are only proffered in the abstract.   

Readers looking at the matter on their own might wonder what is the average caseload for a Chinese intelligence officer from either the civilian or military service If it is more than one, let one surmise three or four, then one might begin to believe the espionage crisis is much greater in magnitude. One might consider that given likely number of Chinese intelligence officers and operatives in the field, the true number of Chinese personnel involved increases exponentially when the number likely needed to provide logistical support for such a grand number of officers and operatives in the field and their operations which appear to vary in size and scope, are considered. One might not only infer from the number and size of known operations, their intensity and tempo, and apparent effective level of support for each the totality of Chinese intelligence officers and operatives in the field, but a close approximation of their number might be reached by considering just how much has been stolen, usually detected well after the fact. Later, in the “Summary” section, Eftimiades notes that although he may not be certain of the true number of Chinese intelligence officers that are on the ground in the US but himself surmised it must be in the thousands.

There have been claims that the number of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field. The issue of numbers of Chinese spies in the US is not limited to debate within the US Intelligence Community. It has been widely reported by the mainstream newsmedia in the US that China’s intelligence services have established espionage networks throughout the country. Guo Wengui is a billionaire businessman who claimed to have close ties to China’s civilian and military intelligence services and broke with the regime. Guo revealed in his first interview in the US that those espionage networks reportedly include up to 25,000 Chinese intelligence officers and more than 15,000 recruited operatives. Guo explained that he learned about Chinese spy activities from Ma Jian, a former vice minister of the civilian intelligence service and Ji Shengde, a former military intelligence chief. As that figure, 25,000, was put forward nearly 5 years ago, the number of Chinese intelligence officers who have essentially strolled into the US and are now operating clandestinely and successfully on the ground now may be much higher. Surely, there is an officially estimated number of Chinese intelligence officers and operatives in the US Intelligence Community. Whether it will ever be made public remains to be seen, but surely, even without that figure, there is some general acceptance that what is coming toward the US is à la débandade.

People’s Republic of China Minister of State Security, Chen Wenqing (above). Chen studied Law and Political Science at Southwest University in Chongqing, and joined the Ministry of Public Security in 1984, where he worked for a decade. In 1994, Chen was assigned to the Ministry of State Security (MSS), becoming Deputy Director at the Sichuan provincial state security department. In 1998 Chen took over leadership of the State Security Department in Sichuan. He held that position until 2002, when he was appointed Chief Prosecutor at the Sichuan Provincial People’s Procuratorate. In 2006, Chen transferred to Fujian, serving as Deputy Party Secretary and concurrently head of the provincial Commission for Discipline Inspection (CCDI) until 2012. Following the 18th National Congress of the Communist Party China, Chen was brought to Beijing to serve as a Deputy Secretaries of the CCDI. He was appointed Party Secretary of the MSS in October 2016 and Minister in November 2016.

Section 2: “Key Findings”

In the section, “Key Findings”, Eftimiades provides a list of judgments supported by the information and data in his monograph. For readers, especially students, they may provide some guidance on an academic inquiry concerning Chinese intelligence. Right out of the gate, he notes that his “Key Findings” section is the product of his earlier analysis of 595 documented cases of China’s worldwide collection efforts. Thereby, they stand here independent of, but a primary feature of what is discussed in the monograph. In the monograph’s “Preface”, Eftimiades plainly states that “the focus of this work is on [China’s] worldwide human intelligence (HUMINT) operations.” Yet, in his key findings, he seems to indicate that the true focus of the monograph’s discussion, rather than being the aggregate espionage efforts of government organizations and commercial entities, academic institutions, and independent individuals in the US, is Chinese government civilian and military operations. Imaginably for some, Eftimiades may appear to shortshrift readers on any findings developed through the study of the totality of China’s espionage in the US. Perhaps in Eftimiades’ defense, his omission may very well have been more of an issue of editing and oversight.

To the extent that his key findings are limited to government espionage activities, some might readily assert that rather than opening up new territory, his findings were nearly all well-trodden ground. Indeed, at first blush, one might view what Eftimiades presents as his findings as a somewhat prosaic enumeration of highlights from his examination of the 595 cases. However, greatcharlie assures that they are much more as there are some striking elements among them. Eftimiades 10 key findings were a follows: 1) Chinese espionage activity  has greatly expanded in the past 20 years; 2) Chinese entities conducting espionage include government agencies, the People’s Liberation Army, State Owned Enterprises, private companies, individuals, and several universities; 3) Approximately half of China’s worldwide intelligence collection efforts target military and space technologies; 4) Over 90 percent of China’s espionage activities are performed by ethnic Chinese and males perform more than 80 percent of it; 5) The Ministry of State Security, China’s main civilian intelligence service, exploits social media to target foreigners with access to sensitive information. Those recruitment efforts vary in quality considerably; 6) The Ministry of State Security make use of China’s visa and border control system to identify potential recruitment and manage clandestine assets; 7) Ministry of State Security espionage tradecraft has improved over the last four years, due in part to pressure against it from US counterintelligence services; 8) Nearly half of China’s traditional espionage efforts–pursuing political and military secrets–and covert action campaigns are targeted against Taiwan; 9) China’s foreign science and technology collection efforts correlate closely to the priority technologies identified in government strategic planning documents; and, 10) China’s “whole society approach” to espionage has a harmful effect on the US economy, diplomatic influence, and military capabilities. Furthermore, China’s actions threaten European national and economic security through espionage and coercion against government entities and business decision making.

What sparked greatcharlie’s interest considerably was Eftimiades finding concerning non-ethnic-Chinese recruitment, that more ethnic Chinese recruits are used than nonethnic ones by Chinese government organizations and commercial entities engaged in espionage in the US. Multum in parvo. (Much in little. (Small but significant.))

He makes an impressive statement, but regrettably, he does delve deeper into this issue at any point later in the monograph allowing readers to understand how he got there.  His “Analysis of Espionage Tradecraft” section would have been taken to even greater heights. Useful at some point of the monograph’s discussion also would have been some background on the evolution of Chinese intelligence practices to recruit nonethnic Chinese as well as ethnic Chinese as operatives. With regard to greatcharlie’s aforementioned presumption concerning Eftimiades somewhat likely effort to stoke debate on the monograph, perchance once again he is providing more grist for the mill on this score. Perhaps a set plan regarding the monographs page length did not allow him to expound on the matter.

Perhaps it would be enough for some to say in this case that Chinese intelligence services may have recognized they can achieve their respective goals more efficiently and effectively by working mainly with ethnic Chinese recruits. Yet, surely, Chinese espionage in the West has evolved from pursuing ethnic Chinese sources alone. All things considered, such a limited effort by Chinese government organizations and commercial entities would hardly be the case. It stands to reason that the number of nonethnic recruits with which they have been successful is far higher than the few he has enumerated. To an extent, in Eftimiades own examples there is evidence that a number of nonethnic Chinese operatives were targeted and successfully recruited. Chinese intelligence services clearly have the interest and capabilities to bring in such recruits presumably as would Chinese commercial entities engaged in espionage in the US.

As discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” it was once generally understood in the West that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers, businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections, and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use. However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method.

Guo Wengui, aforementioned here as the billionaire businessman who broke with the regime and revealed information from highly placed sources in the Chinese intelligence services that China’s espionage networks reportedly include up to 25,000 officers and 15,000 operatives, also spoke on the matter of non-ethnic-Chinese recruitment. Guo said Ma Jian, who recall was the vice minister for the civilian intelligence service, told him that a major shift by the Chinese was expanding the scope of agent recruitment from Asians to other ethnic groups.

One might argue that if Chinese government organizations and commercial entities engaged in espionage in the US were running only a few nonethnic operatives in the field, an idea Eftimiades’ statistics would apparently support, those few nonethnic operatives were doing a colossal amount of work alone to collect the loads of information from institutions where ethnic Chinese may not necessarily have been well represented or significant at all. In the abstract, and not to cast aspersions on any employees anywhere in which the erstwhile spies worked, but it may have been the case that other nonethnic Chinese employees were involved in espionage in those same institutions who went undetected and whose work was completely unknown to those who were caught.

Imaginably from a counterintelligence standpoint, if Chinese government organizations and commercial entities engaged in espionage in the US were running merely two or a few more nonethnic operatives in the field, trying intercept so few well-concealed individuals from a field of dozens of potential spies would conceivably be rather challenging. Finding them all during the past few years would be nothing less than spectacular accomplishment. C’est chercher une aiguille dans une botte de foin.

Chinese government organizations and commercial entities engaged in espionage in the US go after whomever might be best suited to meet their needs. For the accomplished services in the intelligence industry, espionage is a results focused business, not an ethnocentric one. It was noted earlier that Eftimiades insists that no one really knows how many officers and operatives working for China are on the beat in the US, but later in his “Summary” section suggests that they may very well number in the thousands. Aforementioned, too, were claims that the numbers of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field would be enormous. If those high numbers are accurate, it would likely mean those officers would be going after greater numbers of recruits. Surely, along with increased ethnic Chinese recruiting, nonethnic Chinese recruiting numbers would see far more than a nominal increase as a result.

Incidentally, Eftimiades mention of the balance between ethnic and nonethnic Chinese recruitment by Chinese government organizations and commercial entities engaged in espionage in the US, determined as a product of his analysis of the 595 cases, somewhat flies in the face of what he boldly asserted earlier in the discussion on the general on the unawareness of numbers of officers and operatives working on the ground there for China. As stated earlier, to the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US is in the abstract.   

People’s Republic of China PLA Major General Chen Guangjun (above), Chief of Central Military Commission (CMC) Joint Staff Department Intelligence Bureau. The 54 year-old Chen currently serves as chief of Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau as well as an Assistant to the Chief of the Joint Staff. Chen joined the Rocket Forces of the PLA in 1984. In the mid-2000s, he earned a Ph.D. from Northwestern Polytechnical University. The PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. Chen achieved some notoriety prior to taking over the Joint Staff Department Intelligence Bureau. Through 2007 and 2008, Chen was the focus of several newsmedia reports chronicling his role in improving levels of education in his unit.

Section 3: “Introduction”

Eftimiades begins his Introduction by stating that while espionage is often employed to support foreign policy, a country’s clandestine activities rarely become the subject of foreign policy. However, despite how rare it might be, he says that is the case for the People’s Republic of China with its massive “whole of society” approach to conducting espionage. Eftimiades believes its approach is creating a new paradigm on how intelligence activities are conducted, viewed, and addressed by countries. He notes that a key element in the US-China trade war and downward spiral in relations–a matter the received much attention from the US newsmedia at the time he penned his monograph–is Washington’s demands that Beijing cease stealing US intellectual property and trade secrets. Despite China’s denials, Eftimiades stressed that “hundreds of recently prosecuted espionage cases” prove otherwise. China’s espionage activities are changing the global balance of power, impacting the US and foreign economies, and providing challenges to domestic, national security, and foreign policy formulation.

Not to be an apologist, but rather, to be fair-minded, Eftimiades notes that there are otger governments, companies, and individual entrepreneurs that violate US laws in the drive to possess or sell US technology, government and corporate secrets. He states: “Violating a country’s laws is common practice in the murky world of espionage. According to Eftimiades, almost every time an intelligence service conducts espionage in another country, it violates that country’s laws, and that includes US intelligence operating overseas.” However, he insists that the difference is that the US and other countries engage in espionage to determine and counter hostile or potentially hostile adversaries. The purpose of espionage is not to develop their countries’ own industries or transfer foreign wealth which is a main focus of China’s activities.

There is little doubt that the public affairs departments of nearly every bureaucracy under the State Council, and Propaganda Department and Foreign Affairs section of the Communist Party of China would chomp at the bit to enthusiastically and gloatingly state in response that the US space program was developed through the employment of scientists and engineers from Occupied Germany. The resettlement of the professionals and all of their research and development was facilitated by intelligence elements of the US national security bureaucracies. The Chinese would doubtlessly assert that US activities on that matter essentially established the model for acquiring foreign capabilities through national security bureaucracies to support their technological needs and channel down to large industries mostly related to defense and intelligence to support their advancement. Chinese public affairs spokespersons would surely go on to state, likely with the pretension of lamenting, that as a result of depriving Germany of its own citizens best efforts in aerospace technologies, the country was denied trillions in revenue from potentially providing the world the fruit of their expertise. Indeed, Germany could have become the epicenter of aerospace technology development and research in the world. (Mind readers this is a presumed argument of the Communist Party of China, not at all the position of greatcharlie.) Mayhap, the counterpunch would be that Werner Von Braun and the other German scientists and engineers sought to to the US and if they were left to their devices in Occupied Germany, the Soviet Union would have surely grabbed them up to use for Soviet Premier Joseph Stalin’s sinister purposes. Germany as a whole benefited immensely from postwar reconstruction due to the US Marshall Program. German industries were given an excellent restart as a result of their rebuilding and retooling under that program.

Section 4: “Analytical Methodology”

Eftimiades explains that for purposes of this study, all of the legal definitions of criminal acts in the statutes and administrative regulations found in the export violations–International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), International Emergency Economic Powers Act (IEEPA), as well as covert action, and research violations, are categorized as espionage. Eftimiades again explains that over a period of 10 years, he compiled and analyzed 595 cases of Chinese espionage that have occurred worldwide. He notes that over 450 of those cases occurred after 2000. He states again that through the analysis of these cases, sufficient evidence provided on espionage by the Chinese government, Beijing’s promotion and support of organizations outside of the government responsible for the same, and the information objectives, determines gaps in their knowledge, and operational “tradecraft” techniques of those organizations.

There is perhaps an argument to be made that once Eftimiades decided upon the definition of espionage mentioned in this section, he shaped his discussion of what Chinese non-government entities, institutions, and individuals would be viewed as engaging in espionage. One could hardly find fault with his decision. After all, his choice was not without precedent as certain bureaucracies of the US government involved in the 595 cases he studied made the same decision based on the law. However, from the lens of the accused Chinese non-government entities, institutions, and individuals, it may be the case that they were stealing trade secrets and intellectual property, but they may not have viewed their actions as espionage, rather just theft and just a part of business. One could imagine individuals of elements involved with such thefts saying with acidulous humor that if those, who possess information that they desired to purloin, really wanted to prevent theft, they would do a far better job at securing that information. Those with such larcenous instincts might go on to insist that those possessing the information would need to look deeper within to find the answer as to why they have so often left themselves wide open to theft. This thought, on the perception of thieving Chinese non-government entities, institutions, and individuals on whether their actions are a matter of espionage or “merely” grand larceny, is developed further in this essay in the “Analysis of Espionage Tradecraft” section.

The monograph’s following four sections on Chinese operations and tactics were meat and drink for greatcharlie and will likely be for like-minded souls. They are: Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; and, Section 9: “Analysis of Espionage Tradecraft”. Only three of the four are fully discussed in this review.

Section 6: “PRC Organizations Conducting Espionage”

The espionage effort by Chinese government organizations and commercial entities, as explained by Eftimiades, has features that are entirely its own. From an analysis of his 595 cases, Eftimiades explains espionage activities correlated to their sponsoring organization (the “customer” receiving the information or technology) showed five distinct clusters of organizations engaging in espionage. The governing Communist Party of China uses government, quasi government, academic, and commercial entities as mechanisms to conduct all forms of espionage abroad. Most interesting of these are China’s “non-traditional collectors”, which include State Owned Enterprises, universities, and private companies. He confirms that the employment of such a broad set of entities for intelligence collection evinces China’s “whole of society” approach to espionage. The list of includes: 1) the Ministry of State Security, the Guojia Anquan Bu, China’s preeminent intelligence agency, responsible for overseas espionage and counterintelligence both at home and abroad; 2) the Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau of the People’s Liberation Army (PLA), responsible for collecting and analyzing foreign military intelligence, including technology; 3) State Owned Enterprises (SOE), include the 50,000 aerospace and defense companies, subordinate research institutions, and technology transfer organizations owned by the central government; 4) Private Chinese companies or individuals acting unilaterally for commercial benefit only were engaged in espionage in approximately 22 percent of cases Eftimiades analyzed, and in nearly 30 percent of those cases, there was a clearly identifiable Chinese government, SOE, or university as the ultimate customer for illegal exports or trade secrets; and, 5) Other Chinese government elements that collect intelligence (information) and technology include the PLA Political Department Liaison Office (targeted against Taiwan), the United Front Work Department (UFWD), and many universities under the State Administration for Science, Technology, and Industry for National Defense (SASTIND). 

Most intriguing to greatcharlie was Eftimiades’ discussion of the PLA Political Department Liaison Office, the UFWD, and SASTIND. Beginning in reverse with SASTIND, Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Clearly put by Eftimiades, as the start point of a virtual wheel of information exchange, SASTIND assigns projects to ministries with military production responsibilities. Those ministries pass the work to the research institutes under their auspices. The associated research institutes send their information and technology gaps back to SASTIND. There are two departments within SASTIND,responsible for developing and tasking technologically related intelligence requirements and for collecting intelligence against those requirements.They are the Comprehensive Planning Department and the International Cooperation Department. The Comprehensive Planning Department tasks collection to the MSS and most likely to the PLA Joint Intelligence Bureau. The International Cooperation Department has its own independent collection capability. Members of this department travel with China’s scientists to collect information against specific requirements.

Eftimiades reports that SASTIND also has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. Some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. That list includes: Beijing Institute of Technology; Beijing University of Aeronautics and Astronautics; Beijing Engineering University; Harbin Engineering University; Harbin Institute of Technology; Northwestern Polytechnical Institution [University]; Nanjing University of Aeronautics and Astronautics; and, Nanjing University of Science and Technology. As of the monograph’s writing, over 35 Chinese universities (or professors from those universities) have been identified in US federal court documents as having some role in China’s overseas espionage cases, according to Eftimiades.

Eftimiades explains that the distribution of Chinese espionage cases worldwide illustrates the magnitude of Communist Party of China controlled businesses, research entities and business organizations involved in espionage activities. Providing superb graphs and charts for readers to examine while following along with his discussion, he shows that there is a near equal distribution of espionage activities between the four major organizational clusters (MSS, PLA, SOEs, and Private Companies). Eftimiades explains that the distribution indicates a concerted effort to use all mechanisms of government and the economy to collect foreign information and technology. To date, the Communist Party of China and the Chinese government have not taken steps to impede illegal activities (according to foreign countries laws) of their state corporations, private businesses, universities, and citizens. Eftimiades says China, referring to it once again as a “digital authoritarian state”, is clearly capable of doing so. He suggests that the Communist Party of China sees the appropriation of foreign innovations and technology as part of a policy aimed at developing domestic technology and increasing production.

In addition, his statistical breakdown of the 595 espionage cases illustrates that Chinese private companies have an aggressive posture in conducting espionage, resulting in 136 cases or approximately 23 percent of all activity worldwide. Similarly, SOEs were surreptitiously examining or collecting information or technology in 121 cases or 20 percent of the total. The SOEs are primarily collecting advanced military technology and associated research. Private companies and individuals primarily pursue commercial technologies, intellectual property and military technologies. Espionage activities conducted by the PLA Joint Intelligence Bureau give primacy to defense information, armaments, and military (or dual use) technology. The PLA was involved in 122 instances of espionage or 19 percent of all cases. Eftimiades reports that the MSS was involved in 95 instances of espionage or 16 percent of all cases. Preferred MSS targets included political or defense information, foreign policy, overseas dissidents, military capabilities, too, and foreign intelligence services. The final category of entities conducting espionage on behalf of China were Chinese universities and the UFWD. The universities generally targeted foreign technology to support advanced military weapons systems development and commercial endeavors.

Regarding the PLA Political Department Liaison Office, Eftimiades, in a markedly  unadorned way, explains that it is targeted against Taiwan. However, some confusion may befall those readers who perhaps may think of the Communist Party of China’s International Liaison Department when they come across the title, International Liaison Office. Among the pertinent facts, as part of Xi’s military reforms, in November 2015 the General Political Department of the Central Military Commission was abolished and was replaced with the Political Work Department. In January 2016, the Political Work Department became official. Its primary role as the chief political organ under the Central Military Commission is to integrate the Communist Party of China and its ideology and propaganda into the People’s Liberation Army. In that role, its responsibilities include: preparing political and economic information for the reference of the Political Bureau; conducting ideological and political work on foreign, particularly adversarial armed forces, by promoting China’s policies among their ranks, and disrupting unit cohesion within adversarial forces by withering their morale. It also has the duty to incite descension and rebellions particularly within the Taiwan army and other foreign armed forces. The Political Work Department’s Liaison Department controls a united front organization called the China Association for International Friendly Contact (CAIFC) that is active in overseas intelligence gathering and influence operations. Reportedly, the International Liaison Office has dispatched agents to infiltrate Chinese-funded companies and private institutions in Hong Kong. Their mission is also counter-espionage, monitoring their own agents, and preventing their recruitment of Chinese personnel by foreign intelligence services.

The International (Liaison) Department of the Communist Party of China is a very different organization. It stands as one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three include the UFWD, the Chinese People’s Political Consultative Conference (CPPCC), the Propaganda Department. Founded in 1951, International (Liaison) Department is the party’s diplomatic arm, handling relationships with more than 600 political parties and organizations as well as individual, primarily political, elites. The department previously handled the Communist Party of China’s relationships between fraternal Communist parties and cultivated splinter factions of Moscow-dominated Communist parties after the Sino-Soviet split. The activist bent of the International Department disappeared as the department began re-establishing itself from 1970 to 1971 following the tumultuous early years of the Cultural Revolution. Indeed, in the 1970s, as Anne-Marie Brady explained in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the International Liaison Department’s intelligence efforts often surpassed and even outmatched those of regular Chinese intelligence services. It became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies and guerrilla movements worldwide. Interestingly, the department originated as a UFWD bureau before being carved out into an independent entity.

You Quan (above), head of the Communust Party of China’s United Front Work Department (UFWD). You Quan was appointed United Front Work Department (UFWD) head on November 7, 2017. You directs the UFWD, assisted by seven deputy directors. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance.

Although he mentions the UFWD, Eftimiades does not provide any discussion of the organization. For readers wholly unfamiliar with it, greatcharlie provides some small treatment here. As discussed in the October 19, 2020 greatcharlie post entitled, “The Case of a NYPD Officer Allegedly Engaged in Intelligence Activities for China Spotlights the United Front Work Department”, within China, the UFWD plays a vital policy development and coordination role, especially for ethnic and religious minorities. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. Xi has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. United front work is the central element to understanding what the Communist Party of China is doing and why to shape the world outside of itself. In a June 9, 2020 Australian Strategic Policy Institute report, You Quan, the head of the UFWD, is quoted as saying: “The United Front is a political alliance, and united front work is political work. It must maintain the party’s leadership throughout, having the party’s flag as its flag, the party’s direction as its direction, and the party’s will as its will, uniting and gathering members of each part of the United Front around the party.” People’s Republic of China Chairman Mao Zedong described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a 1950s CIA paper, united front work was referred to as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the Party.

Perhaps from a publisher’s point of view and with some intimation of what would most interest the monograph’s readers in fields of business and finance, Eftimiades thought it most necessary to place emphasis upon the State Administration for Science, Technology, and Industry for National Defense (SASTIND) over all of the other PRC organizations engaged in espionage. The information presented on SASTIND, for instance, is assuredly not part of regular discourse on Chinese espionage. Eftimiades, in a rather sedate tone but still a quite edifying stream of consciousness, lays out what that government organization’s well-controlled work against the US and other highly industrialized countries worldwide and its stealthy and insidious nature.

It should be expected, and may actually be tacitly accepted by some intelligence analysts in the US and in the services of other highly industrialized countries, that among Chinese government organizations and commercial entities on the ground in the US engaged in espionage, there are understood defined areas of responsibility and much as the clear boundaries already set, and well-known, between PLA HUMINT targets and activities and those of its civilian counterpart, MSS, similar arrangements have been made to avoid unwittingly conducting redundant operations, accidental collision of officers and operatives in the field, and potential interservice competition and quarrels in pursuit of available sources for US secrets. A similar delineation between the MSS and Zhōnghuá Rénmín Gònghéguó Gōng’ānbùthe Ministry of Public Security of the People’s Republic of China (MPS), both a law enforcement and an intelligence and counterintelligence service. Harmony among organizations is doubtlessly desired and required in order for them to succeed and to avoid being caught.

Yet, with so many Chinese government organizations and commercial entities on the ground in the US engaged in espionage, theft, overt collection, hiring operatives, surveilling and studying the opposition, as a reality, on more than one instance an effort to collect a particular type of information might lead more than one organization, for example, one governmental and one commercial, to the same target. One might imagine how chaos could reign without some communication. Officers and operators, perhaps not even immediately aware of each others presence, might literally run into each other, occasionally tread on each other’s work, and might even step on each other’s toes now and then creating some disruption. Some general agreement between organizations and entities in the field would need to exist in order to ensure possible fruitful operations would not face “friendly” challenges and obstacles albeit unintentionally, and to ensure they are enabled to adhere to clearly delineated lanes of action for each organization. On the matter of security, one might imagine how much easier it would be to detect and intercept Chinese espionage operators from the different organizations if they all kept showing up at the same institution trying to contact, recruit, smooze, cajole the same people in them, or one institution were simply bombarded by attempts by individuals to inveigle their way into it with a similar focus on its research and development. Obviously Chinese espionage efforts have been far quieter, smoother, and more sophisticated in nature.

Perhaps the best way to what is discussed here is simply to state that there are likely furtive bridges across organizational lines and areas of responsibilities that allow managers on the ground and officers, old hands in the business who have mastered the job, engaged in intricate operations against similar targets to directly communicate, provide assistance, modest resources, and advice all designed to facilitate security and activities and promote success. It would be a form of unofficial, collegial, furtive modus vivendi established with the requirements for operational security firmly in mind and every imaginable precaution taken. In this section, Eftimiades briefly mentions that in at least two cases, there were actually joint MSS and PLA operations in which individuals inside an aerospace company were recruited as operatives to assist in targeting the company for cyber-attacks. The MSS is so segmented with its many state department’s and provincial bureaus, that the most effective aspect of any effort by the two organizations to work jointly must have occurred between managers in the field. Given the success each espionage element, government or otherwise, has found in the US, the Communist Party of China, which would indubitably be aware of such interorganizational contacts, would likely stay mum about it all but monitor it all the same. After all, Communist Party of China intelligence organs operating sub rosa in diplomatic missions and commercial entities or incognito wherever else, would conceivably benefit too from being tied into the clandestine communications among managers in the field imagined here.

Concerning another point that flows from this discussion, rather than lacking actual knowledge or even a good sense of where everyone was relative to each other among Chinese government organizations and commercial entities engaged in espionage in the US and not having an full account of who was on the ground and stand bereft of paths for the most senior network managers of each organization to liaise, potentially in some extraordinary emergency, in the abstract, surely one could conceive that there would be a least some tacit coordination among their senior leaders, perhaps back in China. Such information would at least be in PLA, MSS, and–as often ordinary Chinese citizens will usually be involved–MPS hands. MPS surely has the most complete, up-to-date records–are perhaps often pulled into the mix of overseas espionage activities to some small degree for that reason. That information would also most likely be in the hands of the Communist Party of China via MPS. In addition to performing standard domestic functions as a law enforcement and intelligence and counterintelligence service, MPS is very much tied to the Communist Party of China to the extent that it helps the Party maintain its tight grip on the population.

For the edification of greatcharlie’s readers who may be not so familiar PLA intelligence, as explained in the  January 31, 2021 greatcharlie post entitled Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)”, the PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission. Thereby, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), something similar to the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare are now aggregated into the Strategic Support Force. As with its sister civilian service, the MSS, and intelligence services worldwide, the PLA makes regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. It aggressively uses Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection.

Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Eftimiades reports that SASTIND has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. On that list is Northwestern Polytechnical University of Xian, China, It is ranked number 1 in the discipline Aeronautical and Astronautical Science and Technology, known for producing some of the best brains in China’s defense industry.

Section 7: “Intelligence Collection Objectives”

As promised, greatcharlie has condensed the sections of Eftimiades monograph, providing important details, but it has not revealed everything. Yet, with such a relatively short text, there would naturally arise occasions when little option would appear available than present wholly what is provided in a particularly diminutive section, in order to provide the reader with a full understanding of the author’s thinking. That is the case with the “Intelligence Collection Objectives” section of the monograph. Under what has been whimsically dubbed as “spookspeak” by members of the intelligence industry some time ago, Collection Objectives, also known as Information Objectives or Requirements, identify the specific information or technology that is tasked to intelligence services for collection. Eftimiades stated that requirements can number in the tens-of-thousands, and explains that one can infer from requirements a country’s knowledge and technology gaps for they are a reflection of them. He provides as an example a country that has been continually pursuing information on specific components of turbine engines. The implications and indications for taking that course, says Eftimiades, are that the country most likely lacks the required information or technology on turbine engines for its planned purposes and espionage presents the only immediate way of acquiring it. Non solum eventus hoc docet, iste est magister stultorum, sed etiam ratio. (Not only does the outcome teach (us) this, that is the teacher of fools, but (so) too does reason.)

Regarding China, Eftimiades explains that its strategic collection objectives can be identified through a number of national level strategic planning documents. Listed earlier in the “Key Findings” section in the monograph, they are: Made in China 2025; Space Science and Technology in China; and, A Road Map to 2050, the National Key Technologies R&D Program, and the 13th Five Year Plan. Those national level strategic planning documents can be subdivided into specific technology development programs, are the following: the National Basic Research Program (973 Program); the National High-Tech Research and Development Program (863 Program); the National Key Technologies R&D Program; and, The National S&T Major Projects. Eftimiades offers a subset of those National S&T Major Projects which includes: Advanced Digital Control Machines and Fundamental Manufacturing Equipment; Breeding of New Variety of Transgenic Biology; Core Electronic Devices, High-end General Chips and Fundamental Software; Key New Drug Innovation; Large Scale Development of Oil and Gas Fields and Coal-bed Gas; Megascale Integrated Circuit Manufacturing Technologies; Next Generation of Broad Wireless Mobile Networks; Wastewater Control and  S&T Achievement Industrialization; National New Products Program; and, the National Soft Sciences Research Program. 

Eftimiades says that as one further breaks down the strategic technology objectives, a strong correlation to China’s espionage activity emerges. The Director of National Intelligence report, Foreign Economic Espionage in Cyberspace (2018) identified industries and private technologies that are frequent targets of foreign espionage. Eftimiades’ informs that an even closer correlation between China’s espionage efforts and national requirements can be made when comparing the 595 cases with the 19 key Technologies identified in the Communust Party of China strategic industrial planning documents Made in China 2025. These technology requirements were the primary objectives in the 435 cases. The fact that such a high proportion of espionage activities are correlated in Made in China 2025 Key technology list indicates the Communist Party of China’s role in guiding China’s global espionage effort.

Laying out points on this matter from his case analysis for all readers to understand, avec brio, Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks. Such collection efforts support PLA military aerospace programs and China’s commercial aviation sector. Going further, he states that a review of the 116 cases targeted at aerospace companies identified over 200 specific military and civilian technologies and trade secrets (stolen and attempted stolen). Among the many “Key Technologies” sought, were: Cryogenic pumps for space vehicles, valves, transfer lines, refrigeration equipment, space qualified radiation hardened circuits, components for the storage and use of liquid hydrogen, cryogenic coolers, Ka-band space communications, satellite/missile insulation blankets–germanium coated polyimide film, and multi octave traveling wave tubes used as amplifiers in satellite transponders. Major systems include: the Space Shuttle, Delta IV Rocket, F-15 Fighter, C-17 transport, F-22 Fighter, F-35 Fighter, B-1 Bomber, Ch46/47 Chinook, C-130 training equipment.

China’s Mars rover, the Zhurong (above) rolls off its lander, to begin a mission of seeking out geological discoveries. Was its development the result of espionage? Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks.

Another high priority collection target of Chinese espionage is information technology. Statistically speaking, China’s collection of information technology (113 cases) is second in numbers only to aerospace technology. China has placed strong emphasis on collecting information technology to include semiconductors and manufacturing technology. Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did. The Chinese company Huawei has been under similar export restrictions for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Key information technology related to China’s collection requirements include: microelectronics, microwave integrated circuits, microprocessors, circuit boards, crypto key devices, data and voice transmission systems, semiconductors, and trade secrets such as laser manufacturing techniques. Semiconductor manufacturing is a priority target for Chinese espionage as the US and several other nations still maintain a sizable lead over China in production capabilities. Additional priority targets for collection include biopharma and medical devices, automated machine tools and robotics, energy saving/new energy vehicles, and new materials development. Eftimiades informs that these are often distinct patterns of intelligence activity that correspond to each category of technology. For example, excluding China’s  cyber espionage campaigns, collection on biopharma and medical devices is limited to exploiting research programs (e.g., Thousand Talents Program) or economic espionage using company insiders. The three targets for this category are universities, research institutes, and pharmaceutical companies. Lastly, In the category of energy saving/new energy vehicles, Eftimiades states that most of the collection activity has been economic espionage employing insiders. The two targets for this collection effort have been companies and research laboratories. Eftimiades reveals that the majority of thefts of this technology have occurred through insider threats with cyber espionage as a secondary method.

To be succinct, in many fields, subject areas for analysis, facts are often misused and abused, but on intelligence, it can lead to great failures, and potential national disaster. Facts cannot be nailed down and used to support only what one wishes. To the contrary, facts should take the analysis toward what is authentic. From that judgments and plans must be based. Doing anything otherwise, especially while in pursuit of an opponent, is simply to procrastinate by entertaining oneself with errant deliberations. The opponent, no matter what one might choose to believe, does not procrastinate. As Eftimiades, himself, notes in the “Intelligence Collection Objectives” section of his own text, the Chinese know what they want and go after it at the time, in the way, and with the means they desire. Operatives complete their tasks and off secrets go–and oftentimes actual technologies as well–to China. That is one of the simple and more apparent keys to the opponent’s success.

China has shown little compunction over putting in full view at home, marketing, technologies, and making geopolitical moves that would be suggestive of the fact the information that allowed for those developments and actions was stolen from the US. It is almost as if the Communist Party of China encourages such actions to flaunt their country’s considerable bag of intelligence victories. Of course, government officials in Beijing will normally assert that there have been thefts and declare any evidence presented of such as circumstantial or outright lies.

Given just how much China has poached from the US has been revealed, even paraded in Beijing, one could reasonably conclude–and it is absolutely true–that China has run off with far more than a bale of information and data on classified defense and intelligence related projects, innovative commercial products, trade secrets, intellectual property, and classified foreign and defense policy documents. It is safe to say that an enormous amount is being collected. It might leave some to reasonably accept that a stratospheric level of espionage is being conducted by far greater numbers of intelligence officers and operatives and it has been ongoing.

Eftimiades provides a brilliant account of Chinese intelligence collection requirements. He supports his claims with superb charts. Some are practically signposts pointing to where the adversary is likely to show up next. Some are strong enough to serve as figurative beckoning fingers enticing along with whispered words, “Here they are.”

Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE, now defunct. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did.

Section 8: “Analysis of Espionage Cases”

The dominant activities for China’s overseas espionage are espionage, economic espionage, and export administration regulation (dual use) violations, together comprising 60 percent of all activities. Taken as a whole, statistically speaking, illegal exports (theft of dual use and military technology) make up approximately 47 percent of China’s espionage activities abroad. Eftimiades divides the 595 espionage cases that he analyzed into the following categories: espionage; economic espionage as defined by ITAR, EAR, IEEPA; covert action; and, research violations. China’s illegal export of military and dual use technology, to include IEEPA, EAR, and ITAR violations and other export related violations in the US, comprise 43.7 percent (260) of all cases worldwide. Eftimiades says more than 80 percent of these cases occurred in the US. Reportedly, economic espionage which is mainly conducted by private companies or individuals, account for 25.98 percent (119 total) of cases). The category of “traditional espionage” stands at 22 percent (108 total) of worldwide activities. Eftimiades notes the figure of traditional espionage cases sits at 55 if Taiwan is separated out as a Chinese intelligence target. Of known cases, Taiwan is the single highest priority target for individual espionage.

On a chart provided by Eftimiades, one can observe the distribution of cases to the many venues of Chinese espionage in the US. The distribution pattern reveals concentrations occurring in tech sectors, manufacturing hubs and business centers. In California, “Silicon Valley” is shown to be the number one spot in the US for China’s illegal technology collection efforts. Apparently, more than half of the 140 cases that occurred in California targeted technology firms in that venue. Other cases centered around San Diego and then Los Angeles in the state. Further, collection activity in California was mainly economic espionage (51) cases), EAR violations (30 cases), ITAR violations (25 cases), and IEEPA violations (13 cases). In the economic espionage cases, the predominant form of tradecraft was using insiders (employees) to access restricted technology and trade secrets. Priority collection objectives in California were information technology (46 cases), aerospace and aeronautical equipment (27 cases), and automated machine tools and robotics (20 cases). Nationwide, China’s collection activities cluster around the major educational, research, and manufacturing centers in several states to include Massachusetts, Michigan, New York, Pennsylvania, Florida, New Jersey, and Texas. Victims of China’s espionage efforts in the US include major defense and aerospace companies, pharmaceutical firms, technology research companies, and manufacturers. In cases in Virginia and Florida, Chinese diplomats and citizens were caught trespassing on military facilities to conduct ground photo reconnaissance. Those facilities were associated with US Naval forces and special operations capabilities.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) Eftimiades notes that research universities are clearly primary targets for collection efforts, achieved most often through talent programs such as China’s Thousand Talents Program, Hundreds Talents Program. Eftimiades reports that most estimates suggest there are “at least 200 Chinese talent programs designed to employ academic and professional expertise from the West into serving China’s national development.” He continues further to explain: “This expertise ranges from scientific and engineering fields to business, finance, and social Sciences. These programs are serviced by 600 overseas stations that gather information on foreign scientists and then attempt to recruit them. In numerous cases, professors, graduate students, and PLA researchers have also been arrested for stealing research from overseas universities for use in China.”

Chinese intelligence services apparently studied the situation, and recognized just how open the US was for theft of its secrets in all sectors and then clearly decided to pour through, taking whatever they could. Surely, the Communist Party of China saw no need to halt commercial entities engaged in their own espionage activities, much as Eftimiades remarks earlier in the section entitled “PRC Organizations Conducting Espionage”. It appears they have seen nothing but opportunities to do a lot of open field running for them with little real risk. To date, it appears that they have all found no reason to pare down their operations, and certainly no reason to retreat. From Eftimiades own data, one can infer their espionage activities have steadily increased. Opinionis enim commenta delet dies, naturae judicia confirmat. (For time destroys the fictions of error and opinion, while it confirms the determination of nature and of truth.)

Though Eftimiades explains in his Preface that “cyber espionage is only addressed in select cases which were enabled by humans providing insider access. However, in discussing how exactly the FBI and DHS have thwarted Chinese espionage efforts later in his “Analysis of Cases” section, the discussion meanders into cases in which they discovered sources within China of cyberattacks into sensitive computer files of the US government, defense related businesses, financial institutions, high-tech and medical research facilities, academia, and anywhere else the hackers apparently believed there was a good opportunity to break-in and seize data. While Eftimiades expressed the intent to focus on HUMINT operations and tactics of Chinese government organizations and commercial entities engaged in espionage in the US, it would seem that he had little choice but to present it if he sought to put some positive face on what US counterintelligence services are doing to thwart China’s efforts. It is the brightest rift which can at present be seen in the clouds,

Readers may recall in Act 1, scene 3 of William Shakespeare’s play, The Life and Death of Julius Caesar, Cassius utters these apposite words to his co-conspirator Brutus: “The fault, dear Brutus, is not in our stars / But in ourselves, . . . .” With the intention of being frank, but by no means beastly, greatcharlie proffers that the fault for China’s success may lie with the US counterintelligence services themselves. It may be less a matter of tactics, techniques, procedures and methods, and rather a problem among US counterintelligence service personnel that the Chinese have recognized that they can exploit. As a matter of professional development, some effort might be made to ensure their cognitive abilities regularly honed through weekly, even daily, exercises and tests to strengthen their thinking skills, their prowess at uncovering all relevant facts, even from trifles, and developing solid insights from those facts, and their effective and correct use of a reliable intuition and intimation. Though this is stated in the abstract, one can almost be certain that the Chinese intelligence services to some degree are doing like-minded things to strengthen their intelligence officers competences. It could be something as simple as the private performance of Tai chi chuan or likely Martial Qigong every morning. (imaginably, both techniques would be performed respectively with a dynamic and free-flowing form and stances that would cause any instructor to weep with delight while observing ) Along with exercise, stretching, and breathing, it would allow their intelligence officers to mediate and attain deep focus and a relaxed state. Such activity would be helpful in any struggles with dépaysement.The Chinese intelligence services surely are quite determined to maintain an edge over their adversaries. So far, they have proved themselves to be competent and accomplished services in the field.

The Chinese company Huawei has been placed under similar export restrictions as ZTE had been, for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Section 9: “Analysis of Espionage Tradecraft”

As stated earlier, a condensed review of Section 9 “Analysis of Espionage Tradecraft” is not included here. The section is left to each reader to enjoy at first blush and perceive and decipher all they can from it. Recall that in November 1922, when excavating the tomb of Tutankamen, the English archeologist and Egyptologist, Howard Carter, pierced a hole enabling him to see inside the actual chamber. He was asked by colleagues if he could see anything, and he simply replied: “Yes! Wonderful things!” Readers will say the same when they read this section.

Having stated that, greatcharlie nevertheless includes some commentary on section, compelled by Eftimiades to mention that among those committing acts of espionage for China are commercial entities, SOEs and private companies, academic institutions, and independent individuals, particularly entrepreneurs. Eftimiades explains that SOEs and commercial entities have been determined to engage in espionage in the US and elsewhere outside of China. Having dubbed them as entities engaged in espionage, they are examined as such and ascribe all of the qualities of an intelligence service. Thereby, one would expect to observe certain traits of an intelligence service such as tradecraft to be performed by their representatives while operating in the field. Yet, unless there is some information collected by US Intelligence Community–and that would unbeknownst to greatcharlie–stating those entities as well as individual business engaged in similar acts, view themselves to be intelligence services or espionage organizations, one may not see them regularly act as such.If they display any tactics, techniques, or methods that resemble tradecraft it should be viewed as exceptional and not an expectation. Imaginably, they, themselves, might be quite surprised anyone might refer to them as espionage organizations. They simply may view themselves as a “collective” Chinese citizens working in the US availing their home companies and country of technologies, hardware, documents or whatever else they might grab from US institutions that may employ them as the opportunities present themselves. To that extent, they may really be nothing more than somewhat organized rings of thieves, nothing more. As for these individuals showing such willingness to respond to the requests and demands of the Chinese intelligence services or other State Council bureaucracies as SASTIND, too much might be made of the fact that they are obedient to the commands and demands of their authoritarian and very often punitive, government. After all, in addition to their own lives, everything that they hold dear, their families, are in the hands and under the awful power of an authoritarian–some might say totalitarian–Communist government in Beijing.

Of course, one must be open-minded. Thus, the door should not be shut completely on the possibility of some deliberate design in the practices of such commercial entities and individuals with regard to their espionage. Note that overall, their practices are not chaotic or haphazard, but rather they are grounded and for the most part accomplished. Aliquis latet error. (Some trickery lies hidden.)

In the abstract, one could imagine their movements and interactions of individuals operating for commercial entities may be intentionally stochastic. Indeed, if the activity is genuine espionage and not simply criminal behavior what greatcharlie supposes should really draw the attention of US counterintelligence is not as much whether it meets a certain expected standard of tactics, techniques, procedures and methods. What should draw that attention is the appearance of control, orchestration, and forceful activity, and that something intense is happening. Something is intended and is being achieved. The fact that there is a professional side to all of that activity must also be considered. The focus, greatcharlie humbly suggests, perhaps should be placed first on the purposefulness of the activities displayed by Chinese commercial entities and individual businesspeople, not its randomness. 

Acting as described, they allow themselves some degree of security without the need to set up resources, set up sites, train in tactics, techniques, procedures and methods to communicate and pass information physically. Keeping their movements randomly determined might leave their efforts open to analysis statistically. One could discern some random probability distribution or pattern. However, it might still be impossible for those movements and interactions to be predicted in a useful way. One might imagine that to rise to a certain level in their companies or institutions, the individuals involved are well-educated or clever enough to consciously plan their activities in a seemingly random way. Surely, anyone in a commercial entity or institution selected for such work will be tested and screened before being sent off. In some welcome back, job well-done session or maybe a torturous debriefing, the employees surely inform their manager what practices worked well in the field and which at the time were determined to be too risky.

What would seem as important, or perhaps even more vital for Chinese commercial entities, would be properly casting each “espionage operative” or “thief.” The absolute right man or woman must be assigned for the right job. Surely, human resources would bring in and spotlight the right people and managers would make selections for such work and overseas deployment. One would hardly find such individuals to be hot-blooded, and wreckless, incompetent in any fashion. They would exude equanimity, sangfroid, graciousness, and professionalism. They apparently work with a mindset that nothing is unattainable. Loosely, one might posit, taking such an attitude and approach to their efforts, might be said to be at the foundation of any “ostensible tradecraft.” Everything they do, choices they make, flows from that line of thinking.

Looking at Eftimiades discussion a tad more it would seem that he gives Chinese commercial entities and individuals engaged in espionage too much and too little credit at the same time. He perhaps gives them too much credit by identifying them as intelligence gathering organizations and thereby assessing their use of tradecraft. He gives them too little credit in that if he believes his presumption as to their status as spies and their “spy-like practices,” correct, then he dismisses the possibility that their actions are disguised, deliberately performed in a way distant from tradecraft as a technique. If their intention was to cause confusion among possible observers by taking that tack, Eftimiades’ expression of some puzzlement over the absence of traditional tradecraft in their practices serves as evidence that to a degree they may have succeeded in that. At the same time, certainly nothing they might do, would be intended to stand out, such as, perhaps in extreme, appearing gargoyle or something of the type, and drawing attention daily.

Some foundational information and thought on Chinese espionage activities in the US has to be established if study and understanding on the subject is to be advanced. The establishment of such a baseline of information, however, should not result conversely in some uncompromising stance toward it. New facts must be collected and an openness must exist to consider alternative analyses of those facts, which may lead to new possibilities and potential successes against such activities. There are likely many unexplored possibilities that perhaps should be considered about all matters concerning the subject. From what has been publicly reported, often in the US national security bureaucracies, perspectives on adversaries have reportedly become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, perhaps most akin to an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with regard to Chinese foreign intelligence activity in the US.

It seems high time that US counterintelligence services ceased looking at Chinese intelligence operations and tactics with a focus on their deficiencies and flaws in practice. Equally or even more important is to consider precisely what they are doing right in order to be successful. A starting point would be an assessment of how Chinese intelligence services and all the other government organizations and commercial entities engaged in espionage in the US view US counterintelligence services and how they are responding to US defenses set up against them. It would seem from Eftimiades text that a burgeoning notion in defense of the current situation in which China is achieving a degree of success is that their numbers in the US are so high that it would naturally be difficult to struggle with them head-to-head. Hopefully, this is not the case. To be frank, the ability of Chinese intelligence services to position so many of their personnel in the US is just a symptom of the conundrum of not being able to stem their activities. Focusing upon that will not yield a cure. There are surely considerable deficiencies and flaws in the way in which US counterintelligence operates that have given Chinese government organizations and commercial entities the confidence to act without much fear. Res ipsa locquitor. (The thing speaks for itself.)

Of the seven universities that have been dubbed the Seven Sons of National Defense, some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. On that list is the Nanjing University Aeronautics and Astronautics (above). Nanjing is also known for providing the MSS with recruits for its corps of intelligence officers.

Section 11: “Summary”

Since what is found in Eftimiades “Summary” section is drawn from his discussion of his analysis of the 595 espionage cases since 2000, it would stand to reason they would serve well as a figurative subset of eight ample bullet points for his “Key Findings” which themselves extracted directly from the facts of those many cases. Of that seeming “subset of findings” in Eftimiades “Summary” section, the “top 5” selected by greatcharlie are the following.

First, Eftimiades explains that the US Intelligence Community is not well-organized to protect the secrets of US industries. It is far better at protecting its own secrets. He says the same holds true for most other technologically advanced [highly industrialized] countries. A problem he points to, calling it obvious, is that commercial industry and scientific research programs, the primary targets for Chinese intelligence collection, are the most vulnerable.

Second, as aforementioned in the discussion of the monograph’s Preface, Eftimiades says the DHS and the FBI are leading the effort in the US “to combat China’s massive intelligence collection campaign.” He again states that both organizations “have done excellent work in reducing Beijing’s relentless efforts,” noting the FBI has made advances since 2018 to assist US industry and academia, and DHS is also working aggressively to curtail illegal exports of advanced technology and those who steal scientific research. However, he declares “there is still much more to be done.” He explains that the work of other government agencies as well as a bipartisan effort in Congress will also be necessary to ensure national and economic security.

Third, Eftimiades proffers that success in thwarting China’s aggressive collection efforts will ultimately rest upon three factors: 1) the ability of US law enforcement and intelligence apparatus to shift organizational culture and support private industry and academia; 2) developing a strategic campaign in the US integrating all the elements of the government and its allies; and, 3) having Congress pass laws to raise the costs of economic espionage to the Communist Party of China. Chinese companies and individuals via visa restrictions, sanctions, investment restrictions, and otherwise. 

Fourth, Eftimiades explains, as he has surely illustrated throughout his monograph by reporting his case analysis, yet does not declare in any vehement way, that China’s “whole of society” approach to espionage has been quite successful thus far in defeating government and private industry organizations. He focuses more on what has been positive about US counterintelligence efforts,

Fifth, Eftimiades reveals that efforts by some countries within the EU, India, and Japan to restrain China’s intelligence activities have been comparatively less apparent in public sources. Although espionage arrests in India, Germany, France, Belgium, and Poland have been low in number, he sees such developments as an indication that those countries now seek to more vigorously counter China’s collection efforts. In addition, Eftimiades asserts that “China’s public image is suffering worldwide as the French and German governments have made statements on China’s aggressive espionage on social media, human rights issues, COVID-19 response, and Beijing’s threats over trade.”

In determining the percentage of Chinese espionage efforts thwarted, it must again be noted that the percentage would need to be calculated based on the entirety of the Chinese espionage effort. If one accepts Eftimiades does not know that number, and there is no reason not to do so, knowing the percentage of thwarted espionage efforts seems impossible and his claim is only a presumption or at best the result of “secret knowledge.”

When writing about the success of the FBI and DHS in thwarting espionage efforts of Chinese government organizations and commercial entities, there was less of an appearance by Eftimiades of reporting facts, and a more apparent effort by him to convince readers on a position tenuously supported in the text that he wants them to accept. To that extent, he actually presents more than anything else, as there is no supportable alternative story to present given the realities of the situation, is a well-supported outline of concerted, energetic, and endless activity to steal US secrets by China.

It would seem that the nature of the situation has already been firmed in the minds of the public based on reports in the newsmedia. It is unlikely that readers of his monograph would be inclined to Eftimiades perspective, despite his remarkable background. It is unlikely that anyone in the US counterintelligence services, particularly among senior executives and managers, is on Cloud 9 over results versus Chinese government organizations and commercial entities engaged in espionage in the US. Somewhere deep inside, some may feel a bit stuck and stagnating, clutching at straws, and listening to the wind, but conceal such concerns from their colleagues. One might imagine their feelings: “Je suis las de toujours faire la même chose.” That would be a multifaceted problem for US counterintelligence services in itself. Perchance in trumpeting FBI and DHS success was an effort to boost morale or at least comfort those from each service who may have had their fill of Chinese success in their country. Eftimiades may have viewed optimism as the best and most available elixir for defeatism, and employed it liberally. Perhaps this line of thinking that drove Eftimiades, who leaves no doubt that he is unwavering in his support and confidence of the FBI and DHS, consciously drifts a tad away from his encomium of their respective work against Chinese espionage moves in the US. As also mentioned in the discussion of the monograph’s Preface, in the “Summary” section, Eftimiades does say “there is still much more to be done.”

Noticeably, in the “Summary” section, as noted in the discussion of the Preface, Eftimiades also relents so to speak from his “declaration of nescience” to say there are very likely thousands of Chinese espionage operators in the US. However, although there is clear evidence that their purpose is to steal US secrets and technologies, one might consider in the abstract whether there may be other interests of the utmost importance to the Chinese intelligence services that require such a labor-intensive effort. That should beat the brain. Going back to the suggested figure of 25,000 intelligence officers, professionals, albeit discrepantly trained and experienced, on the ground–a force one and half times the current size of a US Army armored division, it may be worth considering whether they may be engaged in a bold, cunning reconnaissance and surveillance mission of far greater conception than ever seen in the past or might normally be imagined in the present. Itt might be a mission that could not be performed in any other way than with a large force of professional intelligence officers. To be direct, yet admittedly still a bit Delphic, there must be a clear reason why officers of Chinese Intelligence services operating in the US, in particular, are so successful at not being wherever, whenever US counterintelligence services are looking for them. 

There is a thin line that separates reality from illusion. It must be kept firmly in mind that if one denies or unconsciously suppresses reality, what is left is only an illusion, false reality. Once one begins planning and operating within that, all is lost. If that is or ever would be the case concerning the Chinese conundrum, the situation will become far worse than ever imagined. Further, the more one deals in truths and reality, the more one develops reliable intuition and intimations. The more one entertains fallacies and what is artificial, the farther one moves away from having any real intuition or developing any intimations at all. These skills in the end will prove to be absolutely imperative if endsieg, a final victory against all of the odds stacked against them, is to be achieved by US counterintelligence services in their struggle against Chinese espionage efforts. As the celebrated Spanish novelist, translator, and columnist, Javier Marías remarked during an interview for the Winter 2006 issue of the Paris Review: “One must have courage to see what one does see and not to deny it for convenience.”

Regarding China’s concern about having the image of being a country of thieves and copycats, stealing the best ideas of other countries to support and propel its conspicuous advancements in nearly all sectors, the Communist Party of China absolutely has an interest in global public opinion of China and perceptions of its actions on the world stage. Still, it is unlikely that the Communist Party of China has too much concern about that in that vein. One must remember, the Party insists that at the foundation of all advancements of the Western industrial powers are the years those countries overwhelmed peoples who were defenseless and through a colonial system violently oppressed them and allowed business enterprises of their respective countries to exploit the conquered peoples’ lands for raw materials and mineral wealth for centuries. They will use the experience of China to support that argument. Within their own countries, the Party says down-trodden workers were essentially enslaved by the same business enterprises now called multinational corporations. (Note that greatcharlie asserts in the abstract that this is the Communist Party of China’s perspective; it is by no means greatcharlie’s perspective.)

Still, more salient based on the Party’s mindset would be the overall judgment of the world on the robust energy China displays as it pushes onward and upward into the future and, albeit mistakenly believing, eventually reaching the position at the top as the world’s dominant power. From that perspective, the Communist Party of China would see their country as having a very positive, lasting impact on global perceptions of it everyday. To that extent, the Party leaders and propagandists likely weigh that global perception on “energy” and Western measures of global public opinion ratings, particularly if those ratings are based on reactions to independent events and not the bigger picture. While one might agree that there are some universal truths about our world, still not everyone thinks the same on all issues. China’s view of its future is quite at variance with that held by most in the US best familiar with the issues involved. Fere libenter homines id quod volunt credunt. (In most cases men willingly believe what they wish.)

There will naturally be more that US counterintelligence services would want from the US Congress to appropriate for them in order to pursue adversarial countries’ intelligence services operating without pause, on the ground, in the US. However, the matter must be examined from the lens of Congressional leadership. From their view, US counterintelligence services  presently possess considerable resources to pursue Chinese intelligence officers and operatives. There are no indications Chinese espionage networks are being regularly taken down. Harsh critics and skeptical observers might begin to believe that, unbeknownst to the public, US counterintelligence services are actually being restrained from doing their utmost to defeat opponents here in the US. However, there would hardly be any logic to that. Surely, US counterintelligence services are not flâneurs, in the field simply playing chase games. Even the slightest act in that direction would betray the trust and reliance the US public has in their fidelity and  their belief that they are protecting the country’s sovereignty, its property, its interests and especially its people. As expressed in the February 26, 2021 greatcharlie post entitled “Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts”, by 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. Sardonically, from a paranormal perspective, one might suggest that although Chinese intelligence officers may be operating in the same spaces in which US counterintelligence services are looking hard, they do so in some other plane existence, undetectable by mortal eye. Sous une surface calme tout se passe.

There has been more than enough talk about how bad the problem with China is. C’est la Bérézina. As it has been discussed so often that, in a way, such talk haa become by the by to some degree for the US public. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and destroy all of its networks. As greatcharlie has mentioned in proceeding posts on the Chinese espionage crisis, It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Eftimiades clearly understands that much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. Fundamental changes may be needed in efforts to halt Chinese espionage operations. There is the possibility that certain apparent aspects of Chinese intelligence operations are not being focused on sufficiently or appropriately. Making the right improvements requires being persistent in one’s search for answers. To continue the pursuit successfully will require a certain boldness in thinking. Although he literally lost his head by guillotine two years later, George Jacques Danton, the 18th century French revolutionary leader, addressed the Legislative Committee of General Defence, September 2, 1792 with words concerning the situation in France which are apposite for counterintelligence organizations dedication protecting their countries against any harm by Chinese intelligence services: “De l’audace, et encore de l’audace, et toujours de l’audace, et la France est sauvee.” (Boldness, more boldness, and always boldness, and France is saved.)

What Eftimiades presents on Chinese espionage operations and tactics represents a stage of those activities existent at the time he wrote the monograph. However, Chinese intelligence operations and tactics appear to be constantly and rapidly evolving, becoming something more effective, more efficient everyday. As their capabilities improve, the possibilities for action also increase. It is difficult to accept but very likely a reality that success has given Chinese intelligence services so far good reason to approach the future with confidence. To that extent, the worst may be yet to come. However, on the other side of the coin, while it may seem counterintuitive to some ears, the success of Chinese government organizations and commercial entities engaged in espionage in the US should not frustrate US counterintelligence officers. Rather, it should embolden officers of US counterintelligence services to struggle even harder to succeed. Hope must still exist in the situation for that. Surely, establishing a pattern of success would go a much longer way in building self-confidence among officers in US counterintelligence services struggling on their own home ground with the Chinese.

What one finds in Chinese Espionage Operations and Tactics is of considerable quality. The book remains a steady flow of information, data, and expressions that well-demonstrates the author’s command of the subject matter, from beginning to end. Without pretension, greatcharlie states that what is presented here represents less than twenty percent of the insights birthed in greatcharlie by Eftimiades monograph. Readers should imagine what insights might be brewed up from within themselves after they have had a chance to read through it. 

It is assured that after the first reading Chinese Espionage Operations and Tactics, one would most likely go back to the book and engage in that stimulating process again and again. The monograph will very likely be regularly consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. Surely, the monograph would be quite useful to an Intelligence Studies instructor who, as a primary part of an assignment, might decide to have students read the monograph, observe the manner in which Eftimiades report is formatted, how information is presented in its sections, and develop insights from its discussion.

Perhaps it is eedless to say at this point, but it is nonetheless stated with absolute conviction and true relish, greatcharlie unequivocally recommends Eftimiades Chinese Espionage Operations and Tactics to its readers.

By Mark Edmond Clark

Commentary: Will the Real Dong Jingwei Please Stand Up?: Comparing Features of Popular Images of China’s MSS Vice Minister

People’s Republic of China Vice Minister for counterintelligence of the Ministry of State Security Dong Jingwei (far right), and People Republic of China Minister of Public Security Zhao Kezhi (center), were among five Chinese officials attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. On June 23, 2021, officials of the People’s Republic of China Embassy in Washington presented this photograph of Dong’s very public appearance at the Shanghai meeting as proof that he is in China despite rumors that he had defected to the US four months before. The point at issue is whether the photograph presents the real Dong.

In June 2021, rumors had taken flight concerning the alleged defection of Dong Jingwei, the People’s Republic of China Vice Minister for counterintelligence of Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS–China’s relative equivalent to the Central Intelligence Agency (CIA). Dong was alleged to have defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. After arriving safely into US hands, Dong allegedly provided government officials with information about the Wuhan Institute of Virology that purportedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. However, by late June 2021, US officials began reaching out to the news anonymously to say reports of Dong’s defection were not true. and hinting that he remained in China. The mainstream news magazine Newsweek reported on June 22, 2021 that it was informed by a US government official that reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Although reticent about the rumors for the longest time, on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite claims that he had defected to the US four months before. Curiously, the photograph has not been widely accepted as incontrovertible proof of Dong’s identity, that he still resides in China, or that he did not defect among many independent China-watchers.

Before the controversy of the rumored defection, one would have had great difficulty finding Dong Jingwei’s name anywhere it might even be expected. Two resources for such information that greatcharlie’s will reach for first are: Peter Mattis and Matthew Brazil, Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), and I. C. Smith and Nigel West, Historical Dictionary of Chinese Intelligence (Historical Dictionaries of Intelligence and Counterintelligence) (Scarecrow, 2012). Following the blow-up of the defection story, numerous articles online have appeared and online encyclopedias such as Wikipedia and Britannica, have developed enough information to provide decent–though some were not so verifiable–biographies of him. As was noted in greatcharlie’s June 30, 2021 post entitled The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax,” never before has Dong’s name, or any other senior MSS counterintelligence official’s name, been bandied about in the US or global newsmedia in the manner it has been lately.

What would imaginably now be a greater issue for inquiring minds than Dong’s biography, is the matter of his actual image, how he actually looks. A number of photographs of him have cropped up along with the many new articles, but two particular images of Dong have been very popular. As the two images have far more similar features than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. If they are photographs of two different men, one may actually be Dong. Here, greatcharlie gives making comparisons between the two images of Dong the old college try.

The June 16, 2021 tweet from the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong Jingwei had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia. Along with Han’s commentary was the popularized photograph allegedly of Dong Jingwei.

The first image mentioned above was made available widely via Twitter on June 16, 2021 as a result of being in a photograph attached to a tweet by the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia.

The second fairly popular image is included with his biography in Wikipedia. The individual in the Wikipedia photograph appears to be the same individual in the photograph that the Chinese government released of Dong attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. He is the same individual in a photograph taken when Dong was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. In the photograph, Dong is first from the left. It is alleged to be the earliest publicly available photograph of Dong after he began serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in April 2018. 

A photograph taken when Dong Jingwei (far left) was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. It is alleged to be the earliest publicly available photograph of Dong serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in the MSS in April 2018.

Si parva licet componere magnis. (If we may compare small things with great.) By placing the photograph of Dong from greatcharlie’s June 30th post beside the photograph from his biography in Wikipedia, using only the naked eye, one can find clear distinctions in at least seven areas of their respective faces. To allow readers to follow along with comparisons of facial features, the June 30, 2021 greatcharlie post photograph is included here as Figure 1. The Wikipedia photograph is included here as Figure 2. A chart that identifies parts of the human face is included here as Figure 3. Readers should refer to that chart to locate points of the face mentioned in Figures 1 and 2. The seven specific points on the face address include: philtrum; philtral columns; philtral dimple; nasolabial grooves; nasal septum; mentolabial sulcus; and, facial marks.

Figure 1 

Dong Jingwei June 16, 2021 Twitter Photograph

Figure 2 

Dong Jingwei Wikipedia Biography Photograph

Figure 3 

Face Chart

Philtrum

The philtrum on the individual in Figure 1 forms a visually straight canal with the philtral columns formed in straight lines from the nasal septum to the top of the lip. They are somewhat thick on both left and right. The canal of the philtrum appears relatively symmetric in its depth and width to the corresponding height and width of each philtral column. On the individual in Figure 2, the philtral columns appear shorter than those of the individual in Figure 1. They are separated enough to form the philtrum into a wider and somewhat deeper canal than that of the individual in Figure 1. 

Philtral columns

Although they are not marked on the chart in Figure 3–greatcharlie apologizes for that omission, the two columns of the philtrum running from the septum of the nose to the top of the upper lip are called the philtral columns. At the point the philtral columns touch the top of the upper lip–known more precisely as the vermilion border–in Figure 1, two delta shaped points form. Those delta shaped points are not present on the upper lip of the individual in Figure 2. On the individual in Figure 2, the philtral columns contact the upper lip in a way to form a horseshoe or “U” shape. The upper lip, itself–as aforementioned, called the vermillion–forms only moderate curves at the points on which the philtral columns contact it.

Philtral dimple

The philtral dimple, not marked in the chart in Figure 3–again, our apologies–is the gap between the two philtral columns where they contact the upper lip. On the individual in Figure 1, the philtral dimple is pronounced between what are visually two triangle shaped points, both left and right at the base of the philtral columns. On the individual in Figure 2, the philtral dimple is a far less pronounced facial feature.

Nasolabial grooves

The nasolabial grooves on the individual in Figure 1 are very pronounced both right and left. They begin at a point above the wings of the nose appearing to make contact with the dorsum of the nose. The nasolabial grooves on the individual do not contact the wings of the nose. They stretch in near straight lines down and to the left and down and to the right, reaching just outside the edge of the angles of the mouth. The nasolabial grooves on the individual in Figure 2 are not as long as that of the individual in Figure 1. They curve inward and contact the top of the wings of the nose of the individual. Although the nasolabial grooves are not as pronounced on the individual in Figure 2 as those of the individual in Figure 1, where they become more apparent is closer to the wings of the nose. They are somewhat deeper and the skin around them appears thicker than that for Figure 1.

Nasal septum

The nasal septum at the point where it contacts the philtrum on the individual in Figure 1 is thin. The point at which the nasal septum contacts the philtrum On the individual in Figure 2 is somewhat thick. The nasal septum also appears shorter to some degree. The individual in Figure 1 appears clean shaven beneath the nasal septum and over the philtrum to the upper lip. The individual in Figure 2, in all photos available publicly, maintains very slight hair growth, perhaps a deliberate, modest “designer stubble,” beneath the nasal septum, covering the philtrum down to the top of the upper lip and across to the angles of the mouth.

Mentolabial sulcus

On the individual in Figure 1, the mentolabial sulcus, the line or furrow formed between the base of the lower lip and the base of the chin, is prominent. There is an apparent blemish–mole, birthmark, scratch, bruise–beneath the mentolabial sulcus along its right edge, at a point just inside “the line.” The mentolabial sulcus on the individual in Figure 2 is barely perceptible. It has a somewhat curved shape. The chin on the individual in Figure 1 appears somewhat “U” shaped. The chin on the individual in Figure 2 appears more “bow” shaped. The length between the base of the lower lip and the base of the chin is shorter on the individual in Figure 2 than on the individual in Figure 1.

Facial marks

On the individual in Figure 1, there is a mole, birthmark, slight injury (scratch or bruise), beneath the mentolabial sulcus, beneath and just inside the right edge of it, not making contact with the line itself. On the individual in Figure 2, there are no similar marks on the face.

Finally, the most obvious difference between the two men is that one in Figure 1 wears eyeglasses. The individual in Figure 2 does not wear eyeglasses. It is possible, however, that the individual in Figure 2 does wear eyeglasses, but simply removes them when taking photographs.

Additional Observations Concerning Photographs

Signs of Aging

Eheu fugaces labuntur anni. (Alas, the fleeting years slip by.) What might be perceived beyond the physical about how two individuals in the photographs projected themselves at the moment their pictures were taken is that they are respectively professional, intelligent, well-minded, well-dressed, well-groomed, Chinese officials. However, from what information is publicly known, and what one may accept as true about Dong is that he is currently 57 years old, reportedly being born on November 18, 1963, one can attempt to correctly perceive aspects of his physical condition, too! To that extent, one might consider how age might impact the appearance of the real Dong.

There are many who really do not begin showing signs of aging until a bit later than 57. (By no means does one become “past one’s prime” or “over the hill” after reaching age 57!) Yet, there are some fairly common, and commonly understood, changes in appearance that normally occur. As one ages, the appearance of the face and neck typically changes. Loss of muscle tone and thinning skin can often give the face a flabby or drooping appearance. The skin also tends to dry out and the underlying layer of fat shrinks so that your face no longer has a plump, smooth surface. To some extent, wrinkles cannot be avoided. If readers would look back at the two photographs of individuals both identified as Dong in Figures 1 and 2, they will notice that the individual in Figure 2 has a rather plump, smooth surface. There are no wrinkles or furrows visible on the face. There is considerable muscle tone in the face in all three photos of him presented here, most prominently along the jaw. The individual in Figure 1, exhibits the more dried skin that comes with age. The visage of the individual is strong but there is no pronounced muscle tone. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, slight furrows can be discerned on his forehead.)

Sun exposure and cigarette smoking are likely to make them develop more quickly. However, there is no way for greatcharlie to determine whether the individual in the photograph is a heavy smoker or is regularly exposed to the sun. There is no way available for greatcharlie to determine whether these factors relate to the individual in Figure 1 either.

In another sign of aging, the number and size of dark spots on the face increase as well. It was noted earlier that there is a blemish on the right side of the face of the individual in Figure 1. However, there is no available way for greatcharlie to determine when that individual acquired the blemish. There are no discernible spots on the face of the individual in Figure 2.

With aging, the loss of bone mass in the jaw reduces the size of the lower face and makes your forehead, nose, and mouth more pronounced. The nose may lengthen slightly. In both Figures 1 and 2, there is no indication of the loss of bone mass in the jaw. The noses of the individuals in Figures 1 and 2 do not appear to have suffered ill-effects of age such lengthening. In fact, the skin on both noses appears rather smooth and plump.

A common transformation due to aging is for the fat from the eyelids to settle into the eye sockets. This can create the appearance of sunken eyes. make. The lower eyelids can slacken and bags can develop under your eyes. The weakening of the muscle that supports the upper eyelid can make the eyelids droop. This may limit vision. There is nothing to indicate any of these aspects have impacted the appearance of either individual in Figure 1 or 2. As the individual in Figure 1 wears eyeglasses, any effects on his eyes may have been influenced by them. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, it appears that there is a hint of bags under the eyes detectable through his eyeglass lenses.)

A most apparent sign of aging is gray hair on the scalp, and gray hair on the scalp, and on the eyebrows and eyelashes as well. One the individual in Figure A, there is no ability to determine whether he has gray hair in his eyebrows or eyelashes. Except for the hair above his forehead, one cannot see the hair on his scalp to determine if there is gray hair. (It must be noted that in a photograph included here below in which the same individual identified as Dong in Figure 1 is seen, his hair parted on the left side of scalp, revealing what appears to be gray hair.) The individual in Figure 2, on the other hand, clearly has no gray hair in his scalp, eyelashes, or eyebrows. In fact, as aforementioned, there is slight hair growth on his upper lip. It is decidedly black giving him a very youthful appearance. To that extent, the individual in Figure 2 appears to be younger than the individual in Figure 1, and perhaps younger than 57-years-old.

Countenance of the Face

Duriora genti corpora, stricti artus, minax vultus et major animi vigor. (Hardy frames, close-knit limbs, fierce countenances, and a peculiarly vigorous courage, mark the tribe.) In addition the changes in the face that come with aging, one’s work can be manifested in the countenance, too! As explained in greatcharlie’s June 30, 2021 post, the primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide to protect China’s citizens, secrets and technology from foreign spies. Counterintelligence may very well be the greatest manifestation of the paranoia business, but it, as all other elements of the intelligence industry, requires wisdom, reason, and logic to be performed well. If progress through interviews or interrogations of the subject of an investigation indicates that an investigator is on the right track, there will be an attempt to find another door inside to open and pass through in order to get deeper on matters. Such technique is honed and polished over the years. 

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, speaks to this point in The Secret Pilgrim (Alfred L. Knopf, 1990) when his main character, George Smiley a senior and well experienced intelligence officer for The Circus–MI6 in nearly every respect, tells a group of probationary intelligence officers in the fictional foreign IntellIgence training school in Sarratt that he was the one who debriefed his arch rival from Moscow Center, the headquarters of foreign intelligence service of the Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB.  He was known only by the name, Karla, and was captured in Delhi after escaping the US. Explaining to the trainees in general about the nature of interrogations, Smiley says at times they are “communions between damaged souls.” However, when MSS managers have determined the situation demands rough treatment, imaginably compelled by some exigent circumstance, and when the decision will align with the thinking and plans of the Communist Party of China leadership, surely coercive measures will be employed to include forms of torture. That work surely takes its toll, often manifesting its pull on the countenance of those who have engaged in it. The aphorism is quite appropriate here: “L’habit ne fait pas le moine.” Still, perception might lead the reasonable to choose the individual in the photograph of Figure 1 to someone more apparently carrying such a burden based on appearance, and perhaps a bit of intuition. Ut imago est animi voltus sic indices oculi. (The face is a picture of the mind as the eyes are its interpreter.)

An image of Dong Jingwei matching that from the June 16, 2021 Twitter photograph (above). If these popular photographs of Dong in Figures 1 and 2 presented here are actually of two different men so be it. This practice may turn out to be of greater use by China’s intelligence services than anyone outside of the country might have imagined. However, there remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case then in the possible effort to conceal his identity, Dong has done the thing completely.

Concealing an Intelligence Chief’s Identity: Not an Uncommon Practice

The idea of a director, senior executive, or key operations manager of an intelligence service taking steps to conceal his or her identity would not be unique in the annals of secret intelligence. Turning to a handful of examples, in greatcharlie’s November 13, 2019 post entitled, “Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997),” it was explained that Markus Wolf, chief of the foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA of the erstwhile Deutsch Demokratische Republik (German Democratic Republic) or GDR, lived a life in relative obscurity, brilliantly concealing his presence and the footprint of his organization as both operated against the West. His memoir’s title, Man without a Face, was a direct reference to the fact that at one point, Western intelligence services only had a blurred photograph of Wolf while he attended the Nuremberg Trials from which elements within the CIA managed to identify him in 1959. Unable to collect an up-to-date photograph from which to identify Wolf afterward, for a long-time he was referred to among Western intelligence services as the “man without a face.” As the story goes, only after a GDR defector, Werner Stiller, identified Wolf in a photograph in 1979 for the counterintelligence element of West Germany’s Bundesamt für Verfassungsschutz (Office for the Protection of the Constitution) or BfV did that change. The photograph of Wolf was captured by Säpo, Sweden’s National Security Service, during a visit he made with his wife to Stockholm in 1978.

At the time Stephen Dorril wrote his authoritative book, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000), Richard Dearlove, then head of the United Kingdom’s Secret Intelligence Service–colloquially known as M16–was virtually unknown. A contemporary photograph was not published in the newsmedia. According to a BBC report, when Stella Rimington in 1992 was named the first female chief of the United Kingdom’s Security Service–known colloquially as MI5–her neighbors finally discovered what she did. Even her children learned of true occupation for the first time. No official photographs accompanied her name at that time. However, later, official photos of her were provided after photographers managed to take what was described as “a very blurry picture of her out shopping.”

Sidelights

If these popular photographs allegedly of Dong in Figures 1 and 2 here are actually of two different men so be it. It may turn out that using decoys may be a practice in greater use by China’s intelligence services than anyone outside of the country might have imagined. Perchance as a result of the Dong defection matter, it has been brought to light to the world all at once. The sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. 

There remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case, then in the possible effort to conceal his identity, Dong has done the thing completely. The two photographs focused upon here will continue to be published perhaps until another plausible image, or perchance another two or more, of Dong surface at some time and via some source of Beijing’s choosing.

A quote from Arthur Conan Doyle cited in greatcharlie’s June 30th post on Dong’s rumored defection might be worth repeating here. In “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in Doyle’s The Adventures of Sherlock Holmes published in the Strand Magazine (1891), his main character, Holmes, states: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

The Way Forward

Omne ignotum pro magnifico. (Everything unknown seems magnificent.) Without pretension, greatcharlie states that it does not have any information that would allow it to judge which photograph holds Dong’s true image. As promised, greatcharlie has only sought to parse out a few possibilities here. What is presented are simply perceptions based on observations made of less than a handful of photographs. Certainly in China, there are more than a few people in the MSS, MPS, the State Council, and the Communist Party of China who know exactly what Dong looks like and which of the two photographs, if either, depicts him. It may very well be that the causality for the use of mixed images of Dong is based on an effort to increase security. However, just as greatcharlie, a nonpracticioner, “amateur sleuthhound”–as one reader sardonically  referred to the editor–has examined two reported images of Dong in photographs, Expert, professional analysts in US and other allied intelligence services have doubtlessly examined all of the photographs out there that purportedly include Dong using AI and other advanced technologies, and have reached to their own conclusions. Thus, despite any possible efforts to conceal Dong’s identity, they likely have a fair idea of how Dong looks, too!

As greatcharlie has noted in previous posts, in our ordered universe, it is expected that everything will follow its design. Order in the human mind is established by patterns that one can decipher. With the smattering of facts, evidence, and insights available, one can still postulate, and see if a theory formulated on what the whole Dong episode was all about can be confirmed by facts through investigation. It may not always be a tidy process. Wary of the moves Chinese intelligence can make, some might contend the matter of the varied images of Dong may actually be part of some recherché plan to create greater mystery around his identity. Imaginably, it would be viewed as a subplot hanging from a greater MSS disinformation plot to foster a bizarre defection rumor. On the other hand, some might go as far as to assert a more fanciful theory such as the leadership of MSS, in an effort to impress Communist Party of China leaders ahead of, and during, the Centennial of the Communist Party of China the decided to provide a modest demonstration of the organization’s capabilities. Thus,, MSS may have decided to have a little fun with US counterintelligence services by “just messing with them” as the saying goes, making certain that Party’s leaders were in on the joke. The whole matter has certainly had quite a meretricious effect worldwide. Of course, such a move would hardly be a schema, and perhaps the last thing one should expect from MSS. Still, though it may be improbable, it is all the same conceivable. One can be assured that similar overimaginative assessments, judgments concerning the Dong defection episode will continue to be made and published primarily online. Their creation will be driven by the fact that for inquiring minds, the curious, the enthusiasts demand more answers on the matter. In Areopagitica (1644), the great 17th century English poet and intellectual, John Milton, explains: “Where there is much desire to learn, there of necessity will be much arguing, much writing, for opinion in good men is but knowledge in the making.”

The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax

People’s Republic of China Vice Minister of State Security Dong Jingwei (above). Beginning in February 2021, Dong became the subject of a rumor alleging that he, along with his daughter, defected to the US. The possible implications of his supposed defection were staggering. It was eventually revealed and proved that the rumor was pure fiction.  Never before has Dong’s name, or any other Chinese counterintelligence official’s name, been bandied about in the US newsmedia or worldwide in the manner it has been lately. An attempt is made by greatcharlie to some degree how this all came about and what was the purpose of it all.

Rumors of the alleged defection of Dong Jingwei, a vice minister of the People’s Republic of China Ministry of State Security–China’s relative equivalent to the Central Intelligence Agency, were the subject of intense discussion in the US newsmedia and social media particularly in June 2021. Allegedly, Dong fled China in February 2021 and handed himself over to US intelligence officials. Dong would have been one of the highest-ranking officers from China’s Intelligence Community, and the Chinese government in general ever to defect to the US. Yet, alas, the rumored defection never occurred.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, is now highly selective, positively picky, about those who serve in national security positions in his government. Considering what would be the most likely nature of the man or woman who would be able to serve as his Vice Minister at MSS for counterintelligence, it is hard to form a mental picture of where the rumor that Dong had defected to the US with his daughter, or who, or better, what organization, may have actually given it wings. It is harder to understand how those who ignited the rumor of Dong’s defection intended to benefit from its formulation and promotion. It is hardest to envision who among those with any knowledge of the Chinese government and the national security apparatus would believe, would ever consider defecting to the US no matter what the circumstances may be within the Communist Party of China or in his personal life. One could imagine Dong would be a deadender, sticking with the Party and his country until the rattle. There is always the possibility–though there are absolutely zero newsmedia reports anywhere that suggested some proceeding mental health episode had befallen him–that Dong may have been overwhelmed by some cacoethes. Barring that, there was no earthly reason to believe that he would defect, and to the US nonetheless. The puzzle now having been “resolved”–the whole truth is out there somewhere, greatcharlie gives a go at parsing out some of these issues hoping it does not come off as l’esprit de l’escalier. In that process, greatcharlie, albeit, steps out on shaky ground to present some unsolicited–and hopefully not unwanted–suggestions on how similar false reports in the future might be given appropriate consideration. Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.)

Some might conclude after noting the topic of this post that this is one more by greatcharlie on Chinese espionage in the US. Some, perhaps duly, might also grumble to the effect: “Now greatcharlie is all China, all the time!” While greatcharlie approaches the defection that did not happen out of academic interest, this examination, much as those of proceeding posts, is part of an ongoing effort by greatcharlie to give consideration of what it could offer to contribute to development more effective approaches to such hostile intelligence collection efforts against the US. Indeed, with the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. Readers will likely discern facts are interpreted from that perspective. However, no information is skewed or bent with preconceived ideas or bias.

Who Is Dong Jingwei?

Dong was born on November 18, 1963. He is presently 57 years old. In China it would be of some significance to note that he is of Han nationality. As for his studies, he has earned a master of science degree. The only publicly reported member of Dong’s family is his daughter, Yang–also known as Dong HuaHua on social media, who as part of the defection hoax was said to have allegedly fled China with him. She is the ex-wife of Alibaba executive Jiang Fan, who now heads the company’s powerful e-commerce platforms, Tmall and Taobao. 

Dong is a member of the Communist Party of China. Highlights of his career include service as the Secretary of the Party Committee and Director of the State Security Department of Hebei Province. He is a Member of the Party Committee and, of course, Vice Minister of the Ministry of State Security. With some reluctance, greatcharlie calls attention to the reporting of the popular online encyclopedia, Wikipedia. Referencing Intelligence Online, Wikipedia explains that heading the State Security Department in Hebei was significant for Dong because it was a province which has reportedly produced many of Xi’s securocrats.” Loyalty to superiors, age and regional background apparently won him favor with senior party officials under Xi. He then became part of the “Xi Jinping Clique,” one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles, and accolades as much, provided to Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS, where Dong is vice minister, is an intelligence service responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems mainly from providing consumers in Beijing to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, and ministers and senior executives of appropriate ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions.

As noted in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” the primary targets of the MSS hands down are its chief competitor, the US, the Russian Federation, Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes. In the countries of Eastern Europe, China has achieved some prominence in their space. China must equally measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. Taiwan, which Beijing declares is part of China, is a special case and a very important MSS target. The second rung of competitors would include India, Pakistan, Nepal, and Mongolia. India has doubtlessly garnered a bit more attention from MSS due to its ongoing border struggle with China. MSS has stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

In defining counterintelligence, James Olson, the former chief of Counterintelligence for the Central Intelligence Agency and author of To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), which greatcharlie reviewed for its January 2021 post, states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” The primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide. MSS shares the counterintelligence role with Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS. MPS is an intelligence service under the State Council in charge of the country’s internal and political security and domestic intelligence.

The achievements of MSS in the US have certainly been no mean feat, and should not be underestimated. As discussed in the February 26, 2021 greatcharlie post entitled,”Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts,” the tide of essentially unchallenged Chinese espionage has lapped up so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among possible dissenters, an interest, not solely due to exigency, will grow on the idea. Chinese intelligence services have hampered the work of US businesses, research and development firms, high-tech firms, academia, and the federal government itself. They have created spy networks within institutions critical to US economic security and defense. They have attempted to inconvenience the US in its efforts to improve bilateral and multilateral relations in under-developed, less industrialized countries and even long time friends of the in certain regions, and multilateral institutions that the US actually had a hand in creating. One might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them.

Dong (above)  once headed the State Security Department in Hebei, a province which has reportedly produced many of Xi’s securocrats.” Loyalty to superiors, age and regional background apparently won him favor with senior party officials under Xi. He then became part of the “Xi Jinping Clique,” one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles held by Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. It stands to reason that in order to be a successful vice minister for MSS counterintelligence. Dong must be a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

In attempting to ascribe certain traits to Dong given his role at MSS, those considered by greatcharlie may appear to be mere abstractions. However, the few traits listed here along with a reliable intuition and challenging experiences within his own intelligence organization may very well have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions within adversarial intelligence services. These same traits perhaps have also assisted Dong in successfully navigating the top rung of China’s national security apparatus and to perform well at the side of leaders of the Communist Party of China.

One might first postulate that Dong possesses the traits of clarity, purpose, and focus. Surely, Dong puts his intentions forward for the best outcome possible. Clarity would allow Dong to concentrate with intention on what is ahead, on what needs to be done. One might expect that Dong believes by now that serving in MSS, performing executive duties for counterintelligence is his purpose. To that extent, purpose was likely revealed to Dong when he discovered the ability to use intuition to understand what may be clear to others. He would be able to focus on what truly matters, and understand what needs to be avoided, such as anything that might frustrate, seriously inconvenience, hamper, or inevitably destroy his organization’s efforts

Dong would be an intelligence officer and political leader of great energy,enthusiasm, and creativity. That energy is transmitted through the MSS. In the US, it would be transmitted not only to officers in the field but to errant citizens and Chinese émigrés recruited to serve the purposes of the intelligence service. He would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. He would be able to find unlocked potential in situations and determine ways to uncover what may be hidden away

What Was Reported on Dong’s Alleged Defection

Relate retero. (I tell what I have been told.) Some simple falsehoods went some way to explain and support what was from the outset a questionable story. From what can be gathered about the episode, stories about Dong’s alleged defection initially emanated from conservative websites in the US. Newsweek points decidedly to a June 4, 2021 report from the conservative political commentary website, RedState, as a source of the rumor. Discussion within conservative circles reportedly became even more intense as days passed. There was considerable discourse on Dong’s defection found in Chinese-language, anti-Communist newsmedia outlets in the US and on Twitter.

Among those who reported on the defection, there was general acceptance of the sequence of events. The defection scheme as laid out was indeed mad-capped. Dong allegedly defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. Dong supposedly provided the US government with information about the Wuhan Institute of Virology that allegedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. According to Han Lianchao, a former People’s Republic of China Ministry of Foreign Affairs official who defected in the wake of the Tiananmen Square massacre, Dong’s defection was raised by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi at the US-China Summit in Anchorage, Alaska in March 2021. On June 16, 2021, Han, citing an anonymous source, alleged that in Anchorage, Yang and Wang demanded that the US return Dong to China, but US Secretary of State Anthony Blinken refused. Subsequent reports, coupled with analyses by China specialists continued as Dong’s precise whereabouts remained unknown. Speculation had even reached Chinese social media threads after Dong had not been seen or photographed for several weeks.

While preparing a story on the alleged defection, SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations, had sought comment from the State Department last week, however, it did not respond. In the first public clarification put out by the US government on the affair, a US official, speaking anonymously, “reached out” to say reports of Dong’s defection were not true. With regard to Dong’s whereabouts, he stated “We can’t confirm or deny where he is exactly,” but hinted he remained in China. The official refused to go any further. When SpyTalk asked why the Biden-Harris administration sought to knock down rumors of such a high level defection, an ultra-sensitive issue, the official reportedly stated, “that’s more of a policy question”and referred SpyTalk to the White House. Reportedly, the National Security Council did not respond to SpyTalk’s request for comment.

Notably, Newsweek reported on June 22, 2021 it was informed by a US government official that the reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Yet, such reporting still did not cause those insisting on the defection to retreat back, away from the issue. It is always a capital mistake to reach conclusions before having all of the facts on a point at issue.

The Chinese government, itself, delayed publicly addressing the stories about his alleged defection. Then on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite rumors that he had defected to the US four months ago. According to minutes released by the Communist Party’s Central Political and Legal Affairs Commission, Dong was among five Chinese officials who attended the 16th meeting of the Security Council Secretaries of the Shanghai Cooperation Organization (SCO) Member States on June 23, 2021 Reports of the meeting were also shared on Weibo, China’s largest social media service.

Sources of the Hoax: Views on That in the Newsmedia

The Daily Beast quoted Robert Manning, a former top Asia specialist in both Republican and and Democratic administrations for more than 30 years as saying the decision of the Biden-Harris administration’s willingness to address such a normally highly secretive issue was “to excise an unnecessary additional irritant in the still downward-spiraling bilateral relationship” between the US and China. The Daily Beast also reported another possible motive was to beat back a Republican campaign to deflect blame for the COVID-19 pandemic in the US from the erstwhile administration of US President Donald Trump to China’s Wuhan Virology Lab and, by extension, Anthony Fauci, director of the National Institute of Allergy and Infectious Diseases, who has been critical of the former president’s response to the disease. In the same vein that the motivation may be domestic politics, the Daily Beast reported that a leading China watcher suggested the objective was to head off Republican accusations that the Biden-Harris administration was “hiding a defector who has info on the lab leak or [other] embarrassing stuff.” Essentially amplifying what was aforementioned here, the Daily Beast explained reports of Dong’s defection originated in conservative circles here and abroad that have been critical of the scientific consensus that the COVID-19 pandemic was transmitted from animals in Wuhan’s “wet market.”

On June 4, former Fox News reporter Adam Housley tweeted that “US intelligence has a Chinese defector with Wuhan info. and China is trying to produce variants that suggest it came from bats to cover up that coronavirus originally came from a lab.” Housley’s report was referenced by RedState, which alleged that “a person believed to be among the highest-ranking defectors ever to the United States from the People’s Republic of China has been working with the Defense Intelligence Agency (DIA) for months.” Citing anonymous sources “inside the intelligence community,” The Daily Beast further reported that Red State cautiously claimed “the defector has direct knowledge of special weapons programs in China, including bioweapons programs,” and that the alleged information had created “a sudden crisis of confidence in Dr. Anthony Fauci.”

In a June 24, 2021 Washington Times story, it was suggested by a former National Security Agency counterspy that the defection rumors were “part of a Chinese disinformation effort to distract attention from growing international concern over reports the coronavirus pandemic may have originated in a Wuhan laboratory.” If that intriguing possibility is true, it would seem that the other shoe dropped when Dong was seen at a meeting with the head of MPS later in the month. It might be said the some in the US newsmedia are so expectant and desirous of good news for the US on the Chinese espionage front, that some outlets were even ready to jump at a contrived one. he US Intelligence Community did not flinch in response to the defection reports at any point until,  as aforementioned, one US official spoke “just looking to correct the record.” 

Other Suggestions

One can only imagine–if he was actually unaware that the fiction of his defection, would be laid on so thick in the newsmedia worldwide–what Dong’s immediate reaction was when he received news that he was the subject of a farce that put his loyalty and honor in question. Dong was imaginably a little put out. It may have also caused him some embarrassment, some loss of honor. While the truth of Dong’s loyalty to the Communist Party of China and his country would eventually be made very clear, he would surely recognize that once his name was associated with he would indubitably feel was a damnable rumor, that taint would still stick, even if only to some small degree, long afterward. 

 Perchance that the defection rumor was contrived by MSS, then it would be accepted honorably as an unavoidable sacrifice he had to make with the aim of protecting China. Perhaps some monitoring should be done to see if somewhere along the line in the near future, there is some sudden mention of Dong awarded some high honor for his “service” from the Communist Party of China. Perhaps he would receive the award from Xi, himself. That may very well signal, and could help support the idea, that the defection story was indeed part of some nefarious MSS scheme.

Quis custodiet ipsos custodes. (Who watches the watchmen.) Dong has unlikely gotten lost in any hurt. Yet, one might speculate that perhaps somewhere, someone believes Dong pretends to have an inner strength, nerve, that he actually lacks. Though the true source remains publicly unknown, so far to greatcharlie’s knowledge, no one has been denounced at least publicly in China for having responsibility for igniting the rumor against Dong. One could hypothesize that if the source of the rumor was actually in China, it may have been the case that Dong recognized attempting to establish blame among any rivals for the episode would only be corrosive, and trying to reconcile with some sense his own guilt for leaving himself open to the of such a rumor would be self-defeating. In such a hypothetical case, an expression of such acrimony within days of the celebrations of the Centennial of the Communist Party of China taking place in Beijing on July 1, 2021, would unlikely be of any benefit to Dong politically, professionally, or personally. To that extent, in the eyes of Communist Party of China leaders, he likely would do himself much honor by deciding to hold his tongue at this time, if he even needed or desired to speak out at all.

Arthur Conan Doyle in “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in The Adventures of Sherlock Holmes published in the Strand Magazine (1891) had his main character, the damnably good detective Holmes, state the following which is apposite here: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

Xi Jinping’s Counterintelligence Concerns

Xi has placed considerable focus on police, judges, prosecutors, public security, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. Xi has ordered China’s security forces to be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. In his address at the ceremony, Xi lauded the major contributions made by the Chinese police to safeguarding national security, social stability and people’s interests, He called them a mighty force that can be fully trusted by the Party and the people, and spoke highly of the major contributions made by the Chinese security forces to safeguarding national security, social stability and people’s interests. Xi also called upon the security forces to uphold the Party’s absolute leadership.

People’s Republic of China President Xi Jinping (above) has placed considerable focus on police, judges, prosecutors, public security, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. Xi has ordered China’s security forces to be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. Clearly, Dong has been mindful of Xi’s concept and intent and obedient to the new counter-espionage regulation that came into effect in April 2021.

Would Beijing Call It a US Counterintelligence Plot?

As discussed already here by greatcharlie and in previous posts, little progress has been made in halting it or even making a discernible dent in Chinese intelligence operations. Many minds in the US national security bureaucracies are certainly working fiercely on this matter of utmost importance, but it seems too few facts have been collected for them to run on to break new ground or produce anything worthwhile. Trails of espionage may lead to the MSS and PLA, directly in many instances, but those who commit the devilry of spying on Beijing’s behalf, in the US and from China, are seldom caught. With estimates as high as 25,000 Chinese intelligence officers, operatives, and informants on the loose in the US, it is difficult even the most partisan US observers such as greatcharlie to deny China has secured a massive advantage for itself. Publicly, there appears to be not much of anything comparable achieved to knock back Chinese espionage.

Dong’s team and counterintelligence executives and managers of the other Chinese intelligence services surely study the tactics, techniques, procedures, and methods of US foreign intelligence and counterintelligence services. They would seek to better understand and prepare for expectant future attempts to covertly insinuate operatives into the Chinese foreign and national security apparatus, including particularly both the clandestine posts and covert networks of civilian and military Chinese intelligence services and Communist Party of China organs operating overseas.

Dong and his counterintelligence managers at MSS doubtlessly understand the situation the US Intelligence Community has faced, scoring few victories and suffering many defeats in the intelligence struggle with China, and they very likely recognize that US foreign intelligence and services are anxious to turn the situation around and get some things going. They have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. 

To that extent, one might imagine it could plausibly be claimed within MSS headquarters that whole episode was a US counterintelligence artifice, designed to twinkle out Chinese intelligence service officers and operatives based on the their reactions by some the following: movements–attempt to leave US; communications–sending communiques by codes and encryption to provincial departments and municipal bureaus to confirm rumors and see instructions on next actions; contacts–reaching out to network managers in distress or panic; and, email, text, call, and meet other intelligence officers to parse out situation as reported. Alternatively, also with a counterintelligence purpose, the US could be said to have attempted to smoke out prospective defectors among those officers and operatives, attempting to convince them that some “tower moment” for Chinese intelligence service operations in US had occurred and the moment had arrived to choose to remain part of Communist Chinese system or seek refuge in the US. 

Dong and his manager further parsing out the matter might have speculated that beginning in February 2021, he may have been out of pocket for an extended period or on medical leave for some illness. Such speculation could go further to suggest the US Intelligence Community became aware of the situation, which would have been a chilling prospect in itself for MSS counterintelligence, and sought to capitalize on it 

What might cause Dong and his managers some discomfort even though the whole defection story was revealed as a hoax, and if it was the actual source of the hoax, is that for a while at least there appeared to be good news about success against China. Even if proven false, it would be good to have such positive news reach the ears of the US public, and Beijing would not want that. Further, even though the truth is out, the belief may exist among many in the US public that the “super secret” US Intelligence Community may have truly scored the specified success, and now, for reasons unknown, want to conceal it. Among conspiracy theorists in the US, the imagination may have also been given fuel to run wild and the whole matter of the defection will linger for a while. Chinese intelligence services would likely hope that some sense of discouragement might reach into the psyche of the US public over how Chinese espionage in their country appears unstoppable, even though it may be an issue somewhat outside of the average citizen’s day-to-day concerns.

As for the Communist Party of China, propaganda elements might eventually seek to use the whole circumstance to an advantage against the US. The goal would be to embarrass the US by making it appear as if the US Intelligence Community conjured up a story of defection because that has had no real successes at all against China. What would then perhaps be called “the big US lie” or something to that effect would doubtlessly be denigrated by Beijing through declaring it as being too contrived, unsubtle, poorly executed, and further evidence of how little the US Intelligence Community knows about the Chinese intelligence services. Then again, there may just be silence from Beijing.

A Novel MSS Counterintelligence Tactic to Smoke Out “Disloyalty in the Ranks?”

It would appear Dong may have actually been expecting to face something out of the ordinary from US and other foreign counterintelligence services much as discussed here, and it factored into MSS calculations on operations against the US. According to a story in the June 18, 2021 edition of the South China Morning Post, a report on a seminar on a counter-espionage regulation that came into effect in April 2021 was posted on Changanjian, the social media account operated by China’s top law enforcement agency, the Central Political and Legal Affairs Commission of the Communist Party of China. At the seminar, Dong urged the country’s intelligence officers to step up their efforts to hunt down foreign agents and insiders who collude with “anti-China” forces. A read-out from the seminar quoted Dong as explaining: “The promulgation of such regulations provides us, the principal agents responsible for counter-espionage work, with the legal means to prevent, stop and combat criminal activities that would jeopardize our national security.” Dong went on to state: “This will reinforce our responsibility in counter-espionage work, and enable us to do a better job in organising and mobilising all social forces in waging ‘people’s warfare’ against espionage activities.”

In addition to Dong’s expressions on catching foreign spies, the actual report as posted stated that the intelligence officers must also go after “insiders” and “people who bankroll their activities behind the scene.” On that point, the report additionally noted: “At present, infiltration and spying activities by foreign intelligence agencies and hostile forces have increased significantly.” It went on to say, “In particular, there are individuals who have willingly become ‘insiders’ colluding with foreign intelligence agencies and hostile forces and engaging in anti-China activities.” The South China Morning Post story lastly noted the insistence in the report that “All state security agencies must stand firm … deepen and carry out our various counter-espionage work to safeguard our national security.”

Given what was stated by Dong at the June 18th seminar on the counter-espionage regulation that came into effect in April and the report on the event, it may be grotesquely improbable, yet all the same conceivable, that the defection hoax was actually an MSS loyalty test on a grand scale to as was suggested, to step up their efforts to hunt down foreign agents and insiders who collude with “anti-China” forces.

Attempting to look at thinking in MSS from the outside, trying to put moments and trifles from recent events in order and give them a deeper meaning, greatcharlie hypothesizes that Dong and his counterintelligence managers at MSS could not be certain of how the US Intelligence Community, and other foreign intelligence services for that matter, might apply pressure to its officers and operatives. For them, that is always the pinch. To do something more than just study the matter, they may have created a scenario that would likely shock MSS personnel in the field: the defection of the MSS Vice Minister, for counterintelligence nonetheless. That might explain why Dong’s good name was thrown into the mix of something so repugnant. Dong and his managers could test what may have been a working theory on the likely causality of some occurrence, in this case it would have been collusion with anti-China forces, and see if it could be confirmed by facts through investigation. Indeed, Dong and his managers would have wanted to see for themselves how officers and operatives in the field would respond to a very deceptive approach that perchance in their minds could have plausibly been attempted by US counterintelligence.

Many of the MSS foreign intelligence networks and operations in the US, and elsewhere overseas, are run by MSS Provincial departments and municipal bureaus. It would most likely be the case that foreign intelligence and counterintelligence managers of those departments and bureaus would have understood that there would be no reason to leave their locations or try to leave the US in the case of such a defection. It would stand to reason that their identities as spies would likely remain unknown for the time being and everything would be handled by Beijing to prevent their capture and keep them safe. That would likely be instilled in training and before deployments. Expectedly, as a result of training, loyalty and dedication, equanimity and sangfroid would be displayed by officers and operatives. However, through experience one might postulate Dong could have felt that there are patterns one can discern that establish order in the human mind. An unexpected blow to the MSS leadership as a defection of its chief of counterintelligence, which they depended upon for their very lives, might surprisingly elicit inordinate behavior among trained officers and operatives.

Dong might have conceptualized further that if one of his officers or operatives had even considered going over “to the other side” or perhaps might have already been in “friendly contact” with so-called “anti-China” force, the former might fear of being uncovered by an alleged defecting chief of MSS counterintelligence might impel them to act, the latter might want to use the situation to capitalize on the connection already made and go to the other side. (After reading what is presented here, perhaps some may accuse greatcharlie of having too much imagination, others may say, too little.)

A Thought about Future Defections by Foreign Intelligence to the US

As expressed in previous posts by greatcharlie, how the US handles every defection will surely shape decisions by officials to defect in the future.What US counterintelligence services do with defector would certainly have value for MSS to the extent that it could be used to discourage, plant in minds of officers and operatives that turning to the US would not be a wise choice. What prospective defectors might gather from the whole Dong business is that his or her defection could easily become a very public matter, very quickly in the US and eventually worldwide. It could be imagined by them that facts concerning who or what, when, where, how, and why would somehow be leaked to the news media. Rather than a serious concern, their defection might be presented and looked upon at least among some in the US as a banal amusement. Bookmakers in Las Vegas may very well have been taking bets on the outcome of it all: “Did he or did he not defect?, and “Will he stay in the US or be returned to China for one of our spies?” Regardless of the rank or position a prospective defector might be, he or she would hardly get the impression that the way Dong’s name was tossed about was nothing to signify, but rather unseemly. They would perhaps recognize that they would have little cause to expect any better treatment for themselves. None of this should be looked upon as exaggeration or fanciful if the Dong episode might be considered at all instructive. Using the backdrop of this episode as a gauge, one can only imagine what would go through the mind of an intelligence officer of adversarial country, wanting to defect when thinking about the treatment and well-being of his or her family members and himself or herself, how seriously their situation would be taken by the US, and what would be their final disposition. That may not portend well for the US Intelligence Community or prospective defectors. Hopefully, that will not be the case.

The Way Forward

Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.) Despite pronouncements of Communist precepts that are designed to allow the society to evolve socially, economically, and politically, declarations to maintain an orderly society though a system of justice demanding obedience and assurances from the Communist Party of China on the smooth running of the state and conduct of government affairs aimed at supporting a high quality of life for the people, visible and publicly released reports of scientific achievements in the medical field to high-tech, greater endeavor in the vast ocean and into space, and the notices of accomplishments externally on foreign affairs and guaranteed that the country cannot be threatened, bullied, or taken advantage of ever again, China is nonetheless a nontransparent society. What one knows about China is what Beijing says is true. Independent observations that defy its realities are anathema in Beijing, and can be responded to harshly. There is plenty of secrecy. The frugal release of information on the Wuhan virus is the latest best example of that. Beijing, without fail, will double down further in secrecy when it comes to national security. Yet, to discerning eyes, what the world observes China doing also speaks volumes about what is highly likely being decided behind the scene. That was especially true in this case when ostensibly a man viewed widely in the Communist Party of China as one of the country’s most loyal and dedicated servants, was accused of what could be called the unthinkable. 

While Dong’s name has never been bandied about in the US newsmedia or worldwide in any way close to the manner it has been in just days before thus writing. For those somewhat familiar with such matters, greatcharlie’s editor, himself, being simply an enthusiast and nonpracticioner, well-separate from the intelligence world, the notion that that he of all people in Chinese intelligence would defect would be a bombshell neatly as big if Alexander Bortnikov of the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB, was said to have defected instead. That is simply unimaginable. 

Revenons à nos moutons. The hope of US counterintelligence should be “simply” to come into positive contact with an officer, operative, or informant with an albeit some leaning toward an idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. 

Given the peculiarities of the world of intelligence, this analysis should not be considered too extravagant. The desire of greatcharlie is that nothing in this post would be deemed too fanciful by readers and a bit of their curiosity on the topic at hand would be satisfied. Admittedly, it would be doubly satisfying to know what is presented here might  resonate with a few in US counterintelligence services grappling with the Chinese espionage conundrum. However, if greatcharlie has not achieved the latter, the 18th century French Enlightenment writer, historian, and philosopher, François-Marie Arouet, known by his nom de plume Voltaire, sums up its sentiment in Poème sur la Loi naturelle (1756), Quatrième partie: Je n’en dirai pas plus sur ces points délicats. / Le ciel ne m’a point fait pour régir les États, / Pour conseiller les rois, pour enseigner les sages.” (I will not say more on these delicate points./ heaven made me not to govern states, / To counsel kings, to teach wise men. Spero melior. (I hope for better things.)

Book Review: Bill Gertz, Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (Encounter Books, 2019)

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping in People’s Liberation Army uniform (above). Successive US administrations, both Democrat and Republican, stuck to a belief that by maintaining good relations with China and conducting trade and other business with it, the Communist regime in Beijing would eventually evolve into a free market, democratic system. However, it is clear now that China has reverted to its Maoist Communist roots. Instead of becoming more moderate and more democratic, China has become a more repressive dictatorship domestically. Internationally, instead of becoming more integrated, China has emerged as a dangerous threat to peace and security as it seeks to become the world’s dominant power. How this all came about and what the US can expect from all of this is elaborated upon in Deceiving the Sky: Inside China’s Drive for Global Supremacy.

In Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (Encounter Books, 2019), Bill Gertz, the author, directs a flood light on China’s practices that are designed to undermine the US economy, weaken and ultimately defeat the US military, and diminish the global influence of the US. An emphasis of Gertz’s discussion is how US leaders have repeatedly failed to understand the preparations in which Beijing is engaged to ready China for a confrontation with the US in the near future. Gertz also asserts the US leaders have also habitually failed to take appropriate steps to deter and act appropriately in response to Beijing’s threatening moves. An example of how destructive and impactful such delinquencies have been is the US response following Beijing’s use of the People’s Liberation Army (PLA) to crush the democratic aspirations of thousands of Chinese in Tiananmen Square in June 1989. China was sanctioned. However, Gertz says that far more consideration should have been given to how China would and actually did react to sanctions. Gertz says what China actually did was launch an unbridled campaign over the next three decades to steal and otherwise acquire some of the most valuable technology from the US. The theft has been staggering, estimated to be as much as $600 billion annually in stolen technology and intellectual property. However, in successive US administrations, both Democrat and Republican, there was a wilful blindness toward what was occurring. They stuck to a belief that by maintaining good relations with China and conducting trade and other business with it, the Communist regime in Beijing would eventually evolve into a free market, democratic system. 

Gertz says the outcome of this decades long policy failure by the US has been the emergence of an expansionist, hard line Communist regime headed by a supreme leader, who took power in 2012, with unchecked powers matched only by Mao: People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping. Gertz asserts that Xi has ruled with an iron fist. China has reverted to its Maoist Communist roots. Instead of becoming more moderate and more democratic, China has become a more repressive dictatorship domestically. Fundamental freedoms rights and prosperity for the Chinese people have essentially been eliminated.Internationally, instead of becoming more integrated, China has emerged as an ever more dangerous threat to peace in security as it seeks to become the world’s dominant power. Communist ideology is the centerpiece for that Chinese drive for dominance. How this all came about and what the US can expect from it all is elaborated upon in Deceiving the Sky: Inside China’s Drive for Global Supremacy.

The attention of greatcharlie was drawn to Deceiving the Sky at first upon recognizing the title’s reference to “The Thirty-Six Chinese Strategies.” The Thirty-Six Chinese Strategies or Stratagems are a collection of tactics that can be applied to very different situations. The strategies are derived from military tactics applied during the Warring States Period (403-221 B.C.) or during the Three Kingdom Period (220-265 B.C.). Comparisons are naturally made to other Chinese military texts such as Sun Zu’s Art of War focus on military organization, leadership, and battlefield tactics, the Thirty-Six Strategies, is a unique collection of ancient Chinese proverbs, more apt for the fields of politics, diplomacy, and espionage. The origins of this book are unknown. No author or compiler has ever been mentioned, and no date as to when it may have been written has been ascertained. Deceiving the Sky is the first stratagem of the thirty-six.

Gertz explains in the text that the title Deceiving the Sky comes from an ancient Chinese strategy used by generals to win battles called deceive the Sky to cross the ocean. As the story goes, an Emperor was hesitant to launch a military campaign against neighboring Koguryo, now Korea. In reaction, one of his generals convinced the Emperor to go to dinner at the home of a wealthy peasant. As the Emperor entered the house for a meal, the residence moved. The emperor had been tricked onto a boat ended for battle across the sea. Rather than disembark, he ordered the military campaign to advance, and the battle was won. What is derived from this story is that a leader’s determination to win a war should be so unrelenting that even an Emperor, viewed in Chinese culture as the son of heaven or the Sky, can be deceived. Translated into military precepts, deceiving the sky suggests that a commander: 1) Openly act as if intending to do one thing then do something else; 2) Create false alarms until the opponent no longer takes notice of alarms; 3) Lull the opponent into a sense of false security by appearing innocuous. Then when the opponent ignores you, one can attack at will; and, 4) One can also do the reverse, acting mysteriously and pretending to know things onees do not. Try different things and watch the opponent’s responses. The opponent will react most strongly to that which creates most concern. (See Stefan Verstappen, The Thirty-Six Strategies of Ancient China (China Books and Periodicals, 1999))

As Gertz discusses how China has acted against the US in recent decades, no doubt is left about how pertinent this ancient yet timeless stratagem is to its approach. According to Gertz, the strategy well-reflects the Marxist maxim that the ends justify the means. Beijing practices strategic deception known in the ancient formula as using false objectives to facilitate true objectives. It is another way of describing the Communist strategy of using all means warfare against the US which is the sole obstacle to China crossing the ocean and achieving the rightful place as the most powerful state in the world. Nemo repeite fuit turpissimus. (No suddenly becomes bad.)

So impressed was greatcharlie with Deceiving the Sky, it has sought to allow its readers to gleen enough about the book in a review that they would choose to well-thumb its pages themselves. What greatcharlie can state in all conscience that if one really does not have much time to dig deep into the crisis of Chinese actions and intentions, Gertz’s breakdown of the whole matter is about as accurate and concise a report on the matter as one is going to get. What is most impressive to greatcharlie about the book is the manner in which it stimulates thought on the grave issues concerning China. As greatcharlie has stated in previous reviews, books that can stir a fire inside the reader, and a passion for a subject, are the most memorable and most enjoyable to sit with. The role of reviewer, an unsolicited intermediary between a book’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a book then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil on a manuscript. It is greatcharlie’s preference to provide reviews of books that readers of blog can enjoy and from which they may edify themselves. Never is harm intended.

Gertz is an award-winning national security journalist and author of eight books, four of which were national bestsellers. He is currently national security correspondent for The Washington Times. On China, he is accepted in both journalistic and foreign and national security policy circles as being an authority. Even more, he is something of a treasury of knowledge on its pursuits versus the US. Confidential sources for years within the US national security bureaucracies have shared what they have reasoned was permissible with Gertz that clarified much about personalities, events, and situations concerning China with all possible precautions concerning national security firmly in mind. Gertz’s considerable standing among federal employees in rather sensitive positions is a reality that the most senior executives in the US government have recognized and have begrudgingly accepted. Gertz has been a guest lecturer at the FBI National Academy in Quantico, Virginia; the Central Intelligence Agency; the National Defense University at Fort McNair, and, the Brookings Institution.

The Author

Gertz is an award-winning national security journalist and author of eight books, four of which were national bestsellers. He is currently national security correspondent for The Washington Times. As a journalist, he recognizes his responsibility to speak truth to power. On the issue of China, he is accepted in both journalistic and foreign and national security policy circles as being an authority. Even more, he is something of a treasury of knowledge on its pursuits versus the US. 

Confidential sources for years within the US national security bureaucracies have shared what they have reasoned was permissible with Gertz that clarified much about personalities, events, and situations concerning China with all possible precautions concerning national security firmly in mind. Gertz’s considerable standing among federal employees in rather sensitive positions is a reality that the most senior executives in the US government have recognized and have begrudgingly accepted. In his biography posted by the Harry Walker Agency, a speaker’s bureau, it is noted that former Central Intelligence Agency (CIA) Director R. James Woolsey stated: “When I was DCI [Director of Central Intelligence] Bill used to drive me crazy because I couldn’t figure out where the leaks were coming from. Now that I’ve been outside for two years, I read him religiously to find out what’s going on.” During the 1990s, Secretary of Energy Bill Richardson told the author: “We talk about your stories at Cabinet meetings.” Defense Secretary William S. Cohen once remarked to China’s military intelligence chief that Bill “has access to more intelligence information than anyone I know.” Former Defense Secretary Donald H. Rumsfeld once told him: “You are drilling holes in the Pentagon and sucking out information.”

Gertz has also been a guest lecturer at the FBI National Academy, the CIA, the National Defense University at Fort McNair, the Brookings Institution, and Hillsdale College. He has participated in the National Security Studies Program at the Johns Hopkins University School of Advanced International Studies and the Syracuse University Maxwell School of Citizenship and Public Affairs.

In Deceiving the Sky, Gertz has provided a most discouraging account of how the US has fared in a “struggle” to claim the perch of the dominant power in the world which China has promoted. At the same time, he answers in an admirable way the questions that US policy makers and decision-makers should be asking. To that extent, he has supplied the US foreign and national security policy bureaucracies with their deficiencies. An earlier work by Gertz, The China Threat: How the People’s Republic Targets America (Regnery, 2000), was prescient in assessing Communist China’s goals and intentions. Deceiving the Sky includes new details of the danger and proves his warning was correct. Gertz warns that if nothing significant and lasting is done, it will only get worse.

Gertz digs into the dark roots of Beijing’s plans. Readers will find that the information Gertz provides will prove to ring true on every issue. He demonstrates that there are clearly greater issues hanging from any issue with China than usually appear at first glance. Surely, presenting a full excavation of China’s actions and intentions was unlikely desired or practical given the larger audience Gertz sought to reach. Perchance if Gertz were to write enough works on the matter he will manage to at least touch upon all of its many aspects. Gertz is not a storyteller. His job is not to entertain, despite what his publishers might desire without the ultimate objective of every publisher which is to sell books. As a journalist, he delivers the news, lays out the facts as they are, and to the extent that he may provide analysis, he edifies and enlightens with his insights. Gertz has the power to intellectually stimulate with his words

The present situation between the US and China is recognized by many scholars, academics, policy analysts, and journalists as being unhealthy. Gertz’s reports on Chinese plans and actions have run concurrently to those of other journalists and scholars writing on the subject and the main features of their stories tally. Indeed, a lengthy list of authors have written fine books on the matter and offer similar perspectives. Concerning those other books, greatcharlie would not dare offer even a short-list of them for it would only open the door to judgments on the the selection of them and perhaps their numerical order. As this review is focused on Gertz’s work, all of that would be beside the matter.

It would be difficult to convince greatcharlie that Gertz wrote Deceiving the Sky with the objective of eclipsing the whole of its kind. What he has done is add an invaluable volume to the body of literature that accurately discusses “The China Threat.” He articulates the struggle in a manner that gives all matters that hang from it real meaning. Gertz only asks readers to follow closely what he has written and learn. Some seem disposed to remain content with that situation as long as it lasts. Though he lays it all out impressively before his readers, those not so warm to Gertz’s views will for themselves determine what if anything in the book is essential and what is not. Certainly, one must also accept that not everyone will be attuned to the scream of writers such as Gertz on the real and immediate threat China poses. 

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) To those who seek to find normality and safety in what China is doing in Asia and beyond and see it all as being modest enough, it is likely Deceiving the Sky put their noses are not out of joint. Whether they might be characterized as rejectionists or alarmist in accord with their responses to Gertz, nothing in Deceiving the Sky was apparently intended to harshly cut so deep into the foundations of thinking of proponents of an ascending China that they should find his facts and deductions threatening to their own analyses or interests. He is not on the attack. His goal is to illuminate. He encourages all readers to simply evaluate for themselves how things have actually been moving and where they are actually heading. Not just out of a sense of professional satisfaction but rather the urgency and importance of the matter, he would welcome and wish for an effort by them to test the virtues of what he presents.

Xi and senior decision makers on foreign policy within the Communist Party of China albeit are individuals of an exceptional nature judging from what they have displayed of themselves in challenging the US for the position as the world’s dominant power. That is a desire that they have in abundance. They have shown themselves to be a thoroughly bad lot. Gertz paints an even more sinister picture of Xi in a discussion of historical figures among his role models.

To accept that China would cause the release of COVID-19 through what might be called deliberate negligence would cause one to accept China was capable of any fantastic outrage. Doubtlessly, many already believed that. Gertz would perhaps be among their number. China was frugal with information about COVID-19 enough so that rather than being seen as heroes, they have set themselves up as the antagonist of every Western country, primarily the US, struggling to resolve the COVID-19 pandemic in this all-too real global tragedy. Many in the federal government foreign and national security policy bureaucracies and the US Congress with the responsibility to monitor what China is doing, have refrained from telling too much about its actions and intentions and the full extent of what its intelligence services are doing against the US to the public possibly for fear of figuratively frightening the horses. An unwavering conviction over China’s malign intentions appears to be a luxury that many especially in US foreign policymaking circles sense they cannot afford to have. They understand that one’s political fortune could possibly be balanced against it. That job has really been left to individuals as Gertz.

It appears important to note that in more than one spot in Deceiving the Sky, Gertz’s discussion on US policymaking on China is colored by his political perspective, recognizably conservative. As aforementioned, Gertz is a national security correspondent for the Washington Times, a daily newspaper with a conservative political alignment and was employed in that position at the time he wrote Deceiving the Sky. The book was published in 2019, and Gertz also expressed some satisfaction with the decision-making of the administration of US President Donald Trump under a strategy of competitive engagement. (Readers for whom this will pose some problems have been forewarned.) Not to make a labor of this matter, suffice it to say that such digressions in the text should not distract somber and astute readers from taking into consideration the healthy, accurate, and urgent message Gertz offers exposing the true intentions. That discussion, in greatcharlie’s assessment, is not partisan.

What greatcharlie Found Most Interesting

Deceiving the Sky is 256 pages, portioned in 13 chapters and a titillating conclusion. It presents what could perhaps be called a catalogue of sins by China. The range of Gertz’s coverage of China’s activities in Deceiving the Sky can be readily observed in his descriptive chapter titles. They include: Chapter 1: How Communists Lie: The 2007 ASAT Test; Chapter 2: The East Is Red: Communism with Chinese Characteristics; Chapter 3: China Wars: The Failure of Pro-China Appeasement; Chapter 4: The Coming Space War with China; Chapter 5: Assassin’s Mace in Space; Chapter 6: Seeking Digital Superiority: China’s Cyberattacks; Chapter 7: High-Tech Totalitarianism; Chapter 8: Chinese Intelligence Operations; Chapter 9: Influence Power: Beijing and the Art of Propaganda and Disinformation Warfare; Chapter 10: Financial and Economic Warfare with Chinese Characteristics; Chapter 11: Corporate Communism: Huawei and 5G; Chapter 12: Military Might: World Domination Through the Barrel of a Gun; and, Chapter 13: Flashpoints at Sea and China’s String of Pearls Expansion. He sums up the book with the thought-provoking segment: Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People. 

It would be impossible for greatcharlie not to receive the lessons and messages of books as Deceiving the Sky and feel compelled to ruminate upon them. Yet, in this review, greatcharlie’s focus is not turned dutifully and perhaps expectedly toward the fundamental and vital issues of concern such as China’s military growth, military strategy, investment in space platforms, ties to Russia, moves in the South China Sea, threat to Taiwan, and other issues of the utmost importance concerning its expansion and hegemony in its the Far East and ambitions beyond Asia. Regular readers of greatcharlie are aware that the blog’s editor has a keen interest in what author’s offer about what makes those of interest to them tick. For years, such independent analyses by reliable sources have often saved federal bureaucracies an infinity of extra trouble by offering insight on what may very well be on the minds of decision makers in foreign capitals. After examining a sufficient record of an individual’s attitudes and behavior in the aggregate sometimes, their motives may still remain inscrutable and those writing books on their policy making and decision making with little resource may turn to speculation. An additional interest of greatcharlie of late are the activities of Chinese intelligence services in the US.

Four chapters in which Gertz offers insights into the thinking of the leadership of the Communist Party of China at the present and into the future  and Chinese intelligence services that caught greatcharlie’s attention are: Chapter 2: The East Is Red: Communism with Chinese Characteristics; Chapter 3: China Wars: The Failure of Pro-China Appeasement; Chapter 8: Chinese Intelligence Operations. Insights Gertz offers in the book’s close, Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People, are also worthy of special note.

According to Gertz, no other Chinese leader since Mao has embraced the rigid orthodox Communist ideology more than Xi Jinping, who came into power in 2012. Soon after, Xi engaged in a ruthless, albeit less viable, ideological cultural revolution of his own, a political purge of thousands of officials, some were among the most powerful players in the system. By 2018, under Xi, the Party once again emerged with Mao-like devotion to the Socialist ideal of creating New Chinese Man. He lays out how Xi has assumed more power than any Chinese leader since Mao.

Chapter 2 The East Is Red

It is in Chapter 2, Gertz’s more fully explains, as mentioned earlier, that no other Chinese leader since Mao has embraced the rigid orthodox Communist ideology more than Xi Jinping, who came into power in 2012. Soon after, Xi engaged in a ruthless, albeit less viable, ideological cultural revolution of his own, a political purge of thousands of officials, some were among the most powerful players in the system, such as regional Communist Party boss Bo Xilai, police, intelligence and security czar, Zhou Yongkang, and former Vice Chairman of the Central Military Commission, General Guo Boxiong. 

Gertz reminds that beginning in the 1980s and over the decades that China noted the post-Mao policy dubbed “reform and opening up,” Gertz has readers cast their minds back to the years when Chinese Communist leaders went to great lengths to hide their ideology. He states that “ideological speeches were reserved for Party meetings and three-hour long recitations on the great works of the Party.” He continues further explaining that propaganda organs deliberately substituted the more-moderate sounding Socialism in place of Chinese Marxist-Leninsm in a strategy designed to win widespread support from non-Communist countries around the world.

Gertz then emphasizes how all of that changed with Xi. By 2018, the Party once again emerged with Mao-like devotion to the Socialist ideal of creating New Chinese Man. He lays out how Xi had assumed more power than any Chinese leaders since Mao. Gertz notes that following the death of Mao, the next leader of China, Chairman Deng Xiaoping, argued that Mao’s fanatic view of the World Communist Revolution needed to be changed. In its place, he adopted a new strategy called “Beyond Ideology and Social Systems” that sought to scale back Maoist ways but not give up Communism. Deng intentions were not benign. Gertz asserts that Deng believed world peace was at hand and that China should find a way to exploit it. To that extent, Gertz writes, Deng put forth China’s pragmatic strategy enabling massive trade and investment with the Capitalist world. As Gertz explains,”Bide our time, build our capabilities” was the Dengist ideology, and when the peace eventually collapsed, China would be ready both economically and militarily to dominate. Interestingly, despite appeasement of China by successive US administrations after Chinese tanks crushed the hopeful democracy movement in Tiananmen Square in June 1989, Gertz notes that Beijing continued to harbor the conspiracy theory of US plans to subvert and contain the People’s Republic.

As a very intriguing and instructive point, Gertz explains that “Chinese Communism mimics religion-it presents a version of history with a journey of deliverance played out in chapters written in a chosen language. It boasts its own priesthood–political commissary ubiquitous throughout–and an enforced infallibility of its leadership.” There are prophets and devils, along with a council of senior religious leaders who have the power to change or interpret the Communist historical narrative. Gertz goes on to state that Party loyalty equals morality; doubting history is blasphemy, heresy and treasonous. He then declares: “There is a chosen people, the Chinese, a promised land, China, temples, pilgrimages, faith in the face of contrary facts, deep intrusion into the personal life of each person, and the indoctrination of children into the tenets of Chinese Communism.”

Perhaps a very apparent expression of Chinese Communism as religion is through united front work. To better understand united front work, greatcharlie turns to the expert source for perspective, Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published a superb book, Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019). According to Mattis, the central element to understanding what the Chinese Communist Party is doing and why to shape the world outside the party is united front work. Mao described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a paper in the 1950s, the Central Intelligence Agency (CIA) defined united front work as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the party. To that extent, as Mattis explains, united front work entails shaping those outside the party, and not simply the Chinese people or world outside the People’s Republic of China. United front work must also be a tool of political struggle. It is not confined to activities that we would call propaganda or public diplomacy. It is not limited to covert action. In 1939, Mao wrote: “Our eighteen years of experience show that the united front and armed struggle are the two basic weapons for defeating the enemy. The united front is a united front for carrying on armed struggle. And the Party is the heroic warrior wielding the two weapons, the united front and the armed struggle, to storm and shatter the enemy’s positions. That is how the three are related to each other.” Mao’s outline of united front work within the party’s toolbox remains as the core understanding of it within the Communist Party of China today. United front activities have “aided” the Communist Party of China in resolving several dilemmas of the post-Mao era. That was most apparent following the Tiananmen Square and the death of Deng.

Evaluated on the basis of the united front policy system, the Communist Party of China’s management of political influence operations runs to the very top of the party, involving senior leaders directly. The policy system extends through the party’s hierarchy and spills over into China’s government ministries as well as other state-owned and state-administered organizations. The State Council ministries to include the Ministry of Foreign Affairs and many other organizations with a party committee offer unique platforms and capabilities that the united front policy system can draw upon for operational purposes. United front work is conducted wherever the party is present. To that extent, as Mattis explains, united front work is not an “influence operation” or a campaign. It is the day-to-day work of the party. The importance of united front work to the Chinese Communist enterprise is the reason why Xi has repeatedly emphasized the importance of a working organ of the Communist Party of China’s Central Committee, the United Front Work Department (UFWD ), to China’s rejuvenation. Among experts on China, UFWD is generally understood to be a Party intelligence organ,

One could only have imagined that foreign policy decision makers at the top of the Communist Party of China were aware that if the COVID-19 disaster was not put right with urgency, it would have had an unfortunate effect on US-China relations. Relative to the enormity of the crisis created, Beijing’s response could not reasonably have been considered apologetic or a recognition of their misstep at all. Overall, the design of the response appeared to be to protect the image and reputation of the Communust Party of China, and leave the impression that it was infallible in its response.

United front work in diplomacy can often be a dominant feature. Diplomacy with leading industrialized Western countries and prominent industrialized countries in their own region is used as a platform to promote the message of the Communist Party of China and bolster its standing. To discern such efforts, one might watch for matters stated publicly that might have little purpose in a more private setting and in fact might be best conveyed on the sideline meeting or during a break in bilateral or multilateral talks.

The reason for this is that the target audience of those comments will not be the party to the negotiation. The target is the people of China and people of underdeveloped and burgeoning industrialized countries who erroneously might see China as having eclipsed the power of leading industrialized countries and directly confronting them. China’s effort to pull countries of the Third World in Asia and Africa and even countries in Eastern Europe, with a particular focus on the Balkans, within its sphere of influence to turn a phrase has the characteristics of a near collection mania. However, the behavior of the Communist Party of China perhaps has had its best results among countries led by tyrants and other potentates who themselves have engaged in the ions old quest for dominance in their region or in the world. Aliquis latet error. (Some trickery lies hidden.)

A tangible demonstration of how China is leading the march to a “better” future for the world, by taking on US power publicly. This was recently done during a two-day bilateral meeting from March 18, 2021 to March 19, 2021 at the Captain Cook Hotel in Anchorage, Alaska. A  US delegation led by US Secretary of State Antony Blinken and US National Security Adviser, Jake Sullivan met with a People’s Republic of China delegation led by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi. The two-day meeting got off to a tense start, with a public display of the strained nature relations between the US and China. 

Blinken laid out many of the areas of concern, from economic and military coercion to assaults on basic values. Sullivan made clear that the overriding priority of the US was  to ensure that its approach in the world and approach to China benefits the US public and protects the interests of US allies and partners. Further, he explained further that the US did not seek conflict, but welcomed stiff competition and will always stand up for its principles, for its people and its friends.

Yang responded boldly, taking a bit of time to express sharp criticism of the US. He spoke with great authority. There was an air of ceremony in his reproach. Yet, through his words were evinced the restricted, mental prison of Communism. His statement must be examined in some detail to allow readers to sense the style, tone, rhythm, mood, the expression of indignation, and the recognition that a new world order is on the horizon that will have Chinese characteristics. One can discern a certain flavor in expressions of united front work in diplomacy.

Yang explained: “We believe that it is important for the United States to change its own image and to stop advancing its own democracy in the rest of the world. Many people within the United States actually have little confidence in the democracy of the United States, and they have various views regarding the government of the United States. In China, according to opinion polls, the leaders of China have the wide support of the Chinese people. So no attempt to–the opinion polls conducted in the United States show that the leaders of China have the support of the Chinese people. No attempt to smear China’s social system would get anywhere. Facts have shown that such practices would only lead the Chinese people to rally more closely around the Communist Party of China and work steadily towards the goals that we have set for ourselves.”

In an effort to turn a disadvantage into advantage with mere words, Yang went on to say: “On human rights, we hope that the United States will do better on human rights. China has made steady progress in human rights, and the fact is that there are many problems within the United States regarding human rights, which is admitted by the US itself as well. The United States has also said that countries can’t rely on force in today’s world to resolve the challenges we face. And it is a failure to use various means to topple the so-called authoritarian states. And the challenges facing the United States in human rights are deep-seated. They did not just emerge over the past four years, such as Black Lives Matter. It did not come up only recently. So we do hope that for our two countries, it’s important that we manage our respective affairs well instead of deflecting the blame on somebody else in this world.

Ostensibly speaking on behalf of peoples “oppressed” and formerly oppressed by Western powers as China, itself, once was. Yang was particularly biting, stating: “The United States itself does not represent international public opinion, and neither does the Western world. Whether judged by population scale or the trend of the world, the Western world does not represent the global public opinion. So we hope that when talking about universal values or international public opinion on the part of the United States, we hope the US side will think about whether it feels reassured in saying those things, because the US does not represent the world. It only represents the government of the United States. I don’t think the overwhelming majority of countries in the world would recognize that the universal values advocated by the United States or that the opinion of the United States could represent international public opinion, and those countries would not recognize that the rules made by a small number of people would serve as the basis for the international order.”

No doubt was left as to his loyalty and dutiful nature toward the Communist Party of China as Foreign Minister Wang performed his united front responsibilities expressing the following position: “China certainly in the past has not and in the future will not accept the unwarranted accusations from the US side. In the past several years, China’s legitimate rights and interests have come under outright suppression, plunging the China-US relationship into a period of unprecedented difficulty. This has damaged the interests of our two peoples and taken its toll on world stability and development, and this situation must no longer continue. China urges the US side to fully abandon the hegemonic practice of willfully interfering in China’s internal affairs. This has been a longstanding issue, and it should be changed. It is time for it to change. And in particular, on the 17th of March, the United States escalated its so-called sanctions on China regarding Hong Kong, and the Chinese people are outraged by this gross interference in China’s internal affairs and the Chinese side is firmly opposed to it.”

Latrant et scitis estatint praetesquitantes estis. They bark, so you know that you are in front of them.) One could reasonably presume any genuine negotiations planned by Chinese officials was secondary to what was stated at the outset of the meeting. Nothing stated by them could have led one to believe they were negotiating, seeking to establish common ground and points of agreement on issues and ways to come together on the most nagging ones. The meeting in Anchorage, Alaska provided a grand stage. The target audience of the Chinese officials’ reproaches was not really Blinken and Sullivan who were present in the room, but rather the people of China stand people of underdeveloped and burgeoning industrialized countries who would likely see China directly confront the US through their words. The Chinese officials sought to establish separate warring identities between the US and China. They sought to create the impression that some equipoise of power had already been by China versus the US.

Further, the Chinese officials clearly wanted to establish an image for the world to see of how disassociated China’s worldview was that of the US. They also appeared to want to demonstrate that China’s old view was more closely related with underdeveloped and burgeoning industrialized countries. They wanted to create the impression that there were both positive and negative forces present at the meeting, setting China up as the positive force and the US as the latter. 

Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi in Anchorage, Alaska, March 2021 (center). Gertz explains that in the 21st century, “the US is facing the potential of a new world war by miscalculation involving China that has been quietly and systematically building up what it terms comprehensive national power–military, diplomatic, economic–for what the Chinese Communust leadership believes will be an inevitable showdown in creating a new anti-democratic socialist and communist world order without the US.” In his most acidulous commentary, Gertz declares that “the pro-Beijing hands in and out if government were complicit in these policy crimes that deliberately appeased China through a rigid, establishment view that ignored the reality of the People’s Republic and cast it as a normal nation and not as a nuclear armed Communist dictatorship.” Gertz says that it was not until 2015 that the pro-China view was recognized as being no longer sustainable.

Chapter 3: “China Wars: The Failure of Pro-China Appeasement”

In the four decades after the period of reform and opening up began in 1972, Gertz says that “the vast majority among a relatively small and close knit community of China experts who glowed into government policy positions, intelligence agencies, and the officer corps from universities and think tanks produced one of the most serious failures of foreign and security policy in US history.” Gertz explains again that “forty years of willful blindness about China led to the adoption of disastrous policies toward China that have produced a new era of danger many experts see as analogous to the 1930s,” a period when shortsighted diplomats and policymakers prevented the US military from preparing to meet the threat of the growing power of the Japanese Empire. As that story goes, tabletop war games against Japanese forces were forbidden. The ruling elite feared that “it would create a new Japanese threat where there was none.” Gertz says that similarly, pro-Beijing hands created another strawman argument for the appeasement of China. In the aggregate, the result according to Gertz has been “a devastating run of policies toward Beijing that avoided all reference to China’s illicit activities and behavior from the massacre of unarmed pro-democracy students in Beijing’s Tiananmen Square in 1989, to China’s role in stealing US secrets on every deployed nuclear weapon in the US arsenal and hastening their spread globally by supplying nuclear warhead design secrets to Pakistan.”

Cuiusvis hominis est errare, nullius nisi insipientis, in errore perseverare. (Any man can make a mistake, only a fool keeps making the same one.) Gertz explains that in the 21st century, “the US is facing the potential of a new world war by miscalculation involving China that has been quietly and systematically building up what it terms comprehensive national power–military, diplomatic, economic–for what the Chinese Communust leadership believes will be an inevitable showdown in creating a new anti-democratic sociakist and communist world order without the US.” In his most acidulous commentary, Gertz declares that “the pro-Beijing hands in and out if government were complicit in these policy crimes that deliberately appeased China through a rigid, establishment view that ignored the reality of the People’s Republic and cast it as a normal nation and not as a nuclear armed Communist dictatorship.” He goes on to state the dominant pro-China community of both officials and non-government experts “inflicted serious damage on US interests by consistently producing biased and misleading assessments on both China’s intentions and capabilities.” Gertz says that it was not until 2015 that the pro-China view was recognized as being no longer sustainable.

As greatcharlie discussed in its March 29, 2021 post entitled, “Listening to and Understanding the Positions of Others: A Requirement for Thoughtful and Fruitful Talks in All Cases,” diplomacy has been defined as the established method of influencing the decisions and behavior of foreign governments and peoples through dialogue, negotiation, and other measures short of war or violence. In its practice, its key for negotiators to ensure the other side is listening and understanding what they are communicating. That necessitates managing negotiations without arousing hostility. Any awkward situations must be handled with tactfulness. 

Although only in office for a few months at the time of this writing, the administration of US President Joe Biden and Vice President Kamala Harris presumably has used US citizens, individuals with the very best reputations to contact Beijing through so-called back channels. Those individuals would be doyens, men or women of the world with a natural turn for diplomacy, and for discreetly presenting issues of concern and arranging delicate matters as a point of honor for Washington. China appears to commit itself to nothing where the US and Western countries are concerned, or where any other country is concerned for that matter. China’s government is founded on a movement that produced a revolution. It believes it provides a way of living based on Mao’s teachings that should be embraced for all humanity. It will never be satisfied until it puts the rest of the world’s government’s on a solid footing in that direction.

Whether diplomats, intelligence officers, Communist Party of China operatives, or businessmen, they spout the old propaganda line while overseas, “Communism is the wave of the future.” The Biden-Harris administration’s policy makers will have ample opportunity to test theories on how to get the best results from US bilateral relations and economic competition with China. Gertz does not use page space to present readers with exact details of how the US has bargained and negotiated with China, or the tone heard during opportunities in which they communicated bilaterally. The outcomes of such talks speak for themselves. It is one thing to establish a competitor firmly in one’s mind to help drive the effort “to up one’s game.” It is wholly another thing to seek something akin to world domination and to find a way up by stealing from, forcing out, and stepping upon, others. China is attempting to do all of the latter to the US. China will almost always be happy to meet with US officials to negotiate and sign any agreements both to humor themselves, satisfy those among US policy makers and decision makers naive enough to believe there would be any hope of hampering China’s march to dominance, and mollify others who may “fear” the change that Beijing assures is coming.

Qui cumque turpi fraude semel innotuit, eriemsi verum dicit amittit fides.  (Whoever has once become known for a shameful fraud, is not believed even if he speaks the truth.) One could go as far as to say it is delusional to persist in communicating entreaties of that kind to Beijing. This is especially true when it is clear how the troubling behavior in question is associated with China’s quest for dominance. There is no shortage of ambition. One cannot show a tender conscience to Beijing without soon facing a test of will or other undesired effect. The next generation may say preceding ones were dull indeed not to recognize and respond to China’s maneuvers. To go on in partnership with the Chinese, US administrations have forgiven, while not warranted, its worsening behavior. They have forgiven much. Diplomatic outcomes on contentious matters may often be part of larger arrangements, schemes of the Chinese. Indeed, Chinese negotiators will expect that parties to a negotiation will be willing to accept and start with the conditions they initially present. They will strenuously negotiate. If the Chinese can find no flexibility and no further room for satisfactory results from the negotiations they may alter their position more in line with the other party’s terms. The other party may be eager to accept China’s new amiable terms but they may be unaware that there could be a catch. A follow-on malign action, may weaken the benefit of any settlement on the same original matter. An opportunity for the Communist Party of China to test the the virtues of this approach presented itself with the Trump administration when it negotiated and signed a trade agreement in 2020. The Communist Party of China was already aware of the burgeoning COVID-19 crisis at home. It no longer appears Beijing is disposed to negotiating fairly, nobly, on anything. This may appear all the more the case as Beijing may feel it is moving closer and faster to its goal of overcoming the US as the world’s dominant power. After examining this, readers should recall the discussion earlier in this review of the “decieving the sky” strategy ascribed to China’s approach. It is very fitting. Quite so!

By the time the second action is realized by the second party, be it the US or otherwise, it is usually still too unfathomable to imagine that the more malign outcome was sought all along by China. By the time it may be accepted by the second party that every step taken by China was part of one larger scheme, the dye will have long since been cast. In its business of conquest, Beijing almost always does everything completely. China’s efforts in this manner do not seem to have an end.

US political leaders must be willing to do the hard yards to ensure its position is protected. This is not a situation that can be nuanced through talks at the negotiation table. China will not surrender any of its gains or leave what appears to be clear paths to its objective for anything the US might offer, except surrender or capitulation.

However, those US political leaders might also consider the words of Paine, 18th Century American political writer, theorist, and activist of the American Revolution asserted in The Crisis No. V (1778): “To argue with a man who has renounced the use and authority of reason, and whose philosophy consists in holding humanity in contempt, is like administering medicine to the dead, or endeavoring to convert an atheist by scripture.”

Workers in a high-tech facility in China (above). Gertz explains that an expert source in the US Intelligence Community revealed to him that Chinese intelligence operations only began receiving the attention they deserved in the late 2010s after China stopped using more cautious methods and adopted bolder approaches to stealing secrets and recruiting spies. Citing a retired source from the US Intelligence Community, Gertz notes that Chinese intelligence activities are akin to a storm. That Chinese intelligence storm is a secret assault on the US that is without parallel since that mounted by the Soviet Union in the 1930s and 1940s. Gertz explains that current Ministry of State Security recruitment efforts are focused on all US citizens with access to secrets China wants. Those secrets come in two main categories: counterintelligence information about Chinese working for US intelligence, and government secrets and even openly available information that will boost China’s military and civilian modernization and industrialization programs.

Chapter 8: Chinese Intelligence Operations

In Chapter 8 “Chinese Intelligence Operations”, Gertz takes the reader into the arcane world of espionage via the operations of Chinese intelligence services in the US. US counterintelligence services have tried to grapple with the matter of Chinese espionage, however the situation with the activities of Chinese intelligence services nevertheless has become an impossible one for them. The anecdotes that Gertz presents well depict the course of that intelligence struggle. He reconstructs the drama of each case. He does this so clearly, that one would believe that he was present in each case to watch events unfold.

At the core of the chapter’s discussion, Gertz explains that today, the Ministry of Public Security (MPS), Ministry of State Security (MSS), and People’s Liberation Army (PLA) intelligence agencies, along with the United Front Work Department, a Communist Party intelligence unit, are the leading forces of China’s intelligence power. Gertz supports the well-established view that the power of those services is focused solely on maintaining and expanding the power of the Communist Party of China in its drive for global domination. At the end of the chapter, Gertz briefly explains that there was ano important reorganization of the PLA intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) now resides with the new Strategic Support Force under the Central Military Commission. To provide a bit more detail on that transition, the Second Department of the People’s Liberation Army, responsible for human intelligence, the Third Department of the People’s Liberation Army, the rough equivalent of the National Security Agency, responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army, responsible for electronic warfare have been rolled into the new Strategic Support Force. The PLA’s human intelligence operations are managed by the Joint Staff Department, and comes under the Central Military Commission. Surely, Gertz is aware of all of this. However, as the main focus of Deceiving the Sky was shed light on the realities of China’s attitudes and behavior, actions and intent, with regard to the US, it was reasonable for him to preclose where he saw fit in his discussion of the Chinese intelligence services.) As for the United Front Work Department, as mentioned earlier in this review, it is one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three are the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.

Regarding MPS, Gertz says that it is the Chinese version of what has been called intelligence led policing that seeks to preempt crime. Yet, unlike the West, where laws limit the activities of police and security services, Gertz says Chinese security operations have few boundaries. One feature of the MPS is a system called “the Big System” that seeks to fuse masses of data from Chinese police and intelligence services into one program. Big intelligence is the intelligence version of the PLA’s drive for “informatization,” a term used for high technology analysis activities. 

Gertz informs that the massive police intelligence apparatus promises to make it more difficult for those seeking democratic political reforms in China to operate. As Gertz puts it, dissidents and enemies of the state as well as actual criminals will find it hard to plan and organize without leaving behind digital breadcrumbs that security services can collect and connect. He notes that theos MPS has also created the Golden Shield, a military style command structure designed to share intelligence throughout China. The systems have created pathways designed to breakthrough bureaucratic obstacles and link data. Golden Shield involves automatic analysis and cloud computing for analyzing masses of data including computerized facial, voice, and gait recognition. While MSS and PLA focus their spying operations on technology acquisition, MPS agents are engaged in spying on Chinese dissidents in the US.

Citing a former CIA director of counterintelligence, Gertz notes that Chinese intelligence activities, lay those of MSS and the PLA, are akin to a storm. That Chinese intelligence storm is a secret assault on the US that is without parallel since that mounted by the Soviet Union in the 1930s and 1940s. Gertz appears absolutely taken by the fact that penetration of US national laboratories has led to the loss of at least six nuclear weapons designs and the enhancement of Chinese offensive and defensive capabilities. Gertz explains that current MSS recruitment efforts are focused on all US citizens with access to secrets China wants. Those secrets come in two main categories: counterintelligence information about Chinese working for US intelligence, and government secrets and even openly available information that will boost China’s military and civilian modernization and industrialization programs. The modus operandi of MSS counterintelligence Includes the recruitment of foreign intelligence officers and their agents for work as double agents. Gertz tries to get to the center of the mystery of how MSS was able to completely destroy the CIA’s networks in China through combination information from an operative within the CIA and communications system breach. An estimated 30 agents were caught of which three were killed.

Beyond its own human intelligence activities, the PLA, particularly what Gertz, as mentioned, still refers to as the 3rd Department of the PLA, has engaged in a cyber campaign which has inflicted considerable damage to include the theft of sensitive government trade and industrial secrets.

Much Gertz explains here, greatcharlie has also observed in previous posts that little progress has been made in halting it or even making a discernible dent in Chinese intelligence operations. Many minds in the US national security bureaucracies are certainly working fiercely on this matter of utmost importance, but too few facts have been collected for them to run on to break new ground or produce anything worthwhile for that matter. Trails of espionage may lead to the MSS and PLA, directly in many instances, but those who commit the devilry of spying on Beijing’s behalf, in the US and from China, are seldom caught. With estimates as high as 25,000 Chinese intelligence officers, operatives, and informants on the loose in the US, it is difficult even the most partisan observers such as greatcharlie to deny China has secured a massive advantage for itself. Publicly, there appears to be not much of anything comparable achieved to knock back Chinese espionage. If US counterintelligence services had ever managed to achieve some significant breakthrough on the Chinese intelligence front, one would hear “singing in the valleys.” US intelligence services, much as those of other countries, abhor the prospect of public scrutiny, but it is too late now to be concerned by such anxiety.

The deluge of Chinese espionage has torn away so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among possible dissenters, an interest, not solely due to exigency, will grow on the idea. Chinese intelligence services have hampered the work of US businesses, research and development firms, high-tech firms, academia, and the federal government itself. They have created spy networks within institutions critical to US economic security and defense. They have attempted to inconvenience the US in its efforts to improve bilateral and multilateral relations in under developed, less industrialized countries and even long time friends of the in certain regions, and multilateral institutions that the US actually had a hand in creating.

In Aristophanes’ play, Birds (414 BC), the character Epops states: “The wise can often profit by the lessons of a foe, for caution is the mother of safety. It is just such a thing as one will not learn from a friend and which an enemy compels you to know. To begin with, it’s the foe and not the friend that taught cities to build high walls, to equip long vessels of war; and it’s this knowledge that protects our children, our slaves and our wealth.” Chinese intelligence services, perhaps at one time, expecting to face something out of the ordinary, that US counterintelligence services would have a few tricks up their sleeves, have not been challenged in any way that has halted or deterred their cyberintelligence or human intelligence activities. Chinese intelligence services have unfortunately managed to do their job successfully, collecting mountains of secret and information from the government bureaucracies and research and development sites, private businesses, high-tech firms particularly, academia, and think tanks. Surely there must be an atmosphere of optimism in the halls of the headquarters buildings of the Chinese intelligence services. The Communist Party of China most likely delights that without openly admitting to possessing such intelligence capabilities, at least through perception, it has that power over the US. 

One can imagine that on more than one occasion, resources, energy, and time were squandered following a false scent. (God help those who have been wrongfully suspected and falsely accused by mistaken or errant officers of any of the US counterintelligence service. It happens. No amount of reparation could ever fix the psychological and material damage very likely done to innocent targets and their loss of reputation and honor.)

Nam qui peccare se nescit, corrigi non vult. (If one doesn’t know his mistakes, he won’t want to correct them.) Perhaps US counterintelligence services are applying old ways of thinking to a new type of intelligence struggle that bears little resemblance to previous ones. The key to it all remains out there somewhere. Finding those who would be capable and disposed to sniff it out using traces available would seem to be the real task ahead. One might presume that US counterintelligence services would hardly imagine anyone from outside the bureaucracy would be capable of producing some shred through their amateur study of the matter. Indeed, some senior executives and managers of US counterintelligence services, determined to stand as solid pillars of standard thinking and behavior that will not be blown down by the winds of change, may brook the idea of bringing in outsiders to handle sensitive matters. They may be mistaken. 

The solution to this espionage riddle, at least based on public reports, appears no closer within their reach. If the matter has not indeed already been settled, it may seem to some that it is at least at the edge of the end. The chance for US counterintelligence services to exhale will not come for a while. Chinese intelligence services do intend to let it come at all. US counterintelligence services have not despaired of getting a handle on the situation. Uppermost in the minds of senior executives and managers in US counterintelligence services is whether anyone within the bureaucracy can produce the magic that will allow them the ability to gain and retain the initiative in a cause that appears to be lost. They must press ahead on the forward foot.

A US B-2 bomber and two US F-22 fighter jets fly in formation (above). The rocky nature of US relations with China is a matter of great urgency. Yet, Gertz is not planting seeds of war in a time of peace. Despite how he labels his conclusion, he does not propose war as a solution. He still holds hope that US officials will come across something along the way that might bring a solution to the crisis. Gertz explains that there is a growing bipartisan political consensus that new strategies and policies urgently are needed to deal with China. Ostensibly to assist in that effort, he presents a set of 14 recommendations for a policy of liberation for the Chinese people from the yoke of Marxist-Leninism with Chinese characteristics.

Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People

Readers might recall the words of the 16th century Italian diplomat and political theorist Niccolo Machiavelli in his famous instruction guide for new princes and royals by The Prince (1532): “There are two ways of contesting, the one by the law, the other by force; the first method is proper to men, the second to beasts.” The rocky nature of US relations with China is a matter of great urgency. Yet, Gertz is not planting seeds of war in a time of peace. Despite how he labels his conclusion, he does not propose war as a solution. Prosing out on that matter, he still holds hope that US officials will come across something along the way that might help them develop a solution to the crisis.

Gertz explains that there is a growing bipartisan political consensus that new strategies and policies urgently are needed to deal with China. He does not believe it will be impacted by what he calls the national predicament, a seeming loss of clarity amid increased political polarization. To assist in finding that solution, he presents a set of 14 recommendations for what he hopes will be a policy of liberation for the Chinese people from the yoke of Marxist-Leninism with Chinese characteristics. Gertz emanates a sense of assurance in his writing that the recommendations he offers in Deceiving the Sky would obtain good results.

Each of the 14 recommendations is sufficiently self-explanatory, some are accompanied here with a précis of his summary on it or greatcharlie’s own comments on it. Together, his recommendations have a cumulative effect. They include: 1) Information: Conduct aggressive competition in the realm of ideas. He proffers that the first step in creating a free and democratic China would be regime change, an effort to peacefully oust Communist Party of China; 2) Reciprocity: Restrict access by China to the US in ways equal to Chinese restrictions. A key measure would be to counter Chinese financial warfare with a US program of economic warfare; 3) Intelligence: Shift the focus and operating methods of American intelligence toward more robust and aggressive operations and more effective analysis. Rather than accept being pushed back on its heels, Gertz recommends that the US Intelligence Community should step up aggressive intelligence and counterintelligence operations against the Communist Party of China and the PLA; 4) Foreign Policy/Diplomacy: Restructure and Reform the diplomatic system. Such reforms would need to be implemented in a way that would allow the US to better confront and counter growing Chinese hegemony; 5) Alliances: Create a pro-freedom, pro-prosperity, and pro-rule of law network in Asia. What was already seen in the Trump administration and still being seen in the Biden-Harris administration is Gertz recommendation that the US develop “a global network of democratic alliances targeting China that will seek to pressure Beijing into abandoning its totalitarian communist system and global designs.”; 6) Cultural/Educational: Severely restrict activities by Chinese nationals in the US who are abusing the American system. Gertz suggests that such activities should be restricted in recognition of the subversion and technology theft threats many unfortunately pose; 7) Counterintelligence: Major strategic counterintelligence operations and analyses should be implemented that focus on aggressively targeting Chinese intelligence and security services; 8) Economic: The US should begin a gradual policy of disengagement from Communist China economically; 9) Financial: Plan and carry out covert financial warfare operations against China; 10) Military Exchanges: The Pentagon and US Military must adopt a new policy that recognizes the Communist Party of China and the People’s Liberation Army as the main enemy; 11) Military Missile Defense: Expand American Regional missile defenses. As part of a strategy of neutralizing China’s massive and growing force of ballistic, cruise and hypersonic missiles, Gertz says US missile defenses around the world should be expanded; 12) Military Gray-Zone Warfare: Develop asymmetric warfare capabilities designed to negate Chinese military, cyber, electronic, and psychological warfare capabilities; 13) Political: Create a Parliament in exile. The creation of a “democratic Chinese parliament in exile” that will develop new policies for a free China is an old chestnut.; and, 14) Russia: Play the Russia card. One might call Gertz the suggestion that the US should play the “Russia card” against China by seeking a free and democratic Russia aligned with the free world somewhat fanciful.

Most notable to greatcharlie in the context of this review is Gertz’s recommendation on “Foreign Policy/Diplomacy: Restructure and Reform the diplomatic system.” In his summary of that recommendation, Gertz suggests that US diplomats and foreign service personnel should be retrained in the use of new and innovative diplomatic methods and techniques for the information age that emphasize successfully implementing new strategic objectives toward China that reject the failed diplomacy of the past. The new diplomacy will be rooted in honest assessments and understandings of the true nature of Communist China. A new objective will be to report on and take steps to force an end to the systematic abuse of human rights in China as a high priority. The US should seek to create a new alliance of nations that will seek to isolate China and spur internal democratic political reforms and promotion of freedom and free market systems in the region. Strategic and economic dialogues such as those in the past that produced no results must be ended. New engagement should be limited to conducting bilateral and multilateral talks on concrete, achievable objectives such as verifiable arms limitation and enforceable trade agreements. It certainly would not be velvety going forward if such a course were followed, but perchance US values and interests would be well-served.

In Deceiving the Sky, Gertz’s research sheds an extraordinary side light on the undeniably aggressive thinking of Beijing. While US political leaders are still in a position to reexamine the facts, they should do so. Surely, if any of them were to take the time to look at Gertz’s book with an open mind, it would given them the necessary nudge to begin thinking in that direction. Deceiving the Sky could also lend support to deliberations among colleagues on the matter. 

There are likely quite a few citizens in the US who have heard about China’s aggressive activities. Surely, they would appreciate reading Deceiving the Sky as it would provide them a firm basis for understanding the many issues involved. As greatcharlie has already stated in this review, information from the text that is discussed here only represents a fraction of what the reader will find in Deceiving the Sky. For greatcharlie, the book was both edifying and a pleasure to read. Without hesitation, greatcharlie recommends Deceivibg the Sky to its readers.

By Mark Edmond Clark

Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts

The People’s Republic of China Consulate in San Francisco (above). The Consulate has been a bit troublesome. On occasion, it has been linked to suspected Chinese espionage efforts on the West Coast. However, Chinese intelligence operations in the region, which holds world-leading science and tech firms, have more often been tied to state-owned businesses, private firms, academic institutions, or research institutes than the Consulate. In a January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence. In Chapter Six, Olson lists 10 “benefits of a counterintelligence operation” and explains how to reap them. In this essay, greatcharlie presents some suggestions on how Olson’s precepts might be applied to help defeat Chinese espionage efforts throughout the US.

In its January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019. In Chapter Six “Double-Agent Operations,” Chapter Seven, “Managing Double-Agent Operations,” and Chapter Eight “Counterintelligence Case Studies,” in particular, Olson provides a generous amount of information on how counterintelligence operations have been conducted by US counterintelligence services. Readers are also favored with many of the logical principles that Olson would practice and expound during training during his service in the Central Intelligence Agency (CIA) counterintelligence. Included among what he presents is a list of benefits US counterintelligence seeks to gain from a double-agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Many of the tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination and creativity. One discovers how double-agents were dangled to garner interest from adversarial intelligence services, false information spiked with just enough truths, “chicken feed,” was transmitted, and nuanced communications between the double-agent and his handler were managed. In 12 case studies, Olson finally presents a classical series of demonstrations along with lessons learned. He tells it all in an apposite way. Virum mihi, Camena, insece versutum. (Tell me, O Muse,of the skillfully man.)

In fairness, Olson’s work should not be judged in terms of his reaction to the prevailing national security crisis at the time of this writing: Chinese intelligence penetration into the foundations of US power. A criminal strain is observed running through the thinking of the Communist Party of China as it dispatches Chinese foreign intelligence services to steal volumes, tons of information from the most secure locations in the US. Perhaps what the future may hold is made darker by the fact that among its central members, are individuals of immense intellect, making them a far more dangerous threat to US interests. In greatcharlie’s view, there is much that can be extracted from To Catch a Spy that might constructively provide some suggestions on how to address this crisis. With the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. That does not imply that a bias colors its discussion. No information is skewed or bent with preconceived ideas. What it does mean is that readers will likely discern facts are interpreted from that perspective.

In Chapter Six of To Catch a Spy, Olson lists the 10 “benefits of a counterintelligence operation” related in particular to double-agent operations and explains, in brief, how to reap them. In this essay, greatcharlie may albeit step out on shaky ground to present some discreet suggestions on how 9 of Olson’s 10 precepts might be applied in efforts to defeat Chinese espionage activities in the US. The suggestions are the result of some creative thinking on what if anything new might be said on the matter. In the essay’s discussion, greatcharlie hopes to avoid any appearance of instructing counterintelligence officers on what to do. Rather, the only desire is to offer all readers its suggestions, leaving it up to those in US counterintelligence to observe, reflect, and act as they may. It would be satisfying enough to know that some of what is presented here might  resonate with a few of them. It is presumed by greatcharlie that Olson’s precepts harmonize to a great degree with those that currently guide US counterintelligence officers in active service and thereby anything resulting from them would not be deemed too fanciful or even recherché. Applying Olson’s precepts to developments on the Chinese intelligence front in greatcharlie’s would have been beyond its scope of its preceding review of To Catch a Spy –although some readers noting the review’s length might sardonically query why there might be any concern over a few thousand words extra. In response to such concerns, greatcharlie has attempted to apply Olson’s teachings to the discussion here without making it an exercise in “large data processing.” It should also be noted that from the corpus of work on Chinese intelligence, a great influence upon greatcharlie are the writings of Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant.

Additionally, upon consideration of what it could offer to support the development of more effective approaches to defeat Chinese human intelligence and electronic intelligence collection activities against the US, greatcharlie bore in mind that it would need to be somewhat Delphic in its discussion. Therefore, what is offered are fragments of ideas with the aim of leaving a figurative trail of breadcrumbs that  a few officers in the US counterintelligence services might pick up. Hopefully, after testing their virtue, they will find something useful. Given this approach, greatcharlie apologies in advance to other readers who may find the discussion somewhat cryptic or a bit “undercooked” at places. De minimis grandis fit magnus acervus. (From the smallest grains comes a big heap.)

Chinese Foreign Intelligence Versus US Counterintelligence

Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know. At the top, senior executives and managers must account for the failing of their respective US counterintelligence services. Imaginably, they resent the deficiency. Surely, they are feeling terribly unsettled by regular reports of so much being blown, so much intellectual property and classified material being lost. They have certainly had a bellyful of the failure rate against the Chinese intelligence networks. There has been so much scandal–or at least what should be scandal–with US political leaders becoming entangled with Chinese intelligence operatives, from interns, drivers, fundraisers, to “camp followers.” Expectedly, senior executives and managers should be wondering whether the rank and file of US counterintelligence has gone on hiatus. To use contemporary sports vernacular in the US, US counterintelligence services “have not shown up” in the struggle with China. They may also be wondering, given the array of tools and considerable resources available to them, whether the rank and file, led by squad, shop, or unit supervisors and commanders, have told them the whole story. Perhaps harshly, they would question whether the rank and file were organizing valid plans or going off on profitless “school boy larks,” not remotely sufficient to defeat a most cunning opponent. Against the Chinese style intelligence operations, it may very well be the case that the ordinary principles of trade craft and security have gone to the wall. French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Directors and commanding officers of US counterintelligence services can only come to the US Congress for hearings on oversight and appropriations seeking sympathy not approval or report any real success.

Perchance little has really been provided in any official assessments of why US counterintelligence efforts have been so unsuccessful. Perhaps senior executives are not asking the right questions or any questions. When one is overmatched, one will usually lose. Some enhanced intelligibility in the discussion of what has been occurring would help to bring at least the US public around to a better understanding of what where things stand and the prospects for success. Without that, policy analysts and other observers are left to presume that the Chinese are that much better. Indeed, as of this writing, the suggestion that has frequently been voiced in certain quarters concerned with the crisis, and has even spilled out into the newsmedia, is that the professional, diligent officers of the US counterintelligence services–and sadly those qualities cannot be ascribed to the entire group–are simply unable to get a handle on the Chinese threat. That suggests there has been a complete eclipse of their faculties. However, that should not be taken as the gospel truth. Surely, the men and women of the US counterintelligence services, correctly focused, will be able to gain and retain the initiative and start pulling apart Chinese intelligence networks. The renowned US industrialist Henry Ford once remarked: “Failure is simply the opportunity to begin again, this time more intelligently.” The US counterintelligence services maintain their vigil.

Olson’s Precepts from To Catch a Spy

On “Spreading disinformation”

Olson begins his veritable “mini manual” by explaining double-agents can be used to provide the opposition service with false or misleading disinformation, but this a relatively infrequent objective. Deceiving the enemy in this manner requires tremendous planning and subtlety because adversarial foreign intelligence services are not easily deceived. Very often they possess the means to verify the provenance of the double-agent’s reporting. Moreover, if the double-agent reports that some action will take place in the future and it does not, the double-agent’s credibility is seriously undermined. According to Olson the use of disinformation in a double-agent operation would only make sense when the stakes are unusually high or the opposition has limited means of verification.

With reference to “Determining the other side’s modus operandi”

Olson explains that a double-agent is in a perfect position to report back on the opposition’s modus operandi. For any counterintelligence officer responsible for monitoring and thwarting hostile services operations, it is invaluable to know how the service conducts its business. Olson recalls that when he was tasked with developing counterintelligence programs at CIA field stations, the first thing he did was review all of the double-agent operations that any US government agency had run in that location. What he wanted to learn was how the target services operated. Among the questions that he would ask were the following: “Did they meet their agents in safe houses, cafes, parks, vehicles, or some other location? What time of day did they prefer for agent meetings? Were there sections of the city they overused? Did they incorporate initial contact points into their modus operandi, and if so, what kind? What kind of equipment and training did they provide for their agents? Did they use electronic communications of any kind? Where were their dead drops and what did their concealment devices look like? What type of signal device did they prefer?”

Olson remarks that It was especially helpful to have double-agent history in the same city that you are operating, but there was value in reviewing any foibles of double-agent operations run by the target service anywhere. As Olson explains, the case officers of the service have all had the same training and follow the same operational doctrine. They tend to fall into habits and use operational techniques that have worked for them elsewhere. The result can be predictability–a major vulnerability in spying that can and should be exploited by the opposition’s counterintelligence. 

Concerning “Identifying hostile intelligence officers”

Foreign intelligence services take great pains to hide their case officers under a variety of covers according to Olson. They can pose as diplomats, trade officials, journalists, students, businessmen or businesswomen, airline representatives, employees of international organizations, and practically any other profession that gives them an ostensible reason for being in the country. US counterintelligence is tasked with piercing those covers and identifying the spies. One of the best tools available for this task is the double-agent.

In some cases the handling officer is the recruiting officer. If the recruiting officer first met our double-agent dangle when he was providing the dotting and assessing venues in true name, then the double-agent can provide a positive identification from the beginning. As standard practice, however, the case officer will use an alias in meeting with the double-agent. The double-agent can still provide a detailed description of his or her handler and can often make an identification through a photo spread. Also, since counterintelligence service running the double-agent operation knows when and where the case officer will show up, for example to meet to meet the double agent, to service a dead drop, or to mark a signal, it has technical options to assist in identification. The case officer usually comes from a known pool of officials from the local embassy, consulate, the UN, a trade mission, or some other official installation. Olson claims that it never takes long “to make” who the handler is.

Double-agent operations that go on for an extended period, as many of them do, Olson explains that they will lead usually to additional identifications of hostile intelligence personnel. Case officers rotate regularly to other assignments, and their agents doubled or otherwise, are turned over to a new case officer for handling. Other case officers are sometimes introduced into the operation as a back-up or as a subject expert. The primary case officer may handle the day-to-day operational aspects of the operation but may not have the in-depth knowledge required to debrief the double-agent effectively on a highly technical subject. Olson says it is not uncommon in these cases for intelligence services to insert a more knowledgeable debriefer into an operation from time to time. He continues by explaining that If the primary case officer may not be able to get a surveillance break to pick up a dead drop, for example, or may not have cover to mark or read a given signal. In that event a colleague from the residency is called on to help out–and can be identified by employed cameras or other surveillance techniques nearby. Olson states that in some long term double-agent  operations, as many as twenty or thirty opposition case officers and support personnel have been exposed in this manner.

Olson warns that things get funny when the handling or servicing officer if a double-agent operation is an illegal or nonofficial cover officer (NOC). Case officers in these categories face arrest or imprisonment if caught. For that reason, illegals or NOCs are used carefully and as a rule only handle or support a case in which the bona fides of the operation are considered airtight.

With respect to “Learning the opposition’s intelligence collection requirements”

In what Olson calls “the cat-and-mouse game” of counterintelligence, even the slightest advantage can be the difference between winning and losing. A good double-agent operation can provide a winning edge by alerting the sponsoring service to the opposition’s collection requirements. Knowing what the double-agent is being asked to provide the handler is a valuable window into what the opposition’s priorities and gaps are. A question posed would be “How much pressure is being put on the double-agent to collect intelligence in a certain area?” He says that the range of tasking is limited, of course, to what the double-agent professes his access to be,  but a good double-agent might hint at the possibility if expanded access to smoke out the opposition’s response. For example, a high technology double-agent might tell his handler that his future duties might include research in high technology devices. Olson says the question then would be: “Does the opposition service respond either alacrity or lassitude?” According to Olson, the latter reaction could indicate that this requirement is being covered by another agent.

Olson demonstrates another ploy that can be used to learn the adversary’s collection priorities which was to have a military double-agent, for example, announce to his handler that he is up for reassignment and is about to put in his wish list for a new posting. Olson says the double-agent would be prompted to ask his handler: “Where would the service like him to go?  Where does the service not want him to go? For what kind of bullet should he be applying?” Olson explains that how the handler responds can indicate the services collection priorities and gaps in locations where it thinks it can handle the double agent safely.

Olson further explains that intelligence services do not task their agents haphazardly. The requirements are generated by a systematic process that includes input from all the interested parties. In the US, for example, requirements for the intelligence community result from an elaborate consultation and give and take managed by the Office of the Director of National Intelligence. The process is far from casual. Any intelligence service can learn a lot by analyzing the requirements given to its double agents. There is significant meaning in what the opposition service is asking for and what it is not.

Regarding “Acquiring positive intelligence”

Olson reveals that occasionally, a foreign intelligence service so believes in the trustworthiness of a double agent that it shares with that double-agent positive intelligence information. The purpose may be to give the founder agent background information to assist in his or her collection efforts. Another reason for doing so might be that the case officer-double-agent relationship may become so critical that the case officer assumes the double-agents ironclad loyalty and “talks out of school.” Olson also says a case officer may try to enhance his or her standing with the double-agent by boasting about past or current accomplishments.

With reference to “Tying up the opposition’s operations”

Every minute an opposition case officer spends on a double-agent, proffers Olson, is a wasted minute. The handlers time is wasted. Also tied up in the operation for no productive purpose are technical teams, linguists, surveillance, and analysts. Olson goes on to note that It is perhaps a perverse but still undeniable pleasure for a US counterintelligence officer to sit back to survey his or her double-agent operations and to gloat about owning a big chunk of that adversary’s time and energy. Every useless thing that a foreign intelligence service does in handling one of our double agent operations leaves less time for it to hurt us with real operations. In the great game of counterintelligence, these are gratifying victories.

As to “Taking the oppositions money”

Foreign intelligence services vary tremendously in how much they pay their agents, but Olson admits that with the right kind of material, a good double-agent can command big money. He explains that the willingness of an adversarial service to pay our double-agents large amounts of money is a good indicator of how deeply we have set the hook. 

About “Discrediting the opposition”

Commenting generally, Olson says intelligence services hate to lose face. Enough of them around the world have acquired such bad reputations for violating human rights, torture, other violent acts, and murder, that there is not too much for the many to lose in terms of good standing. They want to project to the world an image of competence, professionalism, toughness and discipline. Olson explains that any publicity that highlights their failures can undermine their support from their government and demoralize their troops. He notes that in closed societies like the Soviet Union, East Germany, China, and Cuba, intelligence services were hardly accountable to the press and public as those of Western democratic societies. However, he maintains that they still did everything they could to protect their reputations. Olson says that the same is true today of our major counterintelligence adversaries.

The US is reluctant to publicize expired double-agent operations out of fear of revealing sensitive methodology or subjecting the American principal of notoriety. In selected cases, Olson states that he would like to see US counterintelligence be more proactive in capitalizing on the other side’s failures. He believes that by doing so the US can make them gun shy about engaging in future operations against its citizens. He asserts that the US could publicize how they fell into our trap and how much they gave away to us in the process. He suggests that once they are lured into operating inside the US, counterintelligence services can do a splashy expulsion of case officers who have diplomatic immunity and arrest those who do not. As a benefit, Olson suggests the hostile service looks bad for letting itself be duped by our double-agent operation, and should pay a price for it. It loses some of its operational staff, its reputation for professionalism suffers. He feels that no mistake by the opposition should go unexploited. 

The People’s Republic of China Minister of State Security, Chen Wenqing (above). Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know.

Suggestions Drawn from Olson’s Precepts

Do Not Fume, Think!

In Greek Mythology, there was Até, an unpredictable figure, not necessarily personified, yet represented rash, chaotic, ruinous responses by both gods and men to a situation. She was famously mentioned in Act 3, Scene 1 of  William Shakespeare’s play The Tragedy of Julius Caesar, when Mark Antony addresses the body of Caesar and predicts civil war: “And Caesar’s spirit ranging for revenge,/ With Até by his side, come hot from hell,/ Shall in these confines, with a monarch’s voice,/ Cry havoc, and let slip the dogs of war.” Até has been described as a chain reaction, a mechanism in which evil succeeds evil. In finding a handle to the current espionage crisis with China, it is not a time for a “gloves off” attitude. Minds should be directed toward getting at the opponent to send a message, to bully or even to overwhelm, The requirement in this situation is subtlety, nuance, thinking, not any heavy-handed business. If any US counterintelligence officer involved cannot sustain that, he or she is working the wrong target. Informed by experience, greatcharlie is aware that it is a predilection among not all young special agents in a particular US counterintelligence service, but some, to be frightfully eager to prove something to their cohorts and to themselves. Ira furor brevis est; animum rege. (Anger is a brief madness; govern your soul (control your emotions)).

Practicing what is compulsory for all investigations in the Chinese crisis is sine qua non. However, if one’s thinking is not yielding satisfactory outcomes, then one must focus upon how and what one thinks. A corrective step must be to concentrate to enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. It is one thing to supposedly see everything–certainly the tools available to US counterintelligence services allow them to see an extraordinary amount of things, but another thing to properly reason from what one sees. US counterintelligence officers must think harder and conceptualize better. They must ruminate on events in relation to those that proceed them and meditate on what the future may bring. They must practice forecasting decisions by their adversary that may shape what might come and then proof their efforts by watching events unfold in reports. 

The question that must beat the brain of every US counterintelligence officer working on the matter is most likely: “Where will they strike next?” As a practical suggestion, the focus of many investigations–if not all investigations–of Chinese intelligence networks send operations might be placed on two points: those controlling networks and running operations in the field; and the composition of operations in the field.

Know Who Controls the Chinese Intelligence Networks

As it was discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” personnel of the Ministry of State Security (MSS), the civilian foreign intelligence service of China, are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for ten years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is near certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army (PLA) and Communist Party of China intelligence units are operating without official cover throughout the West. (Note: The four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders are the United Front Work Department, the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.) Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. They are known to often operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. 

There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial. In a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations. For some time, those provincial and municipal sub-elements performed mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus By the time of Mattis’ writing, they had become small-sized foreign intelligence services. They were given considerable leeway to pursue sources. In Mattis’ view, that independence accounted for variation across the MSS in terms of the quality of individual intelligence officers and operations. At the present, the provincial and municipal state security departments and bureaus may be operating entire networks of their own in the US with appropriate guidance from MSS Headquarters and the Communist Party of China.

There are likely many unexplored possibilities that perhaps should be considered about the managers of Chinese intelligence networks in the US. Anything that can be gathered or inferred about the individuality of such a person must be put forth for study. A constant effort must be made to understand what makes the network manager tick. Using some of what is publicly known about how Chinese intelligence services have been operating in the US from a variety of sources, to include US Department of Justice indictments and criminal complaints, one might conceptualize traits that could be ascribed to those managers possibly on the ground in the US, controlling operations day-to-day, are: energy, enthusiasm, and creativity. Among their traits, one might expect that they would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. That energy is transmitted to US citizens and Chinese émigrés being recruited to serve the purposes of their intelligence services and, of course, the Communist Party of China. There would very likely be the hope among Chinese intelligence services and the Communist Party of China that following the detection of each of their victories by US counterintelligence services there is an opposite effect upon the officers of those organizations. Chinese intelligence services would surely hope that a sense of defeat reaches deep into the psyche of US counterintelligence services rank and file and firmly sets within them a sense of disponding woe, sorrow, and discouragement. They doubtlessly want them to feel gutted.

The managers controlling operations of Chinese foreign intelligence networks in the US have undoubtedly been selected due to their proven mental alertness, quick thinking, adaptability, and curiosity. They surely have the right stuff to be open-minded and imaginative, within authorized parameters, and are willing to adapt. Surprisingly given the iron-grip culture among managers and executives in Beijing, these “field managers” have apparently been given some leeway to use their initiative to achieve progress. It likely accounts for how the Chinese are able to react quickly to any changing circumstances. To an extent, it may also explain why Chinese intelligence services may appear to some to be so disdainful of any danger that US counterintelligence efforts might pose to their operations despite knowing that they are actively being pursued by them by the hour. To be on top of everything, the network managers are likely sharp as a tack and no doubt endlessly study what is known by Chinese intelligence about US counterintelligence tactics, techniques, procedures, and methods, concepts and intent, and the latest counterintelligence tools US counterintelligence has fielded. Among such individuals, a solid foundation of information likely allows for the development of viable inferences and strong insights which in turn allows for confidence in using their intuition on what may come or what is coming their way. These network leaders are also likely able to identify any “bad habits” that may have ever brought US counterintelligence services too close for comfort. 

There remains the possibility that the network manager may not even be located in the US. Still, someone must be present on the ground in the US, to relay, with authority, directions from the manager and respond to inquiries and urgent matters from those operating in the field. It could be the case that they maintain modest lodgings not only to reduce costs and keep a low-profile in general. However, the presumption of a low-profile manager could also be entirely incorrect. It may very well be that they are individuals who have achieved considerable success and prominence in areas such as business and finance. As such, they, as a professional requirement, would both have access to and daily accumulate knowledge far beyond average boundaries of the latest events in industry and government. They would know what is important and urgent, what is moving things forward, what is the next big thing, who and where are the individuals influencing events and how to make contact with them and get connected to all of it. In their fields, they may be among the most capable at doing that and may have the recognition, awards, and the financial benefits that would confirm it. It would appear that they avoid engaging in any surreptitious or malign efforts in their own companies or in their own fields. However, it is still a possibility.

Such prospective network managers would very likely be untainted by any apparent or questionable affiliation with Chinese universities, the PLA, and the Communist Party of China. (That does not mean family members who may reside in China would not be thoroughly connected to such organizations.) If the individuals have family ties back to China, there would be nothing apparent about them that would make them suspicious. They would likely have no overseas travel or contacts that would create suspicion. Doubtlessly, an endless list of notables from their fields might be prepared to vouch for them. All the while, though, they would be managing intelligence operations of their networks in an exquisite fashion, and feeding back information to China vital to US national security and the key to helping US businesses maintain their competitive edge against foreign rivals. (If the manager is situated in the US, oddly enough, there may actually be a number of creative ways to draw out such senior managers of field operations. As aforementioned, greatcharlie will never offer any insights even from its position outside the bureaucracy that it believed might result in any negative outcomes for the US as it seeks to resolve the China crisis. That being stated, as stated in the December 13, 2020 greatcharlie post entitled, “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago,” if one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. Not one case has been a “wilderness of mirrors.”)

Perchance those of a younger generation would say that Chinese intelligence network managers in the US, as described here, as being  “woke,” or as the Germans would say, “wach,” both words roughly refer to them as being awake. In greatcharlie’s view, spying on the US is not woke. Nonetheless, everyday, the network managers place their keen eyes on the world around them and have a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

Perhaps reading this, one might get the impression that greatcharlie was attempting to convince readers that Jupiter himself was running the Chinese intelligence networks. That is surely not the case. However, it must be recognized that the sort controlling those networks are likely of a very special nature. Surely, with regard to politics which is all so important in the regime of the Communist Party of China, one would expect that network managers deployed against the US, despite not having much physical contact with anyone in Beijing, would be the fair-haired boys or gals among one or more of the senior executives in MSS or even a senior leader of the Party, itself. 

Whatever any US counterintelligence service may attempt to do in an effort to break Chinese intelligence operations, its officers must be mindful that this may likely be the sort of individual they are seeking to maneuver against. Without the ability to get up close to these managers, it might be enough to conceptualize them, given the pattern of activity and interrogations of intercepted officers, operatives, and informants and reinterviewing the handful of “recent” defectors in US hands. (It is wholly plausible that the officers, operatives, and informants working in the US have never seen and do not know the identity of their network manager on the ground. They may only recognize the individual by code via orders, rectifications, responses to inquiries and requests, and inspirational messages.) If the abstract entity, de créature imaginaire, constructed here is, by coincidence, correct in every particular, there may be the rudiments to get started on trying to “steal a march” on perhaps a few of the Chinese intelligence network managers. Shaping one’s thinking against thinking and conceptualized tratits of de créature imaginaire, may be enough to open new doors. Perhaps in time, such in-depth study of these aspects will allow informed counterintelligence officers to develop true intimations, not valueless surmisals or absurd speculation, of what may be occurring and what is about to occur. In “A Story of Great Love,” published in the Winter 2011 edition of the Paris Review, Clarice Lispector writes a sentence that is amusing yet conceptually germane to what is discussed here: “Once upon a time there was a girl who spent so much time looking at her hens that she came to understand their souls and their desires intimately.”

The People’s Republic of China Consulate in Houston (above). From this now closed building, China directed government, economic, and cultural activity across the southern US. Ministry of State Security (MSS) personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations.

Discover the Composition of Network Operations

One might suppose the Chinese intelligence networks in the US, as a primary purpose, unlikely conduct operations in which they blithely seek out new targets day-after-day, although there are perhaps some operations underway that serve to monitor individuals in positions that might be interest and sites of information of interest with the guidance of MSS headquarters, provincial bureaus and municipal departments based on available intelligence. The settled, more fruitful networks that have nettled US counterintelligence services the most are likely set up to run operations on targets of a certain type, rich with prospects at locations in  which Chinese intelligence operatives and informants are well ensconced. One could reasonably expect that there will be a commonality in location for both predator and prey. (Although, nothing can really be certain for espionage is a deke business.) The Chinese intelligence operation will be set up in proximity of a figurative “happy hunting ground,” a high-tech firm, laboratory, academia, political network, foreign, national security, economic, trade policymaking office, agribusiness, and aviation, and energy business to list only a handful. In addition to propinquity, there will be a common functionality of any Chinese owned business that may establish themselves in the hunting ground, and very apparent efforts to create employee links by them with their likely targets. 

Control remains essential in the authoritarian (totalitarian) regime of the Communist Party of China and therefore there is a certain specificity intrinsic to every operation–despite nuance in design, methods, and other imaginative approaches attendant–that will presumably allow for monitoring, oversight, and audits. If it ever was detected that an odd Chinese intelligence network was skillfully mixing tactics, techniques, procedures, and methods in operations conducted following an aggregate rollup of known Chinese intelligence efforts in the US, it is unlikely that particular network’s approach, while perhaps creative to the extent possible, will never stray too far from any observances that would be laid down by their respective Chinese intelligence services. If the tactics, techniques, procedures, and methods used by Chinese intelligence networks are really so similar, one could say their operations will likely have a common “DNA.” The adversary’s known practices are undoubtedly cataloged by US counterintelligence services. It will be necessary to more closely study the common functionality of networks and operations. As much information on their operations must be collected as possible. Study what has been learned by allies. Identify common vulnerabilities in every network. Identify, study, and exploit their deficiencies.

As much of what the networks Chinese intelligence services are exactly doing day-to-day in the US remains unknown publicly at least, it is impossible to say with certainty how the COVID-19 pandemic has impacted their operations. One can imagine there has been some impact. Nevertheless, given that reality, in considering how COVID-19 factors into their efforts, one must again enter the world of supposition in which one analysis of how those networks are not only operating, but more specifically, how managers of those networks are communicating with Beijing and with their officers, operatives, and informants, can be just as good as another.

Even before COVID-19 hit, for Chinese intelligence networks on the ground in the US, managing communications in any direction was imaginably no mean feat. As it was discussed in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).” Perhaps, the main lesson for Chinese intelligence services was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. 

One might venture to say that a likely move to hard documents may have been evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

From what is publicly known, it appears that Chinese intelligence networks do not recruit after simply spotting a potential operative or informant. If that were the case, the success rate of US counterintelligence services against them would be far higher given the opportunities such activities would present and given the experience of their organizations in dealing with such a basic set up. Chinese intelligence services clearly work wholly on their own terms, investigating only those “targets” who they choose to investigate, essentially ignoring anyone that may have the slightest appearance of being dangled before them. It is a benefit for them to operate in what could be called a target rich environment in the US. Recruitment is “by invitation only.” If one is not on the figurative guest list, one does not get in! As part of their investigations of targets for recruitment, doubtlessly it is important to identify the psychological profile of a person, his political orientation, his attitude towards his motherland, China or towards the US, where he or she has become a citizen or visiting for school or long-term employment. And then, after accumulating a sizable amount of material (based on a whole array of undertakings: plain observation, audio- and video-surveillance of the places of residence, agency-level scrutiny, including “honey traps”), on the basis of the analysis, a decision is made about a transforming the investigation into a recruitment with appropriate conditions (such as through compromising materials or a voluntary agreement) or about wrapping up the whole matter by “educating” a foreigner, conveying a favorable message on China and the wave of the future, Chairman Mao Zedong’s vision of Communism.

After studying what is being specifically done by a network long enough, one will begin to see dimly what a network or specific operation is driving at. After finding a few missing links, an entirely connected case will not always, but can be obtained. Once a clear picture emerges, one can start developing attack vectors against Chinese intelligence networks with a forecast of nearly assured fruits. Lately, the identification and aim at any networks has clearly been far less than accurate. Do not use individuals lacking good judgment and sanguine required based on one’s own standard. Create the best team possible. Know your people well. Keep a close eye on neophytes. (As touched on in the discussion of Olson’s “Ten Commandments of Counterintelligence” of Chapter Four in greatcharlie’s review of To Catch a Spy, a supposition verging on the ridiculous must be seen as such by a supervisor and appropriately knocked down. A keen interest must be kept on how subordinates, especially novices, are reasoning with facts. A supposition verging on the ridiculous might involve imputing criminal motive or involvement on a party that could not have been part of a criminal conspiracy or ascribing characteristics to an individual who could not possibly possess them or has not displayed them. A good case could be blighted by such wrongheadedness.)

Gnawing a bit further at the matter of using young, novice counterintelligence officers on such delicate cases concerning Chinese intelligence, one should avoid the pitfall of allowing them to manage surveillance work for a case and turn it into something that might more reflect the work of a security service in a totalitarian country to soothe their egos. Be mindful of the use of time, energy, and budget by them such as placing heavy, wasteful surveillance on the street not to advance the casework but to prove some immature point of power. Casting some wide net will bring in nothing but a lot of extra things that time, energy and money cannot be wasted upon. Differ nothing to their judgment. Every mistake or misstep made by US counterintelligence, whether the result of a manager’s use of some clever misdirection or whether self-inflicted, represents a success for a Chinese intelligence network manager. Keep firmly in mind the managers of Chinese intelligence networks are flexible enough in their thinking that they appear to be able to change horses in midstream while maintaining the metaphoric helm on a steady heading so to speak. 

Concerning contractors, by their nature, they are owned and managed by businessmen out to make money as priority. That focus among many of them can be boiled down to the  precept, “minimum effort, maximum gain” and that can be most apparent in how they conduct their so-called operations on the street. As already alluded to here, their “operatives,” often poorly vetted before being “hired,” many times find it difficult in the field, physically surveilling a target or trying to open a clandestine conversation, to be their higher selves. They are often too aggressive, even ruthless, and engage in what could politely be called “aberrant behavior.” Strangely enough, for many contractors, the reality that their operatives display these characteristics is a point of pride.. As it was discussed in greatcharlie’s January 31, 2020 review of To Catch a Spy, the negative behavior of contractors witnessed in the field by an adversarial intelligence service’s officers, operatives, and informants could very likely have an impact on their impressions of US counterintelligence services beyond what has already been inculcated within them by their masters. It should be expected that any negative impressions could have the deleterious effect of negatively impacting a decision to defect or be recruited if the idea might ever cross their minds. It is impossible to calculate, but it surely can be imagined that a number of potential defectors and recruits may have been deterred from taking the first step over this very issue. Recognizably, there is a reduced ability to effectively oversee what contractors are doing at all times on behalf of US counterintelligence services. At best, the managers of a particular counterintelligence operation that they may be hired to support will only know what the contractors divulge about their efforts. Close observance of them in operation, done furtively by managers of US counterintelligence services, would doubtlessly substantiate this.

Those in US counterintelligence services considering what is noted here might cast their minds back to the observation of the renowned 17th century French philosopher Blaise Pascal in Pensées (1670): “Justice without power is inefficient; power without justice is tyranny. Justice without power is opposed, because there are always wicked men. Power without justice is soon questioned. Justice and power must therefore be brought together, so that whatever is just may be powerful, and whatever is powerful may be just.”

Surely at one time the relationship between contractors and US counterintelligence services was quite beneficial as they provided real assistance through manpower and talent, but again, the situation has since changed considerably. They are shadows of what they once were in terms of quality.  Beyond some possible invaluable assistance they may be providing through precious outside of the bureaucracy analysis and advice on Chinese intelligence activities in the US, in the China case, US counterintelligence services should severely minimize or eliminate contractors if possible. There may be a place for such contractors and their ways in counternarcotics, organized crime control, human-trafficking or some other kind of criminal investigations. However, up against the sophisticated intelligence services of a determined adversary as China, those contractors are not a credit to US counterintelligence services. They are nothing but a liability. The China case is too important to indulge in any uncertainties. On an additional point, technical intelligence tools must be utilized effectively and appropriately. Monitor only those who need to be monitored. Resist the urge to play George Orwell’s “Big Brother.” That urge is another weakness. Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.)

The continued success Chinese intelligence services and counterintelligence services in being able to conceal their massive espionage efforts may suggest that conceptually, they may approach establishing their presence in the US with the thought of “peacefully coexisting” in the same environment as US counterintelligence services. The relationship that they seem to have sought with US counterintelligence services in order to ensure the security of their networks and operations is not “cat and mouse” or combative. It is strangely, but logically, symbiotic. 

That symbiotic relationship, however, is malignant, and designed to be parasitical. To that end, managers of Chinese intelligence and counterintelligence services in the US likely respond to any detection of the presence of US counterintelligence personnel or activity not by avoiding them, but by connecting in some smart way to them. Connecting to them, to give a couple of simple examples means having operatives work for a contractor engaged in physical surveillance, or take on low level employment in or around offices of those contractors. From such positions and similar ones, they would enable themselves to monitor the most well-orchestrated, well-conducted activities from the inside. Some operatives, finding work as operatives in the agencies of contractors for US counterintelligence services  could actually become, and have very likely actually been, part of those operations. Note that operatives of Chinese foreign intelligence and counterintelligence services directed to get close to US counterintelligence services personnel and activities may not necessarily be ethnic Chinese. (For a fuller discussion of that matter, see the July 31, 2020 greatcharlie post “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”) Such a precaution would likely be deemed less necessary by managers of Chinese foreign intelligence and counterintelligence services for operatives placed within or close proximity of contractors offices and personnel as those managers have likely become well-aware of the astonishing lack of due diligence and security practiced by them. Surely, US counterintelligence activities of greatest interest would be those against Chinese foreign intelligence networks and operations. However, there would undoubtedly be significant and considerable value in being aware of physical surveillance activities by US counterintelligence services against the other adversaries of those services. There is every reason to believe cooperative relationships exist among the intelligence services of US adversaries. To say the least, there would be some monetary value in information collected by China of that kind.

Much as some parasites, those operatives who might successfully penetrate any organizations of or pertaining to US counterintelligence services would never act directly  to destroy those personnel or organizations but would rather only nourish themselves off  of them by collecting critical information from them for the security and survival of Chinese Intelligence activities in the US. Reminding again of what might be called Olson’s maxim from To Catch a Spy, “Penetration is the best counterintelligence.” One can almost be certain that senior executives and managers in adversarial foreign intelligence services surely believe that, too! That is something for US counterintelligence services to be very concerned about.

With regard to working with quantitative data, broken down to the essentials, it must continually be used to keep US counterintelligence officers cognizant and well appraised of activity by confirmed Chinese intelligence officers, operatives, and informants tied to diplomatic missions. With quantitative data, users ought to drill down on data concerning their daily and hourly activity from communications to commuting. One must be able to discern even the slightest changes in activity, whether increased or decreased. Data should be reviewed daily to identify the slightest changes from the aggregate numbers. Revisiting data that has already been rolled up and aggregated is also advised. It should be mined through for more details, clues. (One should never get so caught up with data to believe that an opponent’s actions can be reduced to an algorithm. The opposition’s leaders are living, breathing, agile, flexible and–despite working in Communist China–potentially unconventional thinkers.)

Getting Results

Measures of success of the practices suggested here may hopefully be a marked increased prospective opportunities to: neutralize; displace; and, intercept, even recruit, from a targeted Chinese intelligence network.

1. Displace

If the purpose of US counterintelligence is to displace a Chinese intelligence network or operation, the rapid shutdown of an operation would be a sign of success in that endeavor. The threat of intercept or the very public revelation that an officer, operative, or informant in the network has been apprehended would naturally spur such an action. If the environment is made hot enough for the network, its managers and the remainder of their string of officers, operatives, and informants will indubitably go to ground with the hope of resurrecting their network with its diffuse operations at a more favorable point in time. However, if an operation has packed up and moved out, there will be a palpable change in the working atmosphere for the counterintelligence officer who has had their noses to grindstone working the case. In a frenzied rush to exit the US, individual suspected Chinese intelligence officers, working in academia or industry, in physical isolation from their compatriots, or ones that may appear to be operating independently and farthest away from their network compatriots and resources, may no longer see the need to carry on with any pretenses. It is also interesting to see that there is never mention of any effort by Chinese intelligence officers, operatives, or informants to figuratively throw dust in the eyes of those investigating, plant false leads or use other means to misdirect, as they make their escape.

Interviews can be used as a psychological tool to prompt displacement. For the network manager who is logical, visits to the residence or workplace of a subject of investigation by US counterintelligence officer to invite them for an interview in the respective office of their service, or to interview them at that location, may be viewed as probing based on some insight possessed by the adversary. There is the odd chance a network manager might believe a US counterintelligence service was on to something. However, it would seem they would more likely think a US counterintelligence service would “hold its cards a little closer” if it had something solid to act on. If the network manager is thinking in that way, it would mean  he or she has been trying to see through all things cooked up by US counterintelligence. Surely, for the Chinese intelligence  services as much as those of the US, studying their oppositions modus operandi is as important a task as anything else.

Operatives and informants, on the other hand, may become jittery. However, such a visit may not unnerve the network manager. The reaction of a network manager may be no visible  reaction at all. He or she will likely continually display nerve and knowledge. The possibility of such interviews has likely already crossed the managers mind. The network manager has likely already assessed how officers, operatives, and informants in his or her retinue will act or react when approached. The task of the network manager will be to deduce what triggered the interview, reason from cause to effect what is the likely course of events to follow, and act accordingly. That being stated, activities and especially the communications of those approached for interviews must be monitored. New travel plans by individuals with some association to those interviewed, scheduled closely by date, must be examined.

2. Neutralize

To assist in determining where to interdict, stand up a “Red Team” on a non-stop basis, using templates properly constructed from everything known and insights and inferences on Chinese operations and to continue to build up a legend for de créature imaginaire with the objective of achieving increasing accuracy. Among tools that should be made available for use in neutralizing Chinese intelligence officers, operatives, and informants, should be heavy financial rewards for “coming forward”; and whistle-blower-like protections. Casting one’s mind back to the “Chieu Hoi” program used to contend with the Viet Cong during the Vietnam War, US counterintelligence services, using an approach certainly not the same but conceptually similar to that, may very well be able net a few long-time operatives and informants of China see intelligence services with deep involvement in their efforts, who may have had their fill of the whole business and want to get out, but safely. Cela n’a rien d’évident. (The fact that the Chieu Hoi program was implemented in an Asian country is purely coincidental. No deliberate connection regarding a region, race, or political philosophy was made. The parallel is that much as the Viet Cong, Chinese foreign intelligence officers in particular, but any operatives and informants as well are often “true believers,” who act out of conviction. Similar to the Viet Cong, they are driven by a deep-seeded ideology. In their unique case, it is usually the erroneous belief that China is the champion of the oppressed and will become the dominant power in the world.) In case the point has been misunderstood, heavy financial rewards for them would mean steep rewards. Ideally, the result will be to threaten the rewards structure, financial and psychological, of the Chinese foreign intelligence and counterintelligence services. If money would not be the elixir to turn any Chinese intelligence officers, operatives, or informants, US counterintelligence services would only need to pose the question to themselves: Deployed to the US and caught in the business of spying, what else would truly satisfy them enough to cause them to  defect or to become a double? If the situation becomes desperate enough, ask the targeted Chinese intelligence officer, operative, or informant: “What do you want? Name it!” (In other words, at least to get things moving, do whatever it takes, but within reason!) Turning Chinese operatives and informants should ideally take on the appearance of something akin to a business enterprise while actually being a counterintelligence task, if successful. Cela encore n’a rien d’évident. (Note, however, that money can become poisonous in both directions, creating temptation among those in service ranks unfortunately disposed to transgressions. Therefore, its distribution must be very carefully supervised.)

To be succinct, the hope of US counterintelligence should be to come in contact with an officer, operative, or informant with an albeit idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. Pretio parata vincitur pretio fides. (Fidelity bought by money is overcome by money)

3. Intercept

Non capiunt lepores tympana rauca leves. (Drumming is not the way to catch a hare.) This could be entirely off the mark, but it appears that aggressive counterintelligence appears to have been directed at targets of opportunity versus the industry-centric networks of Chinese intelligence in the US. While there may be a meretricious benefit to this practice, it accomplishes nothing in terms of tearing down Chinese intelligence networks or smothering greater espionage operations. Again, elevated thinking is required. There must be an inflexion point at which US counterintelligence services become the fox, and the days of being the chicken come to an end. Better use must be made of tools available and good practices. There must be better use of deception. To lure Chinese intelligence networks into traps, network managers and higher ups in the Chinese system must be convinced that the figurative cheese in the trap is something worth the risk of trying to take. Psychological operations must be used to draw them closer to targets US counterintelligence can cover while remaining concealed. As part of the information warfare campaign with China, an effort must be made to surreptitiously “assist” Beijing in discovering a novel target worth pursuing. Chinese intelligence services have enjoyed a halcion season of success. They apparently have no intention of being thrown off their pace and streak of victories by what they in all likelihood suspect are attempts by US counterintelligence to score a victory against their effort during their moment of glory.

US counterintelligence officers must do their utmost to go beyond the normal scope in determining what will attract Chinese intelligence network managers. They must not proceed by pretending to know. There is no room for guesswork. Approaches developed must not be derivative. They must put as much time as necessary into developing them to become as certain as humanly possible that any new approaches will work. Any enticement or manipulation must not give off any indication of being a plant nor chicken feed. It must appear as genuine gold dust. Under extremely controlled circumstances, it may need to be actual gold dust! What is left is to wait for the network to show itself. There is nothing else to do otherwise. Efforts to stoke or prompt the adversary will lead to blowing the entire set up. Impatience is what the Chinese will look for because that is what every other foreign intelligence service expects of US counterintelligence.

Logically, it would be a capital mistake for Chinese Intelligence services to adulterate what could likely be characterized as an operation in which every aspect was well-known with individuals of ultimately unknown character, loyalties, or reliability and targets of likely no immediate unknown value and of no prior interest or desire. As senior executives and managers in Beijing might assess, if anything suddenly put before them was truly of any immediate value or desirable to China, the individuals or the information would have respectively been recruited or stolen already. Assuredly, that is the pinch for US counterintelligence services when it comes to getting decent double-agent operation off the ground.

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, offers the statement in The Honourable Schoolboy (Alfred A. Knopf, 1977): “A desk is a dangerous place from which to view the world.” US counterintelligence officers must be mindful of what may be perceived in the conference room as an advantage over the opposition intelligence network manager may be the ugly product of groupthink. They must judge perceptions in view of what is  actually known about that opponent, even if he or she remains de créature imaginaire and how that manager may act in response to what they plan to put in his or her way. Use of aggressive tactics or overwhelming superiority can be turned into a liability by an agile thinker. It is also important to understand that no matter how the Chinese intelligence network or operation may be approached, everything done, particularly if successful, will be studied by superiors in Beijing so that all gaps that may have been exploited in a disrupted, displaced, or destroyed network will be rapidly and quietly set right in all remaining networks. Operational missteps that might have been exploited will be identified and never made again. (Be observant for changes in practices among networks and operations being traced.) In view of what Beijing may learn from an initial attack, adjustments in the next US counterintelligence strike against a Chinese intelligence network or operation must be considered even before the first is executed. In a cycle, this approach to attacking Chinese intelligence networks and operations must be adjusted for each new situation and repeated.

To go a step further, one might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them. 

It is unlikely that the senior executives and managers of Chinese foreign Intelligence services are sitting back and gloating about their victories. Rather, it is very likely that everyday they work harder and harder to make their networks and operations better and more effective, pushing their espionage capabilities far-beyond the reach of the counterintelligence services of the countries in which they operate. All of that being said, one might still imagine that soon enough, in a gesture aimed at figuratively putting some dirt in the eyes of US counterintelligence services, the Chinese foreign intelligence services may spend some hours planning some upheaval that their networks could cause in the US to embarrass US counterintelligence services. It would imaginably be designed to knock them well-off track and symbolically mark China’s domination of their opponent on his own home ground. China would also be sending a message concerning its dominance throughout the espionage world. Of course, despite its meretricious effect, whatever such a potential ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would feel enabled to plausibly deny China’s connection to the action. (These are only some thoughts, ruminations, on the situation. Hopefully, this should not cause any undue concern. Or, cela n’a rien d’évident.)

The Chinese have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. To that extent, it is unlikely Beijing wants its intelligence services reaching after anything when their plates are already full follow up on leads they created for themselves. It is possible that the Chinese foreign intelligence services have never seen US counterintelligence services get anything substantial started against their networks in terms of penetration. However, the Chinese will unlikely mistake quiet for security. They probably never really feel secure in the US. It is hard to imagine what might ever be worth the candle to Chinese intelligence services to reach after. Assuredly, impatience in any US operation would be anathema.

People’s Republic of China President Xi Jinping (above). Given the success of Chinese intelligence services in the US, China might soon enough choose to send a message to symbolically mark China’s domination of their opponent on his own home ground. and its dominance in the espionage world. Chinese foreign intelligence services operating in the US may spend some time planning an upheaval that would figuratively put some dirt in the eyes of US counterintelligence services. Despite any meretricious effect such an act might have, whatever such a potential deplorable ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would be able to plausibly deny their connection to the action.

The Way Forward

Month after month, US counterintelligence services discover another set of occasions when China has incommoded a federal agency, a private firm, an academic institution, or research institute by stealing from them classified information or intellectual property most often vital to the national interest. Leave it to say, having engaged in an empirical study of public facts coming in what has been transpiring, the potential trajectory of China’s malign efforts is breathtaking. By 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. However, that is not the case. Perhaps in some allied country, success against China will be achieved showing US counterintelligence services the way forward. With a long history of successfully defending the United Kingdom from foreign spies, it may very well be that MI5 will not have the Cabinet, the Prime Minister, the exalted person herself, wait much longer for good news.

Whether this essay for some will cause a journey from unawareness, curiosity, or a lack of clarity to knowledge, remains to be seen. There has been more than enough talk about how bad the problem with China is. That becomes by the by. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and take the game back to China and destroy all of its networks. It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. In a very small way here, greatcharlie has sought to contribute to development more effective approaches to defeat Chinese intelligence collection efforts in the US. Before writing this essay, greatcharlie fully understood and accepted that there are those singular US counterintelligence services that would be completely uninterested in, and even shun, any voice or meditations from outside the bureaucracy that would dare offer assistance to them in their struggle with China’s intelligence services. (It must be stated that greatcharlie has either been retained to supply any imaginable deficiencies of US counterintelligence services nor has it been retained for anything by any of them.) Often in the US national security bureaucracy, perspectives on adversaries can become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, as suggested,, perhaps an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with Chinese foreign intelligence activity in the US.

With a near endless chain of losses, the following theft sometimes being a greater defeat than the one proceeding it, greatcharlie feels compelled to ingeminate the position expressed in the conclusion of its August 31, 2020 greatcharlie post US counterintelligence services should consider hiring individuals from outside the bureaucracy who are already known due to demonstrated interest in the subject matter and recognized as possessing some ability to present what may be unorthodox innovative, forward-looking perspectives. New thinkers can rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Thinking outside the bureaucracy would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. 

The suggestion should not seem so exotic at this point. Even the adversaries of the US would likely imagine the possibility that some assistance from an unexpected source and direction could pose the greatest threat to their success. Perhaps some US counterintelligence services will never brook the idea of receiving such assistance from outside the bureaucracy. However, in the end, the US counterintelligence service which opens itself up to new, thinking, new insights, new approaches, will very likely bag its tiger. Vigilando, agendo, bene consulendo, prospera omnia cedunt. (By watching, by doing, by consulting well, these things yield all things prosperous.)

Commentary: Maintaining the Harmony between the Ministry of Public Security and the Ministry of State Security in an Apparent Totalitarian China

People’s Republic of China President and General Secretary of the Communist Party of China Central Committee Xi Jinping (center right) in the Great Hall of the People in Beijing. On August 26, 2020, Xi presented Minister of Public Security (MPS) Zhao Kezhi and Minister of State Security (MSS) Chen Wenqing with the “Police Flag” at a ceremony in which over 300 police officers were present. Xi ordered the security forces to be loyal to the Party, serve the people, be impartial in law enforcement, and maintain strict in discipline. Xi also called on the security forces to uphold the Party’s absolute leadership. Historical evidence shows maintaining two main intelligence and security services with overlapping responsibilities is an odd choice as it usually creates difficulties for senior executives and managers of the respective organizations in sorting out issues over cases, turf, and budgets. At least publicly, MPS and MSS have managed to coexist peaceably.

Among some Western intelligence and counterintelligence services, distracting bureaucratic and operational rivalries have been observed.  However, the two main civilian intelligence and counterintelligence services in China, Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS and Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS, have publicly avoided such problems despite inherent parallels in their domestic responsibilities. Except for experienced hands on China policy and the Chinese intelligence services and national security via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either organization. MPS is an intelligence service under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, is an intelligence service responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems mainly from providing consumers in Beijing to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, and ministers and senior executives of appropriate ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions. This commentary briefly focuses on the apparent management of a smooth working relationship between MPS and MSS as they share overlapping intelligence responsibilities in the service of Communist Party of China, all powerful in the People’s Republic of China. Concordia res parvae crescent. (Work together to accomplish more.)

These two national intelligence organs are the embodiment of the logic that created the Chinese system’s intimidating, authoritarian–perhaps it could even be called totalitarian–order and for years has choreographed events to accomplish the Communist Party of China’s purposes. To that extent, the Communist Party of China has entrusted the defense of the modern Communist Chinese state to these two complex government organizations. On August 26, 2020, at the ceremony held in the Great Hall of the People in Beijing, People’s Republic of China President Xi Jinping conferred the “Police Flag” to Minister of Public Security Zhao Kezhi and Minister of State Security Chen Wenqing. Xi ordered China’s security forces to be be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. In his address at the ceremony, Xi lauded the major contributions made by the Chinese police to safeguarding national security, social stability and people’s interests, He called them a mighty force that can be fully trusted by the Party and the people, and spoke highly of the major contributions made by the Chinese security forces to safeguarding national security, social stability and people’s interests. Xi also called upon the security forces to uphold the Party’s absolute leadership.

Xi has placed considerable focus on police, judges, prosecutors, public security,, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. The campaign is also said to be part of an effort by Xi to bolster domestic discipline as he prepares for a leadership shake-up at the Communist Party Congress in 2022. Reportedly, Xi has been spurred on to push for iron authority down to local police stations as a result of the reaction among Communist Party of China leaders toward near-endless protests in Hong Kong, and their need to be assured of the Party’s total control of the population after that became an issue during China’s coronavirus outbreak. The ministers of the MPS and MSS understand their marching orders. Zhao, the Minister of MPS, was quoted as saying, “Resolutely put absolute loyalty, absolute purity and absolute dependability into action.”

Ubi concordia ibi victoria. (Where there is unity, there is victory.) As already alluded to briefly, historical evidence shows that maintaining two main intelligence and security services with many overlapping responsibilities is an odd choice gor it normally creates difficulties for senior executives and managers of the respective organizations in sorting out issues over over cases, turf, and budgets. However, MPS and MSS have managed to coexist peaceably, at least publicly. The most apparent reason that such high profile parochial struggles over turf and budgets do not exist at least publicly between MPS and MSS, interestingly enough is that they are actually prohibited under the People’s Republic of China National Security Law. Hypothesizing on the matter, purely out of academic interest, if a competitive relationship between MPS and MSS had ever taken flight, it very likely would have been the result of happenstance in the 1980s. During the after its inception in 1983 and the larger part of the 1990s, MSS took on an assignment from the Communist Party of China concerning a burgeoning student movement that was redundant given the matter was covered by MPS.

As that situation stood, the Communist Party of China’s leadership became concerned about the student movement as a threat to social order and its power. In response, there was a call for all hands to mitigate those fears. MSS, newly minted, had the officers and was available. The Communist Party of China insisted that it place its focus on students in both China and abroad after the Tiananmen Square protests. Tiananmen Square, in addition to being embarrassing to the Communist Party of China leaders, caused them to remain greatly concerned over a possible follow-on move by students. That concern was somewhat supported when Chinese authorities announced that some 200 Chinese had been accused of spying for the Soviet Union. One might conclude that due to the counterintelligence aspect of the assignment, it made some sense to pass it the MSS. The MSS as an organization, threw itself into the immediate domestic task set for it by the Communist Party of China.

Inter cetera mala, hoc quoque habet stultitia proprium, semper incipit vivere. (Among other evils, folly has also this special characteristic, it is always beginning to live.) Perchance to further satisfy and impress the Communist Party of China or perhaps in an attempt to redesignate the intelligence service’s purpose wholly, MSS leaders at the time, arguably taking a turn down the wrong path, exploited the situation by deciding to expand and invigorate their organization’s presence in the provinces and municipalities. That expansion occurred in four waves. In the first wave during MSS’ inaugural year, the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai were created. A second wave appeared shortly thereafter between 1985 and 1988, including Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang. The third wave from 1990 to 1995 completed the expansion of the Ministry across at the provincial levels, bringing in Anguilla, Hunan, Qinghai, and Sichuan provinces. The fourth wave the provincial-level departments expanded vertically, taking over local public security bureaus or established subordinate municipal or County bureaus. The MSS policy of expanding representative offices in most major towns and cities was reversed in 1997. Nevertheless, by then, the MSS was a nationwide security organization at every level. Presumably, having reached that status, it may have been called upon to perform some special tasks for the Communist Party of China’s leadership on occasion.

To add to that situation, in its first two decades, the ranks of the MSS were filled with longtime MPS who transferred over to the office. MSS provincial branches were often staffed with PLA and government retirees. The new MSS was funded in part by the MPS.To help MSS take on its mission, MPS also passed some networks to the new organization. With some uncertainty that existed as to the political nature of MSS, MPS was reportedly reluctant to make such transfers. MSS was declared to be a foreign intelligence organization, but as things stood then, it was doing more of what its rank and file knew how to do best, which was to perform as police.

In the end, though, MPS has remained the dominant service concerning the domestic counterintelligence mission. Moreover, with regard to MPS’s organizational identity, as aforementioned, from its beginnings, has embodied the will of the Communist Party of China, and its leaders insisted upon retaining that grand status. Even today,, MPS leaders are regularly striving to garner praise and the further favor of the Communist Party of China from the flash and bang, bells and whistles, of high profile cases. MSS leaders returned to shaping their organization into a truly effective foreign intelligence organization. The MSS foreign intelligence capability was built up most effectively when intelligence cadres from the Communist Party of China were brought into its ranks. An uptick in both competency and necessity favored a rise MSS influence in foreign policymaking. When direct political power is absent, influence usually relates to merit and necessity. Senior leaders of the Communist Party of China involved in foreign policymaking  would eventually want the MSS in the room, contributing to deliberations. Yet, MSS still maintains a very significant domestic operation via provincial and municipal offices throughout China. Presently, the MSS’ thirty-one major provincial and municipal sub-elements. Sic utere tuo ut alienum non laedas. (Use what is yours without harming others.)

Placing MPS and MSS alongside the Federal Bureau of Investigation (FBI) and Central Intelligence Agency (CIA) in a search for parallels, the record indicates their situation was the contrary as considerable conflicts over cases, turf, and budgets once existed between the two US organizations. A growing schism resulted in cooperation between them on intelligence and counterintelligence being mandated by authorities to the chagrin even to date of some case officers and special agents. Notably, the CIA does not independently determine its intelligence collection priorities. The CIA’s intelligence activities are instead conducted in response to intelligence requirements established by the President and the CIA’s other intelligence consumers. Specifically, the Director of National Intelligence approves the National Intelligence Priorities Framework (NIPF), which establishes national intelligence priorities that reflect the guidance of the President and the National Security Advisor with input from Cabinet-level and other senior government officials. The CIA’s duly authorized intelligence activities are conducted in response to the NIPF priorities or other intelligence requirements imposed by the President and other intelligence consumers. Under the framework established by Executive Order 12333, the CIA’s intelligence activities are primarily focused outside the US. The FBI is responsible for coordination of clandestine collection of foreign intelligence through human sources or human-enabled means and counterintelligence activities inside the US. Generally though, the CIA can cooperate with the FBI to collect foreign intelligence within the US, subject to the restrictions imposed by statute, Executive Order 12333, the Attorney General Guidelines, and other legal and policy requirements. Specifically, the National Security Act prohibits the CIA from exercising police or subpoena powers or otherwise engaging in law enforcement or internal security functions, with the exception of the security protective officers who protect CIA facilities within a limited jurisdiction pursuant to the CIA Act. If, for example, the FBI has a cooperative relationship with an individual inside the US who provides foreign intelligence information, the FBI may appropriately consult with the CIA regarding the relationship, and the CIA may continue the relationship for intelligence purposes should the individual travel overseas.

Of course, the situation between the MPS and MSS is also made quite different from that of FBI and CIA particularly due to the nature of the government in which the two intelligence services respectively function. In a country such as China, there is a need among leaders to create some acceptable degree of certainty about their world that is existential. As an expression of need, they tend to find it preferable to have as many ears to the ground as possible, know what comes next, be sure of who can be trusted, understand how to protect their personal interests, be made aware of where the next likely challenge from the inside, and be forewarned of the next threat to the country from the outside, will come from. The role of the security services in satisfying that need is not an ancillary role. Thereby, protecting the interests of the political leadership is really their raison d’être.

The 20th century US philosopher and political theorist, Hannah Arendt, in her seminal work The Origins of Totalitarianism (Schocken, 1951) provides an excellent discussion of why multiple security services exist in totalitarian countries. The history of Chinese intelligence validates what she presents. The most relevant passage, too precious to condense, is presented here in its entirety. Using the situation in the Soviet Union as a yardstick, Arendt explains: 

In Russia, the ostensible power of the party bureaucracy as against the real power of the secret police corresponds to the original duplication of the party and State known as Nazi Germany, and the multiplication becomes evident only in the secret police itself, with its extremelycomolicate, widely ramified network of agent, in which one Department is always assigned in the supervising and spying on another. Every enterprise in the Soviet Union has its special Department of the secret police, which spies on party members and ordinary personnel alike. Coexistence with this department is another police division of the party itself, which again watches everybody, including the agents of the NKVD [Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs)], and whose members are not known to the rival body. Added to these two espionage organizations must be the unions in the factories, which must see to it that the workers fulfill their prescribed quotas. Far more important than these apparatuses, however, is “the special department” of the NKVD which represents “an NKVD within the NKVD,” i.e., a secret police within a secret police. All reports of these competing police agencies ultimately end up in the Moscow Central Committee and the Politburo. Here it is decided which of the reports is decisive and which of the police divisions shall be entitled to carry out the respective police measures. Neither the average inhabitant of the country nor any one of the police departments knows, of course, what decision will be made; today it may be the special division of the NKVD, tomorrow the Party’s network of agents; the day after, it may be the local committees or one of the regional bodies. Among all of the departments there exists no legally rooted hierarchy of power or authority; the only certainty is that eventually one of them will be chosen to embody “the will of the leadership.”

The only rule of which everybody in a totalitarian state may be sure of is that the more visible the government agencies are, the less power they carry, and the less is known of the existence of an institution, the more powerful it will ultimately turn out to be. According to this rule, the Soviets, recognized by a written constitution as the highest authority in the state, have less power than the Bolshevik party; the Bolshevik party, which recruits it members openly and is recognized as the ruling class, has less power than the secret police. Real power begins where secrecy begins. In this respect, the Nazi and Bolshevik states were very much alike; their diffetence lay chiefly in the monopolization and centralization of secret police services in [SS-Reichsführer Heinrich] Himmler on the one hand, and the maze of apparently unrelated and unconnected police activities in Russia on the other.

It must be noted that there remains some debate in a few scholarly circles as to whether China would qualify as a totalitarian state, such as that deliberated on by Arendt. China certainly ticks off most of the boxes that would qualify it as such. Totalitarian countries are those in which the government does not permit its people to partake in political decision making. Instead of giving the people a voice, a totalitarian country is typically ruled either by a single dictator or a group that has not been collectively elected by the people. The ruling leaders, in China’s case, a ruling party, of totalitarian countries do not merely enact laws. Rather, the people or person in charge controls all aspects of both public and private life. There is no limit to what a totalitarian government can control because there are not any checks or balances placed on the leaders of the country. Essentially, totalitarian leaders can do whatever suits their agenda and say anything that comes to mind.

Citizens are stripped of all freedoms in totalitarian countries. Denial of the right of free speech will usually include a ban on freedom of the press. Ideologies, beliefs, and religions may even be highly curtailed or absolutely forbidden in a totalitarian country. The national government has full and total control. Totalitarian leaders often rule through fear because they take advantage of citizens’ emotions in order to keep them from revolting and protesting. When you live in fear, you do not know how to speak out against injustices because you are scared. It becomes a matter of staying silent in order to stay alive, and totalitarian rulers know this. In fact, they thrive off of this natural human instinct. To reinforce the idea that citizens must show complete alliegance and compliance with the government, totalitarian leaders typically have security forces, some secret, that ensure citizens do not fall out of step. In some totalitariam countries, certain religious minorities and political groups by the security forces. Expressing dissent toward government decisions and actions is strictly prohibited in these countries. Although liberal democracies pride themselves with regard to the way people can form and express their own reactions to the government, people who live in totalitarian regimes must agree with everything the government does, says, and enforces. Outward expressions of disagreement are forbidden. By these qualifications, China certainly could be viewed as a totalitarian state. Audi vide, tace, si vis vivere in pace. (Use your ears and eyes, but hold your tongue, if you would live in peace.)

Senior executives and managers of the MPS and MSS are mutually responsible for creating tranquillitas ordinis—the tranquility of order. That is indeed a charitable perception of their work, especially MPS, which has a history using brutal methods in the name of establishing law and order. It would seem that between the two intelligence services, there has been the some successful creation of a figurative cross organizational masonry through which fruitful communication, agreements, and interoperability can be shaped and facilitated. One might imagine establishing that order has rested in efforts such as obliging both MPS and MSS to mutually keep each other informed of developments. One could hardly imagine that one organization steps on the figurative toes of the other by suggesting anything as grand as using an alternative strategy in an ongoing investigation of an individual or group of individuals would occur. At this stage, MPS does not desire to share the anxieties of MSS, and visa-versa. There would appear to be enough for both organizations to do. Further, sources of funding and support for both derive from specified sources, leaving little need to struggle for means. Periclum ex aliis facito tibi quod ex usu siet. (Draw from others the lesson that may profit yourself.)

Commentary: China’s Coronavirus Tack Includes More Abrupt Officials and Political Warfare; Its Diplomatic Tool Must Endure the Consequences

Communist Party of China Headquarters (above). The Communist Party of China’s line on the coronavirus pandemic has been thoroughly questioned in the West, especially in the US. Beijing’s finger wagging in response has not resulted in some grand conversion of anyone in the US or anyone in the world to China’s point of view. If Beijing stays on its current course, activities in support of the Party-line will surely intensify. Political warfare units and officers overseas of the Chinese intelligence services possess the know-how to propagate the Party-line and are being relied upon. A quiet sense of resentment has likely risen among Ministry of Foreign Affairs diplomats and professionals who seem to be increasingly tasked with making right turns on the truth and have watched as their legitimate work, to promote China’s policy interests, is regularly supplanted by intelligence efforts.

From the moment the coronavirus outbreak began, the People’s Republic of China was not able to overcome and resolve all challenges that beset it. Facing that reality appears to have shaken the psychological foundations of China’s Communist Movement to its core. Under the somewhat mechanical guiding principles of the Communist Movement reinvented by Chairman Mao Zedong insist that China must be forever driving upward and making progress. All efforts should be directed at pushing China to meet its destiny of taking a dominant position in the world. If China did not reach the top, it would remain a sheep not a shepherd. The volumes of collected concepts and quotes could not offer answers for Beijing to quickly and effectively contain the coronavirus, Having failed to meet the needs of its people, Beijing then failed to prevent a coronavirus outbreak worldwide which it must have come to term with by now. Thereby, any sense of failure has likely been intensified. Yet, Beijing has refused to give up the ghost and has continued to extol the virtues of its medical, scientific, and advanced technological capabilities. The identity of the Party is dependent on a certain worldview concerning the Communist Movement, the teachings of Mao, China’s greatness, and China’s world dominance in the future. When that worldview was threatened, the Party would only hold even more tightly to it and potentially double-down on that line of thinking. That possibility of doubling-down most likely led to the decision by Beijing to contain the virus in China as robustly as possible and contain any information just how bad the situation was. Certain medical approaches were approved and taken. Concern over what might have happened outside China was not given equal importance. and few real steps, if any, were taken that related to a concern over an outbreak. No alternative ideas concerning an almost certain outbreak from the discerning and wise in Beijing–academics, scientific scholars, any with relevant expertise–were investigated or allowed any light. Controversies were to be avoided. Those few who said anything contrary to the Communist Party of China line were effectively silenced.

Indisputably, the Communist Party of China’s line on the coronavirus pandemic clashes with the truth. It has been questioned in the West, especially in the US. Although finger wagging at the US in response may seem morally invigorating, it has not resulted in some grand conversion of anyone in the US or anyone in the world to China’s point of view. It certainly has not improved relations with the US. In China, the Communist Party of China, the National Party Congress, and the State Council of China are the immediate sources of all the daily needs of the Chinese people, that certainly would include information. The government would like to convince the Chinese people that international affairs, it says what it has to say, does what it has to do, to lay up a future of world dominance for China. Given this, perchance Beijing has continued this course because it believes the rebuke of the US has served to assure the Chinese public that there is no ambiguity in what the Communist Party of China has determined are the facts. Beijing may believe it is helping Chinese citizens live their lives fully and clear because they are provided “the truth.” By now, though, a good number of Chinese citizens are aware that one cannot know with certainty what is real from what one hears from the government.

In hac re ratio habenda est ut montio acerbitate. (Reason should be held to (applied) in this matter so that the admonition may be without harshness.) While greatcharlie would prefer to avoid being seen as providing advice to Beijing–which in reality would most likely have no interest in its meditations on the matter. Nonetheless, one might say out of academic interest, greatcharlie has sought to conceptualize what Beijing could have done on the world stage when the coronavirus epidemic began in China and offers some thoughts on what it could still do today to recurvate better present itself as “a leader” on the world stage. Related to that, greatcharlie also takes a brief look in the abstract at why any immediate change in the attitudes and behavior may not occur so quickly as its diplomatic tool, the People’s Republic of China Ministry of Foreign Affairs (MFA), has been going through a type of transition contrary to its purpose of building better relations with other countries.

As a net result of its ongoing tack concerning the coronavirus pandemic, Beijing has thoroughly encased itself in the dreadful mistakes it made by unintendedly, yet repeatedly, shining light on what it did not do right and by its continuous attempts to muscle its way out a disastrous situation with words and actions cobbled together inconsistently in an unsuitable emergency public relations campaign. It would seem that in undertaking its current course, not one appropriate contingency has been considered.

If one were to allow Beijing a bit of latitude, purely out of academic interest, its response to the Western, particularly the US, may be the sense that Chinese leaders might have seared into their psyches over decades about Western perceptions of China. That sense might be informed by utterances of identifiable relics of bigotry from a bygone era to the effect that China is nothing for the West to worry about and the Chinese lack the intellectual power and scientific and technological know-how to ever match US capabilities. That was the case when former US Vice President Joe Biden stated: “I mean, you know, they’re nice folks, folks. But guess what? They’re not competition for us.” To that extent, Chinese leaders view their country a being wronged for too long and they endeavor to right that wrong. (Interestingly, in the administration of US President Barack Obama from which political leaders who have made such statements mostly emerge, a laissez faire attitude resulted in policies on China lost in the wilderness that failed to genuinely protect or promote US interests. The delinquency and lethargy of previous administrations also allowed for the steady progress of China versus US power and further advances in technology.)

Certainly, the moment for immediate action has passed. However, a better course than the one taken, to be brief, would have been to accept the reality of their situation, listening to those in their own country who presented the truth about the virus, and fully acknowledging all of the different developments as they happened, the good, the bad, and the ugly. Most important would have been to be the very party that sounded the global alarm, proactively suggesting constructive precautions to all countries, interacting closely with those leading industrial powers which could have a real impact in stemming the problem worldwide while there was still at least a modicum of time for all countries to act, not just China. Beijing could have worked strenuously with international organizations to include the UN Security Council, fully alerting them that the threat that global pandemic may be in the making. Within those institutions, practical and promising forward-looking recommendations to forge a synergistic international response could have been formulated and promoted by China. The flurry of positive action, that would most noticeably include Beijing’s humble recognition of its errors, would have been an astonishing, powerful display of international leadership by Beijing, albeit over a crisis it caused. The fact that something akin to this approach was not undertaken, and perhaps not even considered, has been a sticking point for Trump.

If it so chose at this stage, Beijing could still direct energy and resources at pecking away at the shell in which they trapped themselves much as a chick breaking out an egg. Nuanced approaches requiring positive action by all relevant bureaucracies across the government to create a positive image and firm, favorable picture that a sanguine China is taking all affirmative steps possible should need to be developed. They would need to be finessed, reshaped continuously, to maximize impact upon viable opportunities to break out its self-inflicted shell the country’s earlier missteps. It would also require more humble cooperation with the rest of the world, not reckless antagonistic verbiage that has so far only triggered the never previously considered process of genuinely isolating China from the international community, international trade and political economy, that is slowly gaining momentum. Rather than experiment with anything new, thoughtful, and inspired, Beijing simply turned to the derivative tactics of locking down and concealing less-desirable and outright unpleasant developments. Disappointingly, the leadership of China appears to lack the reflexes, sensibilities, and sadly, the sophistication, to turn toward the more advanced notions required for positive cooperation. Perhaps, brooding leaders of the Communist Party of China have managed to convince themselves that the main front in all of this is a battle of wits between East and West, in which two disparate political and economic systems compete for dominance.

If no erosion of its current positions occurs, and Beijing stays on its current course, one can expect activities in support of them to intensify. Seemingly, the quondam Cold War era, in which such thinking held prominence is apparently not dead, at least not in the foreign affairs parlors of the Communist Party of China, as well as the Chinese intelligence services, particularly the Ministry of State Security (MSS), and to an extent, departments of the People’s Liberation Army (PLA) and intelligence elements of the Communist Party of China. The MSS, a civilian intelligence agency, comparable to some degree to the US Central Intelligence Agency (CIA), is the embodiment of the logic that created the Chinese system’s intimidating, authoritarian order. Since 1983, it has choreographed events to accomplish the Communist Party’s purposes worldwide. With regard to China’s coronavirus crisis, MSS possesses the know-how through specially trained personnel in political warfare units and officers overseas who could engage in active measures, propagating the line of the Communist Party of China. So far, the apparent political warfare attack against the US, has not been the smashing success leaders of the Communist Party of China were hoping for. However, its effects are doubtlessly being felt throughout the foreign and national security policy apparatus of the Chinese government. With regard to the MFA, large swathes of activities concerning China’s foreign relations with other countries have been taken out of the hands of the diplomats and other professionals at the MFA and put in the hands of the intelligence services.

Materiam superabat opus. (The workmanship excelled the materials.) In the offices of the MFA, there is very likely a very quiet sense of resentment among professionals having chosen to represent China and promote its policy interests worldwide only to have their legitimate activities regularly superseded and supplanted by the machinations of the Chinese intelligence services at the behest of Communist Party of China. After decades of proudly engaging in complex, meaningful diplomatic work, mostly behind the scenes, with the goal of having China respected and reckoned as a power that can have a significant impact in international affairs by the international community, it is surely difficult for MFA diplomats and other professionals to watch as China, instead of further establishing its place among dominant powers, is now earning a reputation as an international pariah.

The purpose of diplomacy should be to prevent war. Bilateral and multilateral contacts with other countries, statements, press releases, and other messaging should not have the aim of antagonizing and raising the ire of leaders and other decisionmakers in foreign capitals. MFA diplomats and professionals would surely prefer to avoid a tit-for-tat situation with the US in which one act of retribution would lead to another from China. With every new act, the chance that a serious outbreak of violence increases.

As mentioned, MFA is ostensibly the primary government agency with a portfolio of implementing the foreign policy and managing diplomatic affairs of China, however the ministry now finds its diplomatic efforts with the US being increasingly supplanted by MSS efforts to conduct active measures such having journalist, academics, and other policy scholars promote the Communist Party of China’s hardline and by intensifying its efforts to steal a wide variety of technologies from US companies and universities. More recently, that nefarious work has included efforts to steal the fruits of money, time, and research into therapies and vaccines for the coronavirus. MFA diplomats may find themselves more and more dragged into MSS operations and those of other Chinese intelligence services as their efforts intensify. In a recent incident, it was discovered that a biology researcher at the University of California-Davis lied about her ties to the PLA. After being interviewed by the Federal Bureau of Investigation, she sought refuge in China’s San Francisco consulate. While it has not been definitively established that she was engaged in intelligence work in the US, there is a high probability she was. The PLA would not knowingly deploy an officer to the US without tasking her with some intelligence function. MFA is a consumer of information from cloak and dagger work, and it’s diplomats would prefer not to be sacked into the business of obtaining it.

One might suppose that it was already enough for MFA diplomats to tolerate a policy generally understood to be in effect that has MSS personnel assigned to China’s embassies and other permanent diplomatic missions overseas for up to six years, with a few remaining in post for 10 years if required. Reportedly, in the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. When the accommodations to the MSS aforementioned are added to this, it most assuredly piles on to a heap of discontent that has been long standing.

To enlarge on the point of how MFA is intriguingly being utilized in the larger more belligerent approach of China toward the US, recall how early into the coronavirus crisis, the world witnessed the Department of Information of the MFA using a far sharper tone. As time moved on, it seemingly devolved into being simply a direct mouthpiece for the Communist Party of China, providing some cover for the Party’s own offices. What was being declared about the US has been far from plausible, and apparently manifested anxieties, fears, over outcomes of grave errors made within China. Press briefings amplified those statements online with a bit more vigor. Spokespersons propagating the stronger line were abrupt in what is the approved Party fashion. Indeed, all MFA officials comported themselves publicly with an astringency which some regime critics would say uncloaked the true nature of the regime. Disinformation was also being spread from MFA sources through posts on Twitter. Those who are following this matter closely will hardly forget the shocking and incredulous tweet from Zhao Lijian, the Director of the Information Department of China’s Ministry of Foreign Affairs in which he tried to direct blame at US for the coronavirus epidemic in China. From @zlj517 on March 12, 2000, at 10:37 AM, Zhao wrote: “2 CDC was caught on the spot. When did patient zero begin in US? How many people are infected? What are the names of the hospitals? It might be US army who brought the epidemic to Wuhan. Be transparent! Make public your data! US owe us an explanation!”

The hallowed diplomatic doctrine of the MFA has been moderation in all things. Calmness and authority must be shown not only in diplomacy but in all circumstances. The more recent assertive approach has pulled MFA officials from their more traditional conservative, stolid posture. Reportedly, the transition in approach is due to something called “Wolf-Warrior diplomacy.” The name derives from high grossing, action films, “Wolf Warrior” and “Wolf Warrior II,” that feature Chinese special operations forces in battle against China’s adversaries. While the films present a false reality, the nationalistic ideas and ideals they  promote apparently cross-polinated with thinking of China’s leadership on real foreign and national security issues.

Res ipsa repperi facilitate nihil esse homini melius neque clementia. (I have learned by experience that nothing is more advantageous to a person than courtesy and compassion.) With good reason, somber and astute foreign policy analysts worldwide have found it difficult to believe that MFA diplomats and professionals are pleased to adhere to a policy that is named after and centered upon a banal amusement. There is some indication that the Wolf Warrior diplomacy is not novel, but rather has been in effect for a decade. However, the requirement that MFA diplomats and even officials of other government ministries take on a “fighting spirit” has really been something insisted upon by Chinese President Xi Jinping. Wolf Warrior diplomacy is all seen is a response by Beijing to highly biased perceptions of China presented especially in Western media. Recall, that notion was touched upon earlier here. Biases heard from overseas by China are often perceived not only as ideological but racist. There is also a prevalent perception in China that as the country has become more powerful on the world stage, other countries increasingly sense that it poses a threat to their respective interests.

The official position on the impact of Wolf Warrior diplomacy on Chinese diplomats and professionals is that it has raised their morale and encouraged a more assertive style. Yet more plausibly, MFA diplomats and professionals feel Wolf Warrior diplomacy is a load of bollocks, and they could mercilessly dissect the shortcomings of that diplomacy and anything produced under it. Intriguingly, expressions of traditional Chinese diplomacy and professionalism have been heard here and there. Comments of that nature made by the People’s Republic of China Ambassador to the US Cui Tiankai about the anti-US declarations from Beijing were highlighted in greatcharlie’s March 31, 2020 post entitled, “Commentary: Beijing’s Failed Political Warfare Effort Against US: A Manifestation of Its Denial Over Igniting the Coronavirus Pandemic”. Reportedly, Cui told the HBO news program “Axios on HBO” that he stands by his belief that it’s “crazy” to spread rumors about the coronavirus originating from a military laboratory in the US. Cui even called this exact conspiracy theory “crazy” more than a month ago on the CBS News program, “Face the Nation.” well before the spokesperson for the Chinese Ministry of Foreign Affairs first began publicly promoting the conspiracy. However, despite such coruscating flashes of what could be called true MFA sensibilities, strong disagreements felt by diplomats and professionals are generally left at the door of their office buildings. At best a very cautious demarche should be attempted in house by the most secure diplomats in the face of decisions and policies of the leadership in an authoritarian, and arguably totalitarian, Communist state. That demarche should never be looked upon by outside observers as a fuite du courage, as much as a pragmatic, existential necessity.

Perchance, more MFA diplomats and professionals disagree with Communist Party of China line policies than one could imagine. No one hoping for the best for China would want to see good thinking officials engage in some une enterprise désespérée that could result in having them brutally weeded out of the system. At least for the time being, nothing that could relatively “bring down the house” should be uttered. Having been directed to promote policies based on the attributes of a fictitious character from an action film, MFA diplomats and professionals have done so without question both overseas and at home. The Ancient Greek philosopher Aristotle stated: “It is the mark of an educated man to be able to entertain a thought without accepting it.”

At one time, the MFA had a clear cut choice between being a mediator and an enforcer of China’s foreign policy. Its diplomats displayed a certain style and nuance as they made offers and discussed the proposals to resolve issues with other countries. Wolf Warrior requires a hardline stand every time. Insights will not advance efforts, dogma will. In following, as time passes, the MFA will likely be forced to make half turns away from the truth, ensuring that it is never on the correct side of issues. As the MFA is used more and more as a tool to proclaim the aggressive message of the Communist Party of China, it places into question whether the ministry will even keep its main job of making peaceful entreaties with foreign governments. While diplomats might meet with the foreign diplomatic counterparts, there would be superficiality to those contacts. It would be diplomacy after a fashion, albeit in an unsatisfactory way. The work of MFA diplomats, as it once was, would be finished. Maliuolum solacii genus est turba miserorum. (A crowd of fellow suffers is miserable kind of comfort.)

The fact that the Chinese government initiated the ongoing coronavirus disaster cannot be credibly truthfully argued against. Sadly, Beijing so far has not demonstrated any interest in acting appropriately concerning the present matter of the coronavirus. It will most likely attempt to continue to assail the global media with waves of distortions. Nevertheless, despite that having transpired, it is not too late to turn the situation around. China can put the present time to good use. The US, as the true dominant power in the world must maintain its poise. It must not react. It must act in a measured way using effective means, at a time and place of its choosing. Despite all the dissatisfaction and disappointment felt toward China, the US must interact as amiably as possible. Surely, the two countries are not at a point yet when the dark waters of despair have overwhelmed their leaders. When diplomats from both sides meet, they must approach each other with a certain buoyancy and hope. Consilio melius contendere atque vincere possumus quam ira. (We can compete and prevail better through wisdom than through anger.)

Commentary: Beijing’s Failed Political Warfare Effort Against US: A Manifestation of Its Denial Over Igniting the Coronavirus Pandemic

US President Donald Trump (left) and Chinese President Xi Jinping (right). While a tremendous amount of energy and effort is being focused on the coronavirus pandemic crisis in the US and the rest of the world, the Beijing has placed its focus on a cause far less noble. It ignited a confrontation with Washington by making the utterly absurd and impolitic official declaration that the US Army had ignited the COVID-19 virus (the novel coronavirus) while visiting Wuhan, China, and that the virus was developed in a US military laboratory. There was the attendant declaration that use of the terms “Chinese virus” or “Wuhan virus” was racist and xenophobic. By telephone, Trump and Xi offered one another messages of unity in the war against the coronavirus and appear to have resolved the matter. However, given all that was said, greatcharlie feels compelled to look at how Beijing reached its peculiar conclusions and offers a discussion on what it was likely trying to do.

When covering a subject, it is the fervent desire of greatcharlie’s editor to avoid the appearance of flogging a dead horse. To that extent, in approaching the issue of the incredibly false claims by the government of the People’s Republic of China that the US had ignited the COVID-19 virus (the novel coronavirus) in China, it does not want to dredge up what may beginning to settle down. However, the whole episode has been so peculiar, greatcharlie feels compelled to metaphorically take look under the hood. Continuing from what was just briefly mentioned, Beijing instigated the whole row by declaring the US Army while visiting China to participate in the 7th CISM Military World Games in Wuhan in October 2019, well before any reported outbreaks of the coronavirus. Beijing alleged that the virus was developed in a US military laboratory. There was the attendant declaration that calling the coronavirus the “Chinese virus”, “Chinese coronavirus”, or “Wuhan virus” was somehow an expression of racism and xenophobia. No evidence has been shown by any reliable epidemiologist worldwide that the coronavirus originated anywhere but China. Experts believe that the virus emerged from animals sold in a market in Wuhan, where the first cases of the disease were discovered. All of the declarations from Beijing were bizarre, and similiar ones of that sort were made by it afterward. While a tremendous amount of energy and effort in Washington is being focused on the coronavirus crisis in the US and the rest of the world, Beijing has decided to place a considerable portion of its focus and energy on a cause far less noble.

Much has been written and stated about this grave matter in the US news media. After first hearing of Beijing’s claims, US President Donald Trump addressed it from the White House Press Room on March 17, 2020. He adroitly countered Beijing’s declarations by stating: “China was putting out information which was false that our military gave this to them. That was false. And rather than having an argument, I said I had to call it where it came from. It did come from China.” Perhaps greatcharlie is going on a slender by stating Trump’s words were firm but still rather measured. Trump is certainly concerned with the US first and foremost, but while speaking about the matter, he may have had his positive relationship with Chinese President Xi Jinping in mind and may have wanted to keep the door open for conversation with him to sort the matter out if necessary. Since that time Trump stated he would refrain from using the term “Chinese virus” and he had a constructive telephone conversation with Xi concerning the whole matter. A considerable effort has been made by greatcharlie in it’s posts to alert foreign capitals to the pitfalls of following false information from Trump’s political adversaries in the US who have from his first year in office minus one have sought to thoroughly distort the picture of his team’s  good work and accomplishments. In this particular case, China, a highly-developed, industrialized economic power, has chosen to amplify the attitudes and behavior of Trump adversaries.

Thomas Paine, 18th Century American political writer, theorist, and activist (of the American Revolution), wrote in his work, The Crisis No. V: To argue with a man who has renounced the use and authority of reason, and whose philosophy consists in holding humanity in contempt, is like administering medicine to the dead, or endeavoring to convert an atheist by scripture. Although it finds the perspective on the coronavirus proffered by its senior officials in Beijing objectionable, the goal of greatcharlie here is not to argue against it but simply to offer its own perspective of what Beijing was likely attempting to do. Admittedly, China is not really greatcharlie’s patch. Nevertheless, in an effort to better this matter, greatcharlie takes a deeper dive into what Beijing is doing, what is the thinking of its leadership, and why it is fervently hoped its current behavior will stop and will be avoided in the future. Quis nescit, primam esse historiæ legem, ne quid falsi dicere audeat?; deinde ne quid veri non audeat? (Who does not know that is the first rule of history not to dare to say anything that is false?; and, the second not to dare to say anything that is not true?)

Leaders of the Communist Party of China at plenum (above). It does not feel as if greatcharlie is going out on shaky ground to state that there is a cultural angle by which Beijing can be imagined struggling to cope with a presumed loss of face, a sense of shame and embarrassment, for being unable to respond adequately and in a sure-footed way to the medical crisis. One could also imagine that the leadership of the Communist Party of China believed a torrent of precautions against the coronavirus would exceed the dangers to be avoided. They abandoned the Chinese people to destiny. Left with their egos hurt, and feeling angered and self-conscious about their country’s situation, some among the leadership of the Communist Party of China, amidst all that was transpiring, rather than sit maudlin, likely decided to use the country’s foreign policy apparatus to inappropriately lash out.

An Act of Daylight Madness by Beijing

Once an agrarian country dominated for centuries by foreign powers, China has since the end of World War II has reached amazing heights. Confident and competent, China today is an economic superpower. It has achieved tremendous scientific advances, has sent satellites and probes into far space and is gearing up its space program to meet the challenge of sending a crew to the Moon and return it home safely. China undoubtedly believes it has impressed the world with its achievements. Indeed, it has been extolled by many in the world for its great strides. However, likely sensing the world looking over its shoulder with a mix of disapprobation and commiseration at the unsteady handling of its coronavirus epidemic as the death toll in its country rose, it did not feel so sure, nay feared, that it was not holding its own as scientific powerhouse and engine of scientific advancements. It is difficult to say with certainty how the same proud, mature, self-confident, self-assured leadership of China got to the point in which it decided to ascribe culpability for the spread of the coronavirus to the US. Perhaps the place to look to understand how Beijing feels about this whole coronavirus matter is the Communist Party of China.

Indeed, what the Communist Party of China feels and says about any matter in China is always of great consequence. In spite of all that could be stated about China being an advanced and leading industrialized power, it functions under the rule of a one party, authoritarian system. The Communist Party of China would insist that from leadership, wisdom radiates in all directions. There are eight other, subordinated political parties that are allowed to exist and they form what has been dubbed the United Front. The Chinese government, itself, functions under a people’s congress system, taking the form of what is called the National People’s Congress. The National People’s Congress exercises the state power of amending the Constitution and supervising the enforcement of the Constitution; enacts basic laws of the state; elects and decides on the choices of the leading personnel of the highest state organs of China, including the President and Vice President, the choice of the Premier of the State Council and other component members of the State Council; elects the Chairman of the Central Military Commission and decide on the choice of other component members of the Central Military Commission; elects the President of the Supreme People’s Court and the Procurator-General of the Supreme People’s Procuratorate; examines and approves the plan for national economic and social development and the report on its implementation; examines and approves the state budget and the report on its implementation; and make decisions on other important issues in national life. The National People’s Congress is elected for a term of five years. It meets in session during the first quarter each year and is convened by the National People’s Congress Standing Committee. In accord withbwhat was earlier explained, it is leadership is composed of leaders from Communist Party of China. As for the leadership of the Communist Party of China, it is divided among a number of elite bodies. The 370 member Central Committee of the Communist Party of China is the largest. The Political Bureau of the Communist Party of China Central Committee, or Central Politburo of the Communist Party of China, is a 25 member group of leaders elected by the Central Committee that actually overseas the larger party. Within the Politburo, power is centralized in the smaller Politburo Standing Committee selected by current Politiburo and retired Politiburo Standing Committee members. The day-by-day operations of both the Politburo and its Standing Committee are executed by the Central Secretariat of the Communist Party of China. The Secretariat can even make decisions on how to carry out tasks set by both organizations, consulting them when necessary. All important to the Communist Party of China is upholding and perfecting the system of socialism with Chinese characteristics and the promotion of the modernization of state governance. Socialism with Chinese characteristics refers to the fact that the country’s economy largely follows the principle of a market economy while being Communist in name. The Communist Party of China believes it has provided clear direction for its country and a path for vigorous development. Although maintaining lasting peace and stability is also stated focus, the Communist Party of China believes its country moves closer everyday to a time when it will be the world’s dominant power. When the Communist Party of China causes citizens any suffering through its leaders decisions, it will without empathy, chalk the matter up as being necessary for the greater good, for the sake of the Communist Revolution. Ensuring the population’s adherence to the strictures of the Communist government is a function of its security services. The People’s Liberation Army, the world’s largest military forces, often performs ancillary functions for the security services. From almost day one of the Communist government, there has been an insistence that a watchful eye needed to be kept over threats to the system. It was understood that the reactionary, the counterrevolutionary, most often “hiding in the shadows,” posed the greatest threat and was viewed as anathema. The response had to be strong enough to match “the severity of the disease.” It was in the performance of that mission that the Chinese government has earned a reputation among many worldwide for being an oppressive, authoritarian regime.

It does not feel as if greatcharlie is going out on shaky ground to state that there is a cultural angle by which Chinese can be imagined struggling to cope with a presumed loss of face, a sense of shame and embarrassment, for being unable to respond adequately and in a sure-footed way to the medical crisis. One could also imagine that the leadership of the Communist Party of China believed a torrent of precautions against the coronavirus would exceed the dangers to be avoided. They abandoned the Chinese people to destiny. Left with their egos hurt, and feeling angered and self-conscious about their country’s situation, some among the leadership of the Communist Party of China, amidst all that was transpiring, rather than sit maudlin, likely decided to use the country’s foreign policy apparatus to inappropriately lash out.

The coronavirus spread from Wuhan, China, in late December 2019 according to available evidence. The New York Times on March 13, 2020 reported that scientists have not yet identified a “patient zero” or a precise source of the virus, though preliminary studies have linked it to a virus in bats that passed through another mammal before infecting humans. A senior official from China’s National Health Commission, Liang Wannian, proffered the idea at a briefing in Beijing in February 2020 that the likely carrier was a pangolin, an endangered species that is trafficked almost exclusively to China for its meat and for its scales, which are prized for use in traditional medicine. The first clustering of patients was recorded at the Huanan Seafood Wholesale Market, and studies have since suggested that the virus could have been introduced there by someone already infected. The overwhelming amount of cases and deaths have been in Wuhan and the surrounding province of Hubei. Reportedly, Li Wenliang, a Wuhan doctor, tried to raise alarm about the coronavirus outbreak, was targeted by police in an effort to silence him. He has since succumbed to the coronavirus. Another Wuhan doctor, who was immersed in the battle against the coronavirus and tried to sound the alarm as to the magnitude of the threat, has reportedly disappeared.

Chinese state media has generally praised Beijing’s efforts in containing the virus. On March 17, 2020, a China Daily editorial stated that the world should learn from China’s example in aggressively quarantining and detecting the virus. Yet, At the height of the outbreak in China, local governments were reportedly criticized for excessive measures and lack of supplies and capacity. However, those who closely follow online social media noticed numerous conspiracy stories were emanating from China spreading falsehoods including the idea that the coronavirus might have been brought in by US military athletes who visited Wuhan to participate in the 7th CISM Military World Games, which opened on October 17, 2019 and closed on October 27, 2019. Coronavirus was being labelled by those sources as an “American disease.” Those conspiracy theories were continously recirculated on China’s tightly controlled internet. There is not a shred of evidence to support that, but the notion received an official endorsement from China’s Ministry of Foreign Affairs, whose spokesman accused American officials of not coming clean about what they know about the disease. Then, the disinformation was suddenly being spread from official sources such as a series of posts on Twitter by Zhao Lijian, the Director of the Information Department of China’s Ministry of Foreign Affairs and its top spokesperson. In a now famous tweet from @zlj517 on March 12, 2000, at 10:37 AM, Zhao wrote: “2 CDC was caught on the spot. When did patient zero begin in US? How many people are infected? What are the names of the hospitals? It might be US army who brought the epidemic to Wuhan. Be transparent! Make public your data! US owe us an explanation!” For Zhao, his exertions could hardly have been morally invigorating as he would certainly have known full well, and as aforementioned, that all credible experts believe the coronavirus originated in a wet food market in Wuhan, China, where it was likely passed from different animals until a host carrying the disease transferred it to a human. Zhao who has a reputation for making use of Twitter, though the platform is blocked in China by the government, to push what some policy analysts call Beijing’s new aggressive, hawkish, diplomatic strategy. Yet, in this “campaign” Zhao surpassed himself. Zhao took the posture of a positive serpent. Other senior officials of the government comporting themselves publicly when discussing the coronavirus epodemic did so with an astringency which some regime critics would say uncloaked the true nature of the regime. Lin Songtian, China’s ambassador to South Africa also tweeted that the virus might not have originated in China. Fallacia alia aliam trudit. (One falsehood thrusts aside another.( i.e., leads to more))

After giving an address on March 16, 2020, warning of a possible recession, the US president posted from @realDonaldTrump on March 17, 2020 at 12:16AM on Twitter: “The United States will be powerfully supporting those industries, like Airlines and others, that are particularly affected by the Chinese Virus. We will be stronger than ever before!” Chinese officials took a similar acidic approach to Trump’s reference of the pandemic as the “Chinese virus.” Zhao’s colleague, Geng Shuang, deputy director of the Chinese Ministry of Foreign Affairs Information Department, at a press briefing in Beijing on March 17, 2020, stated: “Some US politicians have tried to stigmatise China … which China strongly condemns.” He went further to explain: “We urge the US to stop this despicable practice. We are very angry and strongly oppose it [the tweet].” When asked if comments such as his and Zhao’s reflected Beijing’s official views on the virus, reportedly he did not directly comment. Instead, he replied: “The international community, including the US, have different opinions about the origin of the virus,” he told the Reuters press agency, adding that the origin of the virus was a scientific matter and as such, scientific views should be listened to. (Perhaps there would be a need to twist his tail to force him to mimic the obloquy of his colleagues.) Then the superior of Geng and Zhao at the Information Department of the Ministry of Foreign Affairs, its director Hua Chunying, sent out a tweet amplifying, with a bit more vigor, Geng’s line of argument. He included a link to a video clip that included the director of the US Centers for Disease Control, Robert Redfield stating on March 17, 2020 that it was wrong to refer to the coronavirus as a “Chinese coronavirus,” noting while it first emerged in China it has since severely impacted countries such as South Korea and Italy. Hua’s tweet from @SpokespersonCHN on March 12, 2020 at 3:26AM was the following: @CDCDirector Dr. Robert Redfield: Some cases that were previously diagnosed as Flu in the US were actually . It is absolutely WRONG and INAPPROPRIATE to call this the Chinese coronavirus. https://www.c-span.org/video/?c4860650/user-clip-diagnosed-flu-covid-19 …”

One could call what Beijing was doing as diplomacy after a fashion. Yet, certainly it is diplomacy conducted in an unsatisfactory way. On the coronavirus matter, Beijing appears to have little interest in holding themselves to what generally might be understood to be higher standards international statesmanship. Going directly to the source of Chinese power, US Secretary of State Mike Pompeo issued “strong US objections” in a telephone conversation with Yang Jiechi, director of the Office of Foreign Affairs of the Communist Party of China. CCTV, Chinese state television, reported that Yang also issued “strong objections” to attempts by the US to “slander and smear” China’s efforts in combatting the virus. That unfortunate response from a key Communist Party of China official was quite telling. With the exception of the two national leaders, Beijing at almost every level was all over Washington, and in turn, Washington, at nearly all senior levels, was all over Beijing.

What is quite troubling was the way Beijing’s effort smacked of provocative efforts during a previous era of a geopolitical struggle between East and West, Communism versus Capitalism. There was a paranoia that eventually hardened both East and West, seemingly giving rise to intractable negative beliefs and harsh convictions of each side’s respective intentions. One would have hoped that era was dead. It would seem that in the minds of some in Beijing, particularly among the leadership of the Communist Party of China, that era is still very much alive. To that extent, a defacto bigotry toward the US appears to exist in the thinking among a number of them.

Other than an eventual good telephone call between Trump and Xi, the only bright spot in the middle all that has occurred was comments made by the Chinese Ambassador to the US Cui Tiankai about the anti-US declarations from Beijing. Reportedly , Cui told the news program “Axios on HBO” that he stands by his belief that it’s “crazy” to spread rumors about the coronavirus originating from a military laboratory in the US. Cui even called this exact conspiracy theory “crazy” more than a month ago on the CBS News program, “Face the Nation.” well before the spokesperson for the Chinese Ministry of Foreign Affairs first began publicly promoting the conspiracy. It would seem that true professionals in the Chinese government would prefer to stick with the primary problem instead of rooting around extraneous matters and bizarre claims. Cui apparently holds firmly to the belief that good diplomacy among advanced industrialized societies, to preserve peace and security, must not exceed what is decent.

Zhao Lijian (above), deputy director of the Information Department of the Chinese Ministry of Foreign Affairs. One could call what Beijing was doing with its impolitic declarations about the US as diplomacy after a fashion. Yet, certainly it is diplomacy conducted in an unsatisfactory way. On the coronavirus matter, Beijing appears to have little interest in holding themselves to what generally might be understood to be higher standards international statesmanship. With the exception of the two national leaders, Beijing at almost every level was all over Washington, and in turn, Washington, at nearly all senior levels, was all over Beijing. What has been quite troubling was the way Beijing’s effort smacked of provocative efforts during a previous era of a geopolitical struggle between East and West, Communism versus Capitalism.

A Possible Political Warfare Strategem

What Beijing has expressed may very well be a projection of its disappointment with itself. Knowingly speaking vaguely, it is not hard to imagine leaders in Beijing, particularly within the Communist Party of China, smouldering over the embarrassing reality that the coronavirus pandemic was due to their incompetence. It was not something embarrassing that could be hidden away. The resulting choice for Beijing, not to behave as a good player on the international stage, was the wrong one. Looking upon the matter of Beijing’s declarations with more discerning eyes, it cannot be ruled out that the leadership there has done more than simply green lighted  some unconstructive propaganda by the senior members of the foreign ministry. The implications and indications are that their declarations have most likely been part of a greater political warfare stratagem.

Male cuncta ministrat impetus. (Anger manages everything badly.) Beijing’s nose has certainly being put out of joint. If greatcharlie’s  supposition that Beijing had launched a political warfare attack is valid, its primary purpose would be getting the rest of the world to tear the Chinese name off of the virus was part of a larger effort to conceal the fact that the virus had any connection to China and save face after an absolutely failure to respond to it appropriately and contain it. Indeed, throwing the yoke of embarrassment off China’s shoulders would mean everything to its leadership. It would no longer be the cause for so much torment and anguish worldwide. It would no longer be the scapegoat for the pandemic. In an eccentric way of thinking, Beijing may have seen this tact as a way to make amends for quite a failure. With seemingly little hesitation, they apparently chose to threaten the civilized order. Their minds were confined to what has already transpired and unwilling to open to the potential of the future. It would seem, much as it has been said by the many who have suffered its wrath and by those foreign journalists and scholars who have closely oberved it in action, the voice of deception and hypocrisy lingers in China via the Communist Party.

In an April 30, 2018 greatcharlie post entitled, “US-Led Military Strikes in Syria Were a Success: Was a Correlative Political Warfare Success Achieved, Too?”, the features of a political warfare effort were outlined. It was noted by greatcharlie that political warfare consists of the international use of one or more of the implements of power–diplomatic, information, military, and economic–to affect the political composition of decision making within a state. Citing Brian Jenkins, a renowned security affairs analyst at RAND, the post explained that political warfare reverses the famous dictum of the 19th century Prussian military theorist Carl von Clausewitz that “war is the extension of politics by other means,” as political warfare is really the extension of armed conflict by other means. It could take the form of the following: economic subversion; propaganda–not tied to a military effort; psychological warfare–as part of a military effort; conditional aid to a state; aid to political parties; aid to resistance groups; political accommodation; and, even assassination. Those engaged in political warfare perceive an opposing side not as a monolithic force, but as a dynamic population of individuals whose grievances, sense of humiliation, and desire for revenge, honor, status, meaning, or mere adventure could propel them to resistance. Political warfare recognizes that usually members of the opposing side are constantly calibrating and recalibrating their commitment. It sees every member of the opposing side as a potential convert. Many of these features are readily discernible in Beijing’s effort.

Likely Hopes in Beijing for Its Possible Political warfare Attack

One might believe that it would be a risky leap of faith to attempt to include the mighty US on the list of the league of countries and peoples who have been targeted by Beijing’s disinformation campaigns focused on concealing its own misdeeds. Included on a short list of ongoing targets of such deception would be the Uhigars of China, the people of Tibet, the people of Hong Kong, Taiwan (officially the Republic of China), Vietnam, and South Korea.

Trying to manipulate thinking and events the US, however, would not at all be an alien concept. Along with the Russian Federation, China also was detected meddling in 2016 US Presidential Election. This fact has been highlighted by Trump’s adversaries in the US for their own varied purposes. In fact, it was perhaps viewed as a low risk. To that extent, within the Communist Party of China, the operation very likely made plenty of sense from certain perspectives. The attack would be launched from China. Since physical courage would not be required, they would likely flatter their own egos by displaying the political courage to act in such a way. Beijing likely believed that they had superior operational awareness. They felt they knew terrain and all of the actors on the other side. They likely felt confident that they could make profound use of detailed all source intelligence concerning the US. Having reviewed endless reports and commentaries produced by Trump’s adversaries that were already calling him racist and xenophobic for saying the Coronavirus was from China, and calling it the “Wuhan Virus”, and observing them try to tie the word racist to his tail in general, was surely encouraging in Beijing. The know-how was in their possession through specially trained personnel in political warfare units in their intelligence services and perhaps even in the Communist Party of China itself. Whether the political warfare attack came to the personal attention of Xi himself is uncertain. Considering his likely desire to preserve his line of communication and relatively good relations with Trump, Xi would probably find the presumed political warfare operation too rich for his blood. He would also likely have intuited that it would all become an untidy situation in the end.

An likely important goal of Beijing’s political warfare campaign would be to exploit individual weaknesses in the US on a large scale. The focal points surely woukd be the feelings, sensibilities and sentiments of those unable to find assurance and security in what has been done by the US President so far. Without question, Beijing targetted Trump’s adversaries, particularly anti-Trump members of the US news media. Those members of the US public who were bewildered by all the news about the coronavirus and ambivalent about what was being done in response were also likely primary targets of the attack. With proper measure, Beijing believed it would chip away at reality and replace it with the false reality it had constructed. The key would remain getting the US public and the people of the world to accept what it was saying. Beijing apparently believed that faith would be out into its words and that there was a considerable lack of faith in Trump and the US government both in the US and in the rest of the world.

Xi (center) at ceremony with Communist Party of China’s leadership. What Beijing has expressed through its impolitic declarations about the US may very well be a projection of its disappointment with itself. It is not hard to imagine leaders in Beijing, particularly within the Communist Party of China, smouldering over the embarrassing reality that the coronavirus pandemic was due to their incompetence. The resulting choice for Beijing, not to behave as a good player on the international stage, was the wrong one. It cannot be ruled out that the leadership there has done more than simply green lighted some unconstructive propaganda by the senior members of the foreign ministry. The declarations may have been part of a greater political warfare stratagem. Whether the presumed political warfare attack came to the personal attention of Xi himself is uncertain. Considering his likely desire to preserve his line of communication and relatively good relations with Trump, Xi would probably find such an operation too rich for his blood and intuited that it would all become an untidy situation in the end.

Targeting the US News Media

In Book II of his masterwork, Paradise Lost (1667), the great 17th century English poet and intellectual, John Milton,  wrote: “But all was false and hollow; though his tongue Dropp’d manna, and could make the worse appear The better reason, 4 to perplex and dash Maturest counsels.” As adversaries of Trump, the rhetoric of the US news media has only been second in virulence to the utterances of some political adversaries in the opposition Democratic Party. On list of Trump’s adversaries, however, there is a far larger group to include: academics; think tank scholars, other policy analysts; political pundits on television, radio, print media, and online; former senior members of the previous administration of US President Barack Obama; television personalities; and, Hollywood celebrities. For whatever reason, they have some inextinguishable, inexhaustible need to injure Trump. They are all absolutely comfortable with expressing the most fanatical rebukes possible as opposed to constructive criticisms.

One should be under no illusion concerning an extreme dislike of Trump in the US news media. From the first days of the Trump administration, there has been an “us-them” approach taken by the majority of the US news media toward anything it does. Reporters and pundits in the broadcast media have gone beyond the point of being gadflies. Primacy is given to an effort to shape the thinking of the public against Trump, as well as provoke the US President, with daily stories that harshly criticize him, gainsay his administration’s decisions and actions, and chastises administration personnel from senior advisers to middle level staff. Opportunities to make platitudinous objections to Trump are never missed. Words used are beyond hostile and aggressive. The distance that many journalists are willing to travel away from past norms is unknown. Into the second year of his first term in office, the news media remains all Trump, all the time. Journalists discuss hypotheticals sometimes with only a tenuous connection with the realities of ongoing events rather than informing the US public of facts from solid reporting and analysis based on studied patterns of decision making. The facts offered are more often bleached to the point of being superficial. Deeper dives into facts are avoided, and gaps are filled with opinions. Journalists will even seek to capitalize on Trump’s criticism of their stories whenever he decides to get involved with them. It is puzzling how for so long  in the US news media has raged a fever in their blood. The reason for their commitment to such anger and aggression has begun to appear demonically inspired from Hell.

As noted by greatcharlie in its February 25, 2020 post entitled, “Commentary: With the Impeachment Results In, Foreign Capitals Can See Clearer How Their Relations with Washington Add Up”, foreign capitals able to discern the angry and hateful language of Trump’s adversaries for what it was, have managed to establish good relations with his administration and to reach new, balanced agreements with US over the past three years. Their respective leaders have enjoyed good person-to-person communications with Trump. Economic improvement, growth, and a greater sense of hope in their own countries can be seen.

A trove of information could be found in open source reporting from the US news media for those foreign capitals bent on promoting odious ideas about Trump and his administration. Clearly, Beijing stands alongside those foreign capitals willing to take that path. Its worst opinions about the Trump administration and the US were surely satisfied via that stream of information. However, what Beijing has done goes beyond just rereporting useful negative information from US sources. Doubtlessly watching carefully how members of the US news media and Trump’s adversaries would grab at essentially any morsel to attack him, made use of that penchant.  Indeed, Beijing likely calculated that Trump’s adversaries would not be able to resist its statements about alleged US Army activities in Wuhan, which they of course would conclude Trump ordered. Declarations that Trump was racist and xenophobic for using the terms Chinese coronavirus and Wuhan virus was figurative catnip for them. Suffice it to say that many, true to form, picked the figurative low hanging fruit and have continued to grab what has been dangled before them. Conference rooms of US news media outlets were likely set ablaze over talk about the statements. Almost immediately, the false statements from Beijing were found in broadcasts, online sources, and print media. Upon learning what has very likely transpired, however, one should hardly expect anti-Trump members of the US news media to assume a virtue.

Targeting the Bewildered and Ambivalent in the US

Decipit frons prima multos, rara mens intelligit quod interiore condidit cura angulo.
(The first appearance deceives many, our understandings rarely reach to that which has been carefully deposed in the innermost recesses of the mind.) Targeting the feelings and sensibilities of those in the US public who are unsure of what is what during the coronavirus would make good sense from an adversary’s perspective. At best, under ordinary circumstances, such declarations by Chinese officials would not overly concern the US public. It would most likely sound much as a conspiracy theory by those who might ponder it. Some perhaps harboring negative impressions of Trump has performed might leap to use the nonsense proffered from Beijing to support their worst impressions. Many were led by the nose during the Impeachment debacle in the US Congress, the claims of what the Investigation of Special Counsel Robert Mueller would find regarding Trump’s alleged ties to the Russian Federation Government, and absolute farce that Trump was a Russian Federation spy. Some who might find difficulty recognizing the good intentions of the Trump administration due to unique preconceptions on how it operating might find it easy to fold what was declared from Beijing into their own sense of the bigger, uglier picture of the what the administration is all about. The overwhelming and baffling nature of it all might cause some to believe it serves as evidence that elements of the secret world have been at it again. Those judgments most likely would be based almost exclusively upon what has been produced in Hollywood about US intelligence services. Hollywood’s version, of course, was created as a commercial amusement and never intended to inform viewers of the realities of the intelligence business.

Although their behavior may be condemned by the informed, more astute, self-assured, perhaps those bewildered and ambivalent members of the US public who may have fallen prey to the disinformation generated by Beijing should not be hastily, or too harshly judged. There is always the chance that the Information one might receive about a matter could be false, a deception, fraud. Yet, tell anyone anything and up9n immediate impression, it will likely arouse some feeling. If it is tragic information about someone, the feelings can be sorrow, pain, sympathy, and  regret. If it is good news it can lead to feelings of satisfaction, happiness, joy, and pleasure. If information is bad it can create resentment and anger. Feelings of anger when stirred by information, even if it is false, can also lead to hostility and violence. If one is willing to act solely on feelings, one cannot hardly be certain if the facts are true and feelings are warranted. Given the intensity of feelings one might manifest about information, one, without really giving it a thought, might simply accept that the truth is already in ones possession. One’s impressions about a source can also lead one to make that determination that enough proof exists. Yet, only to the limits of one’s knowledge and trust of the source can be one certain that they have the truth. Over time, the impulse, to find truth through stirred feelings or mere impressions, can become a habit. However, it is a bad habit. It is error self-taught. It leaves one open to manipulation from all directions. Surely, one must only act on truth; a better than sufficient amount proof. When available, data must be collected and considered. Prima sapientiæ gradus est falsa intelligere. (The first step towards wisdom is to distinguish what is false.)

Where Beijing’s Possible Political Warfare Attack Went Wrong

The clever boots in Beijing who likely fashioned the messages put out by officials were likely drawn from scholarly analytical cells of their diplomatic service, intelligence services, and intelligence elements of the Communust Party of China. They doubtlessly as a duty closely follow US politics and public opinion and have been closely observing the progress of the coronavirus epidemic in the US. They were likely quite cognizant of the anxiety and fear created by the “all virus all the time” reporting on broadcast television, on the internet, and social media, and daily publications. Even if any had expressed doubts about the potential success of the political warfare attack, they surely would have been ignored. Assuming that those who executed the presumed political warfare attack were gung-ho across the board, perhaps just before its execution, they might likened themselves as the final push from behind to a ball they already saw moving in the right direction. Yet, rather than pushing a ball in the right direction to hurt Trump and the US, they metaphorically dislodged a boulder on a cliff above their own homes that came crashing down through their roofs. They were essentially sabotaged by their own ignorance,

Beijing’s Impolitic Declarations Defied Reality

As discussed earlier, there were already plenty of odd things being promoted about Trump from everywhere. As the likely operation was executed and the declarations about the US were made, it all seemed too unnatural, too unusual, and stood out in a big way. The declarations made actually mimicked the tone of the most zealous and loyal elements of the Communist Movement and the Communist Party of China. Indeed, what Beijing has been declaring are such a extravagant deviations from what was already understood and had settled in worldwide about the origins of coronavirus. More than anything else, for the overwhelming majority of people who can across it, Beijing’s anomalous expression, that points to the US Army as the initiator of the crisis, was one more example of its perfidy. Among the more compassionate though, perhaps Beijing’s exertion about the US appeared more as a cry for help, having been subsumed by efforts to stave back and resolve the crisis they created for themselves. Perhaps for a few, Beijing’s decision to proffer such ideas actually garnered pity rather than disapproval. Multorum te etiam oculi et aures non sentientem, sicuti adhuc fecerunt, speculabuntur atque custodient. (Without your knowledge, the eyes and ears of many will see and watch you, as they already have.)

Due to human nature, immutable as it is, one would more likely expect to hear a vacuous claim concerning the US and the spread of coronavirus as an impolitic, off-color witticism, surely unacceptable, softly spoken as a blague during conversation around a tea trolley at a club, rib-tickling nonsense mumbled to amuse colleagues in the pantry or around the water cooler in an office, or shouted out in the locker room in a gymnasium or fitness center as a wisecrack to stoke a jovial atmosphere. Presumably, even the more infamous shock comedians, such a jib might be seen as potentially striking too close to the nerve right now and hardly be attempted on the comedy circuit, which is presently closed down, same as the other sites of congregation mentioned, due to coronavirus concerns. One might chalk up the declaration of such absolute nonsense about the US Army by China’s venerable Foreign Ministry as the second embarrassing episode that Beijing has had to face in a very short period of time.

The US team during the Opening Ceremonies of the 7th CISM Military World Games in Wuhan (above). Perhaps confusion in Beijing that led to the impolitic declaration about US service members visiting Wuhan may be rooted in a fundamental misunderstanding of how different the US military is from that of their authoritarian system. US military personnel cannot be ordered to potentially put themselves at risk by carrying a virus overseas rather than seek treatment, interact among his or her fellow US military athletes in transit and at the site of the competition, and potentially make them ill, all with the goal of passing the virus to the Chinese people. If the US had used a goodwill visit by its military personnel to Wuhan as a pretext to get an infected service member to China and launch a covert biological warfare attack, it could have been viewed as an act of war. One would think if Beijing truly believed the US used a Trojan Horse scheme to launch some form of biological warfare attack from Wuhan, the response from Beijing would have been far more severe than unsubstantiated declarations from their foreign ministry.

The Fallacy That a US Service Member Brought the Coronavirus to China

The US sent 17 teams with more than 280 athletes and other staff members to participate in the 7th CISM Military World Games in Wuhan. If one were to give consideration to whether the coronavirus virus was brought to inadvertently by a service member on the US military team, purely out of academic interest, several pertinent facts would arise that would well-refute the idea. They should not be overlooked. It is hard to imagine that any toned athlete anywhere, primed to successfully compete in an international competition would not notice that he or she was not up to par. They would most likely inform their trainer or coach and seek treatment in order to get back to snuff. If that were not possible, the best choice would be to step away from the competition. While this suggestion is frightfully out of court, one might suppose an athlete displaying symptoms of some illness, and wrongheadedly, and likely full of emotion, might insist upon participating in a competition. In such a case, his or her trainers, coach, and fellow athletes would undoubtedly to note and respond. They would all know that attempting to compete in any event while ill would be foolish. They would insist the athlete get a full medical check up. The athlete would certainly be removed from the roster of competitors and reminded that if one cannot perform at their best, there is no reason to compete. From these angles, it would hardly be the case that a service member who was infirmed would have travelled on the US military team to China. The same tact would likely be taken with regard to coaches, trainers, and the team’s other support staff. To go a step further, athletes who were members of the US team sent to Wuhan had to qualify among their fellow service members to compete. Coaches typically conduct qualifying competitions to see who will represent the US military in each event. The top qualifying competitors take the slots available in their events. However, a depth chart is usually made with their names as well as the names of those athletes who competed well but did not qualify given the number of slots available. If a service member who qualified to compete became ill or was unable to compete, the next best qualified service member on the chart would move up into the vacant slot. One of the unqualified athletes would suddenly be qualified to go to the competition. Perhaps the clever boots in Beijing who came up with the vacuous idea that one of the US military athletes went around Wuhan making everyone ill, likely never participated in any team sports or organized athletics and are unaware of the system that typically exists. Perhaps those who came up with the idea were hoping to prey on the ignorance of those for whom the information was targeted.

Perhaps confusion may be rooted in a fundamental misunderstanding of how different the US military is from that of their authoritarian system. Travelling with an illness is a bad idea under any circumstance. US military personnel cannot be ordered to potentially put themselves at risk by carrying a virus overseas rather than seek treatment, interact among his or her fellow US military athletes in transit and at the site of the competition and potentially make them ill, all with the goal of passing the virus to the Chinese. That would fall under the category of an illegal order in the US military.

To insinuate that the US, through a goodwill visit to China by military personnel to participate in international competition, sought to knowingly launch a potential, unprovoked biological warfare attack against China, is truly so beyond what is decent  that it shocks the conscience. This claim serves as evidence of how the paranoia carried over from the previous era can take its toll. In reality, if the US had used a goodwill visit by its military personnel to Wuhan as a pretext to get an infected service member to China and launch a covert biological warfare attack, it could have been seen as an act of war. Nothing was indicated in statements from US officials that there was any hostility toward China so strong that would cause the US to do anything of the kind. Nothing indicated that the US would even do anything so odious to any country. There were no threatening military movements ordered by Trump prior to the Wuhan games. The US and China were still trying to get each others assent on a Phase One trade agreement. One would think if Beijing truly believed the US used a Trojan Horse scheme in order to launch some form of biological warfare attack from Wuhan, the response from Beijing would have been far more severe than un substantiated declarations from their foreign ministry. Indeed, the response, if the claim were really believed in Beijing, could be characterized as extremely relaxed. Whether one might accept that Beijing’s declaration that the US Army brought the coronavirus to Wuhan was a simple expression of propaganda or the first part of a political warfare campaign, it seems almost certain that the claim was not thoroughly thought through. Again, as mentioned earlier, no evidence has been shown by any reliable epidemiologist worldwide that the coronavirus originated anywhere but China. Experts believe that the virus emerged from animals sold in a market in Wuhan.

Regarding the Racism and Xenophobia Claims

The argument that Trump’s use of the terms “Chinese coronavirus” and “Wuhan virus” is racist and xenophobic fallacious on its face. It must be acknowledged that questions were never before raised concerning the correctness of this long standing practice until this point. While it may have satisfied those already hostile to Trump, presenting such a flawed case to a global audience was a wasteful exertion. The argument that naming diseases, illnesses and viruses after the locations in which they originated is a long-established practice, nondiscriminatory, bias-free, and apolitical is quite convincing.

In a March 13, 2020 article in the Federalist entitled “17 Diseases Named After Places Or People”, it was demonstrated that the practice of naming diseases after their places or origin is actually centuries old. Consider the following: Guinea Worm was named in the 1600s by European explorers for the Guinea coast of West Africa; German Measles was named in the 18th century after the German doctors who first described it; Japanese Encephalitis was named in 1871 after its first case in Japan; Rocky Mountain Spotted Fever was named in 1896 after the mountain range spreading across western North America once first recognized first in Idaho; West Nile Virus was named in 1937 after being discovered in the West Nile District of Uganda; Omsk Hemorrhagic Fever was named in 1940s after its discovery in Omsk, Russia; Zika Fever was named in 1947 after its discovery in the Zika Forest in Uganda; Lyme Disease was named in 1970s after a large outbreak of the disease occurred in Lyme and Old Lyme, Connecticut; Ebola Hemorrhagic Fever was named in 1976 for the Ebola River in Zaire located in central Africa; and, Middle East Respiratory Syndrome (MERS) was named in 2012 after being reported in Saudi Arabia and all cases were linked to those who traveled to the Middle Eastern peninsula.

Was Beijing Attempting to Influence the 2020 US Presidential Election?

Pointing out what is obvious, a possible intention was to influence the 2024 US Presidential Election. Beijing may have been  convinced by its intelligence services, observations of US politics, and the US news media and writings and presentations by Trump’s other adversaries that was looked upon widely with disfavor in the US public. While seemingly tossing a sack of coals on the political fire with Beijing’s likely hope would be that its declarations of the US Army’s role in the spread of Coronavirus and raising issues of race and xenophobia over use of the terms Chinese Coronavirus and Wuhan virus, would stoke the political fires in the US by providing Trump’s Democrat political opponents with one more figurative box of ammo to use against him.

Chinese intelligence services may pride themselves in having what it believes to be considerable expertise on the US affairs, it surely is not up to snuff when it comes to understanding US politics. Few foreign intelligence services are. Clearly, Beijing completely missed the mark in appraising Trump’s political opponents in the 2020 Election Campaign. They have contributed their respective fair share of propoganda about Trump to the mix, too, primarily by promoting falsehoods about his record. One significant fact that Beijing should have noticed immediately was that both former Vice President Joe Biden and Senator Bernie Sanders were beset with considerable problems of their own that would have hardly allowed them to turn toward their attention to whatever nonsense was being put out by China. The frontrunner so far based on state primary results, Biden, was very noticeably displaying signs of cognitive impairment even before wild accusations about the US Army, racism, and xenophobia were made from Beijing. More importantly, the coronavirus epidemic in the US has essentially put their campaigns at a standstill.

Unless greatcharlie is terribly mistaken, Chinese intelligence analytical cells are presumably managed by loyal members of the Communist Party of China. What they have plenty of ostensibly is revolutionary zeal and an immense desire to please their superiors. Fervent dedication to their own system, and focus on their own society,  and being most familiar with politically skewed interpretations particularly of Western capitalist societies would presumably leave them with nothing reality based upon which they could find their interpretations and conclusions.  They very likely lacked points of reference within their own political systems which resembled what was happening in the US. What can typically be the case among bigoted, inflexible, often bumptious individuals who are Hell bent on following the party line, is the display of unwillingness to accept open-minded analyses that may very well have correctly contradicted their understanding of matters.

Given its compatibility with the thinking of many in Beijing, from what was collected and extrapolated about the US political scene regarding the 2020 US Presidential Election, primacy was likely given somewhat popular, yet incredibly hostile commentaries about Trump propagated by his adversaries. Beijing also likely enjoyed data collected from social media provided by emotional individuals across the political spectrum, political activists, and fringe elements who simply attack and lack boundaries. There is the real possibility that very little of anything collected in Beijing reflected thinking within the US public. Such information could only lead to the development of incorrect interpretations of US political activity. Using those incorrect interpretations in support of a political warfare operation would ensure that its failure from the start.

Trump (center) in the White House Press Room. What likely was a frightful miscalculation of so-called experts on the US in Beijing was the failure to foresee that most in the US public would appreciate Trump’s performance during the coronavirus epidemic and find that he proved himself most Presidential. The overwhelming majority in the US public knows very well that the coronavirus pandemic was caused through no fault of Trump, but by those outside the US who have sought to distort reality with outright lies about the pandemic’s origins. Polls support the argument that the US public well-appreciates what Trump is doing. He has been seen everyday with the White House’s Coronavirus Task Force, state governors, medical professionals, leaders of all industries creating a synergistic effect, bringing the full power of the US to bear on the problem to reach a speedy and successful resolution.

Reality Check for Beijing on US Public Opinion

What likely was a frightful miscalculation of so-called experts on the US in Beijing was the failure to foresee that most in the US public would appreciate Trump’s performance during the coronavirus epidemic and find that he proved himself most Presidential. A great many in their number would even begin to adore him. The rapid spread of the coronavirus beyond China’s borders surprised and shocked many in the health care professionals in the US. A few US infectious disease experts got permission to go into China to better understand the problem. Trump quickly developed a good sense for what was happening based on information he was provided. He did not get off to a slow start protecting the US public. Rather, as it is his strong suit, he began to tackle the coronavirus crisis by immediately cracking on to the heart of matter. He is observed working hard daily by the US public, trying to to find answers. He has been seen everyday with the White House’s Coronavirus Task Force, state governors, medical professionals, leaders of all industries creating a synergistic effect, bringing the full power of the US to bear on the problem to reach a speedy and successful resolution. In all areas, public-private partnerships have been forged. Trump has displayed a superb possession of will and ideas. He has developed a comprehensive plan of attack against the coronavirus that will defeat it, safeguard the US economy, and protect the well-being of the US public. In addition to asking the US public to stay out of harm’s way, Trump has asked them to stand calm and firm and united in this time of trial. What he has done marvellously is keep the US public calm has been to keep the people informed. He wants them to rest assured that they are getting their information for the highest sources. He sought to ensure despite disruptive voices of doom and destruction, admonition and contempt of his adversaries, he has made certain that the truth is out there for them to know. Trump has referred to himself as a Wartime President engaged in battle with what he characterized as the “hidden enemy.”

The overwhelming majority in the US public knows very well that the coronavirus pandemic was caused through no fault of Trump, but by those outside the US who now seek to distort reality with outright lies about the pandemic’s origins. Data supports the argument that the US public well-appreciates what Trump is doing. In Harris’ national surveys conducted March 17, 2020 and March 18, 2020, the US public’s approval of Trump’s management of the coronavirus crisis rose to 56%. His handling of foreign affairs rose to 52% in the same timeframe. Overall approval of Trump was 55%. Harris Insights and Analytics surveyed 2,050 American adults online in two waves on March 14, 2020 and March 15, 2020 and later on March 17, 2020 and March 18, 2020. An ABC News/Ipsos poll released March 20, 2020 reported that 55% of respondents approved of Trump’s management of the public health crisis, while 43 percent disapprove. The latest figures represent a boost in the president’s rating from the previous iteration of the survey, published one week ago, which showed only 43 percent approval for Trump and 54 percent disapproval. According to Gallup the US public has given Trump positive reviews for his response to the novel coronavirus pandemic, with 60% approving and 38% disapproving. By political affiloation, 94% of Republicans, 60% of independents and 27% of Democrats approve of his response. In fact, according to Gallup, Trump’s overall approval rating by the US public is 49%! Line graph. 49% of Americans approve of the job President Trump is doing, up from 44% in early March. On the day that the crisis finally subsides, Trump will very likely stand about 8 feet tall in the minds of the US public.

If the political warfare attack was a trial balloon, the intent would likely have been to determine whether Beijing could have an impact on perceptions in the US public in a piecemeal way, much as water dripping in a stone and eventually breaking through it making its mark. If Beijing concludes that its venture was successful, more virulent efforts could be expected. If an appropriate assessment were made just on what was observed so far, it would be that little was really achieved by the operation. Pressing forward on the matter would only be a wasted effort. If it was a full fledged effort, again the results should have shown Beijing that the impact of such disinformation wanted small. The best course of action would be to count their losses, cut their losses, and close the book on an operation that was ill-fated from the get-go.

Among those who constructed the plan of attack for Beijing’s political warfare tact there are unlikely any flashes of merriment at the moment. Undoubtedly, someone fairly senior in the mix in Beijing who fancies miracles managed to get the  whole cabaret off the ground. The failed political warfare attack was a stumble of the type that would likely stir some young go-getters to have designs on his spot.

Trump and Xi

Trump rarely refrains from stating publicly that he considers Chinese President Xi Jinping a friend. Trump’s political adversaries disparage and mock him for stating this claiming it was further evidence of his alleged affinity for dictators. Looking at their friendship in an abbreviated way, one finds that Trump and Xi are both solid experienced men, who wield significant power daily, under tremendous pressures of leadership, yet still manage to make the right decisions. Although greatcharlie has recognized the following intriguing quality of Trump in previous posts, it could be stated confidently that both men seem to have been born with an innate sense for leading very large organizations, in this case the US and Chinese governments respectively, with a dominant sense and intuition of what is happening with all of their near infinite moving parts at any given time. Often such abilities go unnoticed much as the fine strokes of a master painters brush. The two men were raised in two different cultures and two different systems of government. Those differences at certain points are considerable. Yet, there is a respect between them and as important, a willingness by both to treat one another as they would want to be treated. That practice can even be seen when the two leaders are together publicly.

Key elements of their interactions have been honesty, frankness, and wisdom. Honesty is ostensibly present when both leaders speak for they “tell it like it is” at least from each other’s perspective, and use each other’s respective understanding of an issue to construct a solution with which both can be satisfied. Through frankness, both make it clear that they are interested first and foremost in what is best for their countries and national interests first, and view each other as competitors in the world, but not enemies. With wisdom, while being frank with each other, both are able and willing to listen and accept explanations while speaking in businesslike terms about situations knowing both countries are far better off when they can reach solutions, and that allows for good, congenial communications and the ability to understand each other’s opinions and positions. To that extent, Trump and Xi have really provided the path upon which that advancement of US-China relations can travel. In difficult times, their relationship has served as the thin line between chaos and order.

Xi knew that he would need to come figuratively knocking at Trump’s door with une explication très élégant before the situation between the two countries got to a full gallop. He also likely recognized that it was his country overstepped certain boundaries. As aforementioned, he likely knew before anyone else in Beijing that the political warfare attack, which greatcharlie has presumed was launched, could not possibly succeed. Thus, when he called Trump on March 26, 2020, he did so from a less than favorable position. Yet, at long last Xi was able to say a few words of his own concerning the US. Given the circumstances, they certainly should not be viewed as anodyne statements.

Reportedly, during the call, Xi somewhat side-stepped the matter of the statements that were the reason for US concern. He primarily presented Trump with a message of unity in the war against the coronavirus. China’s official Xinhua News Agency made no mention of the previous spurious claims that the US spread the coronavirus from Wuhan or that use of certain terms were racist or xenophobic. No US news media outlets picked up on any exchange of that kind either. According to Xinhua, Xi told Trump that relations between the two sides were at a “critical moment” and vowed to cooperate to defeat the deadly illness. Reportedly, Xi continued: “Both sides will benefit if we cooperate, both will lose if we fight each other.” Xinhua further quoted Xi as saying: “Cooperation is the only correct choice. I hope the U.S side could take real actions. The two sides should work together to enhance cooperation fighting the virus and develop non-confrontational” relations.” Xi also reportedly expressed concern about the outbreak in the U.S., which has surged ahead of China’s number of confirmed cases and turned New York City into a global epicenter. On that matter, Xi said, “I am very worried about the outbreak in the U.S., and I’ve noticed the series of measures being taken by the U.S. president.” He additionally remarked: “Chinese people sincerely hope the outbreak can be contained very soon.”

Surely, Trump managed to express his feelings to Xi during the telephone conversation. When he presented his impressions of the call directly through Twiiter. Through @realDonaldTrump on March 27, 2020 at 1:19AM , he graciously stated: “Just finished a very good conversation with President Xi of China. Discussed in great detail the CoronaVirus that is ravaging large parts of our Planet,” Trump tweeted Friday. “China has been through much & has developed a strong understanding of the Virus. We are working closely together. Much respect!” Trump did not use the telephone call as an opportunity to pounce on Xi. Perchance Xi, getting to know Trump as he has, intuited that he would not. To that extent, having such a sense about Trump would have likely fortified Xi when he made the decision to make the call. Xi likely believed Trump would not go about it the wrong way and take the high road. Trump did. Assurément, Trump was not simply going through the motions of talking with Xi. He doubtlessly let him know that he expected results from their talk, measurable ones. Trump, after all, spoke from a clear position of moral authority given all that had transpired, for as Milton wrote in Areopagitica (1644): “For truth is strong next to the Almighty. She needs no policies or stratagems or licensings to make her victorious. These are the shifts and the defences that error uses against her power.”

From left to fight) Peng Liyuan, Xi, Trump, and Melanie Trump at Mar-a-Lago in April 2017. Looking at both Trump and Xi, both are solid experienced men who wield significant power daily under tremendous pressures of leadership. Both men seem to have been born with an innate sense for leading very large organizations, in this case the US and Chinese governments respectively, with a dominant sense and intuition of what is happening with all of their near infinite moving parts at any given time. Often such abilities go unnoticed much as the fine strokes of a master painters brush. The two men were raised in two different cultures and two different systems of government. Those differences at certain points are considerable. Yet, there is a respect between them and as important, a willingness by both to treat one another as they would want to be treated. That practice can even be seen when the two leaders are together publicly. They are competitors, but they are also friends.

The Way Forward

Opinionis enim commenta delet dies, naturae judicia confirmat. (For time destroys the fictions of error and opinion, while it confirms the determination of nature and of truth.) Nothing discussed here should sound extravagant. Beijing has proffered wild ideas about the US beginning with the farce about the US Army’s role in the spread of the coronavirus. It does appear that was very likely part of Beijing’s effort to score a political warfare victory. The political warfare attack was method, wrongfully implemented, poorly executed, and absolutely unnecessary. It is all sad and unfortunate. The entire industrialized world is presently caught up with defeating this virus pandemic and doing their best. It is unfortunate that your country suffered first and dearly over it, but despite embarrassment or disappointment, even shame that may cause, that is a reality. That, however, should not be the immediate focus. What the world does not need is the distraction of attacks to deflect culpability. It does not solve the crisis, does not demonstrate goodwill, and does not display an appropriate use of China’s national power along the lines of excellence. If anything, the political warfare attack has resulted in a loss of political currency in the world, which ironically is what China sought to protect with the effort. Lies do not last with age. The truth is usually discovered.

China is a great nation, a nation of great achievements, and it certainly has ambitions to accomplish even greater things. However, at the present, with the exception of Xi’s telephone call to Trump, it is not acting as such. Hopefully, his words have set the true course for the Chinese government from this point on. Indeed, rather than focusing on what has occurred emotionally and ascribing fault, and igniting discourse over a farce, China’s focus should be finding solutions. That would greatly impress the world. When a solution is found, that will garner far more praise than reproach for fault. If establishing a positive image for itself has become some immutable cause, China might show the world just how hard at work it is in finding that solution as a good member of the community of nations. Again, achievements made in that direction will shape the image of China not political warfare. Deus hæc fortasse benigna reducet in sedem vice. (Perhaps God by some gracious change, will restore things to their proper place.)