The Continued Ascent of Dong Jingwei: After  Succeeding at MSS, His Sights Are Now Set on Opponents in Hong Kong

Dong Jingwei (above). Without a doubt, Hong Kong and its future are issues of great concern for People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping and the Party leadership in general. Likely to Xi’s satisfaction, Dong Jingwei is now in firm control of issues concerning protests and conspiracy against the regime and foreign sponsored efforts to orchestrate and sustain resistance in the city. Having pondered Dong’s posting and its responsibilities, greatcharlie has sought in this essay to dive a bit deeper into Dong’s background to better understand him and to meditate on his likely plans to get a handle on Hong Kong. Interestingly, in the photo image above provided by the Guangxi People’s Congress, conspicuously displayed on center of Dong’s jacket (above) is his official name tag. Readers may note, Dong is the only attendee visible in the photo that displayed both a table placard and a name tag to identify himself. While he apparently saw the need for “maximum” identification to assure recognition, Dong at the time of a photo served in the fairly well-known and powerful positions of Vice Minister of the Ministry of State Security (MSS) and the Chief of MSS Counterintelligence.

On July 18, 2023, the People’s Republic of China Ministry of Human Resources and Social Security announced Dong Jingwei was appointed as the central government’s commissioner for the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region. Dong succeeded Zheng Yanxiong was appointed director of the Liaison Office of the of the Central People’s Government in the Hong Kong Special Administrative Region in January 2023. The Office for Safeguarding National Security was established in 2020 just months after China imposed a national security law in the wake of extended pro-democracy and anti-People’s Republic of China government protests that began in 2019. Protests were attended reportedly by as many as half a million people, In 2022, a HK$508 million ($65 million) headquarters building was constructed in Hong Kong for the organization. Zheng was the first director and.a founding member of Dong’s new office. John Lee Ka-chiu was installed as the Chief Executive of Hong Kong Special Administrative Region on July 1, 2022. Upon the announcement of Dong’s appointment, Lee welcomed him in a statement saying Hong Kong “will continue to work and communicate closely” with the Office for Safeguarding National Security as it seeks to fully implement the 2020 law.

Concerning the 2020 national security law, following the Hong Kong protests from 2019 to 2020, the People’s Republic of China imposed it to enable the prosecution of four major crimes, stamping out dissent. Zheng, at that time, pursued dissenters with vigor and was consequently sanctioned by the US for his activities. Of equal concern was the need to eliminate external influences in the form of foreign intelligence services. Beijing reported with conviction that they were entangled in Hong Kong’s protest activities,  providing both funding and direction to pro-democracy and anti-government activists. His extensive background at Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS and working alongside Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (the Ministry of Public Security of the People’s Republic of China) or MPS, in part gave Dong a leg up for selection to the commissioner’s job.  MSS is essentially the People’s Republic of China’s equivalent to the US Central Intelligence Agency (CIA) and is responsible for foreign intelligence worldwide and counterintelligence both abroad and at home. MSS counterintelligence is directly aimed at the infiltration of foreign intelligence and counterintelligence services and the neutralization of their operations. MPS is a sort of dual law enforcement and intelligence service under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS and MPS share the counterintelligence mission for the People’s Republic of China. As national security bureaucracies, both organizations are organized under the State Council of the People’s Republic of China Central Committee of the Communist Party of China, but both have settled lines to the highest realms of power into the Party. Very likely, it was Dong’s successes against foreign intelligence networks and operatives on the mainland in particular as the Chief of MSS Counterintelligence that also caused him to stand out of the best choice.

Interestingly, official sources on Dong’s appointment were especially frugal with their information about his intelligence background, never mentioning his very accomplished previous post as the Chief of MSS Counterintelligence. At the time of the announcement of Dong’s appointment, a representative for the Hong Kong government did not immediately respond to a request for comment on Dong’s appointment, including his past experiences at MSS. The China Daily only went as far to state Dong was the director of the political department of the MSS from 2017 to 2018, according to a resume published on the website of the China Law Society, of which he is vice president. It added the he previously served as director of the Hebei Provincial Department of State Security from 2006 to 2017. Omne ignotem pro magnifico. (Everything unknown is magnificent.) 

Without a doubt, Hong Kong and its future are issues of great concern for People’s Republic of China President and Communist Party of China Secretary Xi Jinping and the Communist Party of China’s leadership in general. To what is likely Xi’s satisfaction, Dong is now handling of issues in the city concerning protests and conspiracy against the regime and foreign sponsored efforts to orchestrate and sustain such resistance. In this essay, greatcharlie has sought in this essay to dive a bit deeper into Dong’s background, to include apparent safeguards taken for his security and what may have been external efforts against him, and what he may have in mind for quelling the threat posed by the People’s Republic of China’s opponents’ in Hong Kong. Thoughts are offered not only on decisions he has likely made but also on decisions he may likely make in the immediate future to shape events. Dong may have reason to believe the national security situation in Hong Kong may soon turn considerably in the Communist Party of China’s favor. This essay is relatively brief and could hardly have squeezed issues dry so to speak and put one in the full picture of regarding Dong’s thinking. However, the hope is that greatcharlie’s ideas and insights may lead readers, hopefully to include some practitioners in the field of foreign and national security policy analysis and decisionmaking, to develop new lines of thought on how to proceed concerning this pressing issue. Luce sunt clariora tua concilia omnia. (All your advice is clearer than the light.)

Before July 2021, this photo image of Dong Jingwei (above) was accepted by greatcharlie as authentic. As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. Dong is a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises. In attempting to ascribe certain traits to Dong given his role at MSS, those considered by greatcharlie may appear to be mere abstractions. However, among the few traits listed should be a reliable intuition, further honed when at MSS he coped with challenges posed by foreign opponents. It may have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions of managers within the intelligence services of opponents.

Things To Know about Dong

As reported by greatcharlie in its June 30, 2021 post entitled, “The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax”, Dong was born on November 18, 1965. At the time of this writing, he is 59 years old. In the People’s Republic of China, it would be of some significance to note that he is of Han nationality. As for his studies, he earned a master of science degree. The only publicly reported member of Dong’s family is his daughter, Yang–also known as Dong HuaHua on social media, She is the ex-wife of Jiang Fan, who at the time was an Alibaba executive, heading the company’s e-commerce platforms, Tmall and Taobao.

Suffice it to say Dong is a member of the Communist Party of China. Highlights of his career include service as the Secretary of the Party Committee and Director of the State Security Department of Hebei Province from 2006 to 2017. He served as Director of the Pokitical Department of the Ministry of State Security from 2017 to 2018. He eventually became a Member of the Party Committee and Vice Minister of the Ministry of State Security and the Chief of MSS Counterintelligence. It was noted in the July 24, 2015 edition of Intelligence Online that Dong’s direction of the State Security Department in Guo’anbu in the Hebei Province was significant for him as that province has reportedly produced many of Xi’s “securocrats.” Loyalty to superiors, age, and regional background apparently put him in good standing with senior party officials under Xi. One could probably safely mention reliability and discretion. By 2015, Dong reportedly became part of the “Xi Jinping Clique”, one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles and accolades provided to Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

Further concerning the MSS, as briefly noted earlier, it is an intelligence service responsible for foreign intelligence, counterintelligence, and internal security as well. To go a bit deeper, its impact stems mainly from providing consumers in Beijing to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, and ministers and senior executives of appropriate ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their foreign and national security policy decisions. The People’s Republic of China’s intelligence services and law enforcement organizations have had considerable success in destroying the networks and intercepting the intelligence officers and operatives of foreign intelligence services operating in their country. Dong surely would had a considerable role in the interception and neutralization of those foreign an local actors. Whatever may have been put in place to ensure those foreign intelligence services networks would not be rejuvenated or replaced in some form has successfully mitigated such efforts. Dong surely had a considerable role in creating such a defense to foreign opponents aims and efforts as well. It would stand to reason that whatever Dong organized while at MSS to hold back the People’s Republic of China’s opponents surely could have been recognized by results as being strong enough, sustainable enough, to allow him to advance to his new position in Hong Kong.

Very likely from the view of the Communist Party of China’s leadership, Dong was much deserving of promotion and greater authority, and should not be held down indefinitely in the MSS as counterintelligence chief. Such has not been an obvious choice for national authorities in many countries to make about an individuals such as Dong. In foreign and national security policy bureaucracies in many countries, individuals such as Dong have been kept in place when they have exhibited great skill and seemingly unique capabilities in their jobs. For instance, Alexander Bortnikov has stood as Director of Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB since 2008. During the Cold War, CIA executive, James Angleton held his position as chief of counterintelligence from 1954 to 1975. Further, in the broader sense of counterintelligence as being a element of law enforcement, J. Edgar Hoover led the US Federal Bureau of Investigation from 1924 until 1972.

Dong achieved great success at MSS primarily under the leadersip of its director, Chen Winqing. Apparently, they had an good working relationship  Dong assured for Chen Winqing that MSS would have solid one-two punch against opponents via foreign espionage and counterintelligence. However, through a decision made at the 20th National Congress of the Communist Party of China, on October 28, 2022, Chen Winqing was named Party Secretary of the Central Political and Legal Affairs Commission, overseeing national security and intelligence. He was additionally made a member of the Communist Party of China’s 24-member Politburo. On October 30, 2022, Chen Yixin was officially appointed by the Standing Committee of the National People’s Congress as his successor at MSS.

The Central Political and Legal Affairs Commission is the Communist Party of China’s highest security body and oversees all legal enforcement agencies, including the police force. As it concerned his preceding service at MSS with Dong at his side, Chen Winqing’s 2022 appointment more importantly placed him in charge of the People’s Republic of China’s national security and intelligence systems. It was only a few months later did Dong receive his opportunity to advance to the national security position in Hong Kong.

It is unclear why Dong did not simply receive to the top job as Minister of the MSS. However, it seems having Dong simply replace Chen Winqing was not likely viewed as the answer at any point. It was likely accepted by decisionmakers that it would be best to promote Dong to a duty of great importance and requiring immediate results that few could handle successfully. The position would require him to immerse himself on critical, exigent, and defined issues and not “just manage” MSS with its broad purview, although he most likely could have performed the top job there well, too. To that extent, Communist Party of China authorities, to include his former chief, Chen Winqing, obviously felt the best choice was to appoint a counterintelligence manager, a spymaster, a blood hound for a spycatcher as Dong to Hong Kong.

Notably, Dong’s appointment was confirmed only after a revamping of the Hong Kong and Macau Affairs Office (HKMAO). The HKMAO is an administrative organization  of the Central Committee of the Communist Party of China and the The State Council of the People’s Republic of China. Dong’s organization with its security role sits under the HKMAO.

This photo image of Dong Jingwei (above) was posted on Wikipedia website at the time greatcharlie wrote its June 2021 essay about his alleged defection. It has since been removed. The public in the People’s Republic of China and the world will never get to see a true photo image of Dong. Perchance the fact that there are discrepancies in those photo images leaves room open for the supposition that the latest official image popularly displayed in the local newsmedia in Hong Kong and beyond may indicate a desire by Beijing authorities or by the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region to furnish a false clue as to the spymaster’s true identity. For whatever reason, the use of varied photo images may be a national security requirement set for Dong by Chen Winqing and the Central Political and Legal Affairs Commission. It also ostensibly gives the impression that in official foreign and national security policy circles in Beijing and Hong Kong, and particularly in the Communist Party of China, that Dong holds a place of importance to them which surpasses that of any ordinary civil servant posted to the region. To gnaw just a bit further, the use of alternative images of Dong may tindicate the use of decoys is a more commonly used practice by the People’s Republic of China’s foreign intelligence and counterintelligence services than anyone outside of the country might have imagined. Surely, the sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. Mentioned in theis essay in the use of an alias by Sun Qingye, one of Dong’s senior deputies in Hong Kong.

The Photo Image Discrepancy

As the two images have far more similar features of the official than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. To support greatcharlie’s discussion on the discrepancies in the two popular photo images of Dong, two are used, and discussed  briefly within captions of this post. The discrepancies in the two photo images was covered in somewhat ample detail in greatcharlie’s July 15, 2021 post entitled, “”Commentary: Will the Real Dong Jingwei Please Stand Up?: Comparing Features of Popular Images of People’s Republic of China’s MSS Vice Minister”. However, it is not greatcharlie’s intention to re-visit the discussion on the issue of the variance in Dong’s images here

There remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case, then in the possible effort to conceal his identity, Dong has done the thing completely. The two photographs focused upon here will continue to be published perhaps until another plausible image, or perchance another two or more, of Dong surface at some time and via some source of Beijing’s choosing.

As the two images have far more similar features than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. Of the two different photo images, one may actually be Dong.

Suffice it to say as discussed in some greater detail in greatcharlie’s July 15, 2021 post, the idea of a director, senior executive, or key operations manager of an intelligence service taking steps to conceal his or her identity would not be unique in the annals of secret intelligence. Turning to a handful of examples, in greatcharlie’s November 13, 2019 post entitled, “Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997),” it was explained that Markus Wolf, chief of the foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA of the erstwhile Deutsch Demokratische Republik (German Democratic Republic) or GDR, lived a life in relative obscurity, brilliantly concealing his presence and the footprint of his organization as both operated against the West. His memoir’s title, Man without a Face, was a direct reference to the fact that at one point, Western intelligence services only had a blurred photograph of Wolf while he attended the Nuremberg Trials from which elements within the CIA managed to identify him in 1959. Unable to collect an up-to-date photograph from which to identify Wolf afterward, for a long-time he was referred to among Western intelligence services as the “man without a face.” As the story goes, only after a GDR defector, Werner Stiller, identified Wolf in a photograph in 1979 for the counterintelligence element of West Germany’s Bundesamt für Verfassungsschutz (Office for the Protection of the Constitution) or BfV did that change. The photograph of Wolf was captured by Säpo, Sweden’s National Security Service, during a visit he made with his wife to Stockholm in 1978.

At the time Stephen Dorril wrote his authoritative book, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000), Richard Dearlove, then head of the United Kingdom’s Secret Intelligence Service–colloquially known as M16–was virtually unknown. A contemporary photograph was not published in the newsmedia. According to a BBC report, when Stella Rimington in 1992 was named the first female chief of the United Kingdom’s Security Service–known colloquially as MI5–her neighbors finally discovered what she did. Even her children learned of true occupation for the first time. No official photographs accompanied her name at that time. However, later, official photos of her were provided after photographers managed to take what was described as “a very blurry picture of her out shopping.” Petit rusé, petit malin!

Interesting also is the fact that Sun Qingye, a deputy head of the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region, has a background in MSS. More directly, he served in the China International Cultural Exchange Center. When he assume his post in Hong Kong, in July 2020, Sun used the alias “Sun Winqing”.

The public of the People’s Republic of China and the world may never get to see a true photo image of Dong. Perchance the fact that there are discrepancies in those photo images leaves room open for the supposition that the latest official image popularly displayed in the local newsmedia in Hong Kong and beyond may indicate a desire by Beijing authorities or by the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region to furnish a false clue as to the spymaster’s true identity. For whatever reason, the use of varied photo images may be a national security requirement set for Dong by Chen Winqing and the Central Political and Legal Affairs Commission. It also ostensibly gives the impression that in official foreign and national security policy circles in Beijing and Hong Kong, and particularly in the Communist Party of China, that Dong holds a special place for them which surpasses that of any ordinary civil servant posted to the region. To gnaw just a bit further, the use of alternative images of Dong may tindicate the use of decoys is a more commonly used practice by the People’s Republic of China’s foreign intelligence and counterintelligence services than anyone outside of the country might have imagined. Surely, the sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. Recall the aforementioned note on the use of an alias by Sun Qingye, one of Dong’s senior deputies in Hong Kong.

Admittedly, greatcharlie lacks any information that would allow it to judge which photograph holds Dong’s true image. As promised, greatcharlie has only sought to parse out a few possibilities here. What is presented are simply perceptions based on observations made of less than a handful of photographs. Certainly in China, there are more than a few people in the MSS, MPS, the State Council, and the Communist Party of China who know exactly what Dong looks like and which of the two photographs, if either, depicts him. It may very well be that the causaliy for the use of mixed images of Dong is based on an effort to increase security. However, just as greatcharlie, a nonpracticioner, “amateur sleuthhound”–as one reader sardonically  referred to the editor–has examined two reported images of Dong in photographs, Expert, professional analysts in US intelligence services and those of foreign intelligence services allied with the US have doubtlessly examined all of the photographs available that purportedly include Dong using Artificial Intelligence and other advanced technologies, and have reached to their own conclusions. Thus, despite any possible efforts to conceal Dong’s identity, they likely have a fair idea of how he looks, too!

In the end, Dong’s work product will tell volumes about the individual and indicate his presence. Certainly, even if business as usual to date is the best foreign intelligence services may have offer to retain a handle on Hong Kong, with Dong on the beat, they will have to find answers where currently there may be none to simply maintain their grip, big or small, on the situation.

The Defection Rumor

Rumors of the alleged defection of Dong Jingwei, a vice minister of MSS were the subject of intense discussion worldwide, but especially in the US newsmedia and social media in June 2021. The singular story was previously discussed in greatcharlie’s June 30, 2021 post entitled, “The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax”. Assuredly, as with its July 15, 2021 post regarding Dong’s photo images, there is no intention by greatcharlie to simply rehash in detail territory that it has well-trampled. The aim is to explore a bit deeper for readers.

Allegedly, Dong fled the People’s Republic of China in February 2021 and handed himself over to US intelligence officials. Dong would have been one of the highest-ranking officers from People’s Republic of China’s Intelligence Community, and the Chinese government in general ever to defect to the US. Yet, alas, the rumored defection never occurred.

As reasoned by greatcharlie in its June 2021 post, the nature of the man or woman who would be able to serve as the chief of MSS counterintelligence, it indicated that is was hard to form a mental picture of Dong and how he of all people could had defected to the US, with his daughter in-tow no less. It is harder to envision who among those with any knowledge of the People’s Republic of China government and the national security apparatus would believe, Dong would ever consider defecting to the US no matter what the circumstances may be within the Communist Party of China or in his personal life. One could imagine Dong would be a deadender, sticking with the Party and his country until the rattle. It is also difficult to imagine what individual, organization, or professional organization gave the rumor its wings. Equally hard is understanding how those who ignited the rumor of Dong’s defection intended to benefit from its formulation and promotion. There was always the possibility–though there are absolutely zero newsmedia reports anywhere that suggested some proceeding mental health episode had befallen him–that Dong hypothetically could have been overwhelmed by some cacoethes. Yet again, the defection never happened.

There may be something to learn concerning how such a bold lie took public form. Among those who reported on the defection, there was general acceptance of the sequence of events. The defection scheme as laid out was indeed mad-capped. Dong allegedly defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. Dong supposedly provided the US government with information about the Wuhan Institute of Virology that allegedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. According to Han Lianchao, a former People’s Republic of China Ministry of Foreign Affairs official who defected in the wake of the Tiananmen Square massacre, Dong’s defection was raised by then Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and then People’s Republic of China Foreign Minister Wang Yi at the US-China Summit in Anchorage, Alaska in March 2021. On June 16, 2021, Han, citing an anonymous source, alleged that in Anchorage, Yang and Wang demanded that the US return Dong to China, but US Secretary of State Anthony Blinken refused. Subsequent reports, coupled with analyses by China specialists continued as Dong’s precise whereabouts remained unknown. Speculation had even reached Chinese social media threads after Dong had not been seen or photographed for several weeks.

Inferred from the odd choice to promote newsmedia stories of a defection was the potential confusion and chaos that might have been created in the minds of MSS, MPS, and People’s Libération Army’s Intelligence Bureau officers operating in the US and in the confines oF US interests overseas. The implications of such a breach in security would have been enormous. Information mined from such a highly positioned executive and director of MSS through interview, and potentially coercive interrogation, could result in the identification of officers, managers and their operatives, the exposing of netwirks, and collective information on sensitive operations conducted in the past and being performed at the moment

Rather than having a deletorious effect on the psyche of such officers, as well as their operations, the move uncovered the fact that they would hardly shrink at the last. In the worst cases scenario for the People’s Republic of China, Dong would have likely been quickly replaced under such circumstances. They as intelligence officers had accepte# the risk that there could the unexpected, things could go terribly wrong in the field. They had to prepare themselves for before travelling to the US or elsewhere.

Nothing about the tricky step would indicate a path upward to strengthen counterintelligence efforts against the People’s Republic of China’s espionage in the US. The People’s Republic of China’s Intelligence services have been steady in the approach to their work. Conceivably, the dismal failure of the suspected psychological operation would embolden if not the People’s Republic of China, but other foreign intelligence services to take bolder steps the Breach US security and ignite recruitment and espionage operations of audacity and  of an extent never considered in the past elsewhere.

Within the foreign and national security bureaucracies in Beijing, the assessment may likely have been that finding itself bereft of ideas, the choice was made by some foreign intelligence service or counterintelligence service to use a gimmick, a deception, a dangle if any specific response or individual were to be caught in a trap. It was likely assessed that the source was a Western counterintelligence service, perhaps one in Washington. 

As a friendly suggestion from a humble observer, it might be best for foreign counterintelligence services to refrain from engaging in such “poorly calculated” and “poorly calibrated” disinformation operations, if one of them was indeed involved in the Dong Jingwei defection hoax. Such action would appear to have the effect of emboldening People’s Republic of China intelligence officers operating overseas. If foreign counterintelligence services might insist upon adding to the chronicle of wasted time, perhaps one of them could send a large, ultra-high altitude balloon over the People’s Republic of China. Surely, it would mimic Beijing’s own actions throughout January and February of 2023. Still, one could imagine that a balloon as such, blithely passing over the country, would at least garner the attention of, and some discernible reaction from, a few officials of the security services there. (It remains difficult for greatcharlie to understand why the People’s Republic of China’s high-altitude balloons were not colored red if not to represent the Communist Movement then for artistic reasons: “Le Ballon Rouge” (1956). In leaving the balloons colorless, perhaps the aim was once again deception. Ostensibly, they could have been any country’s big balloons.) Einen Vogel haben!

This photo image of Dong Jingwei was posted on Twitter on June 16, 2021 by the US based, Chinese pro-democracy activist, Han Lianchao. In the tweet Han discusses how he came upon a rumor from an associate that Dong had defected to the US. If readers could pardon greatcharlie’s frankness, and not to disparage Han’s efforts, but as the rumor in the tweet was false, perhaps the photo that accompanied the tweet was a false image of Dong, too! In the rather diminutive space of Hong Kong–relative to mainland, Dong may be able to once and for all destroy all inroads made by foreign intelligence services. It will be more than a chess piece battle. Dong’s hope appears to be obviating all future possibilities for funding, providing information, and directing protest actions as the governments in Hong Kong and Beijing suggest were organized in 2019 and 2020. Lessons learned in successfully destroying foreign intelligence networks in mainland China will very likely serve as the basis to develop new and far more effective and  efficient tactics, techniques, procedures, and methods best suited for Hong Kong. Successful work by Dong could potentially improve the chances for the Communist Party of China to bring Hong Kong more peacefully back into its fold earlier than it might have envisioned.

Dong as a Threat to Activists and Foreign Intelligence Service Secreted in Hong Kong

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. Dong is a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

In attempting to ascribe certain traits to Dong given his role at MSS, some considered by greatcharlie may appear to be mere abstractions. Among the traits it feels should be listed is a reliable intuition. His intuition was surely exercised when at MSS he handled challenging problems posed by foreign opponents. It may very well have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions of managers within the intelligence services of opponents. Perchance the same trait likely assisted Dong in successfully navigating to the top rung of the People’s Republic of China’s national security apparatus and to perform well at the side of leaders of the Communist Party of China.

Unt desint vires tamen est laudanda. (Even if it is beyond one’s power, the will [to try] is worthy of praise.) If foreign intelligence services are doing their jobs well in Hong Kong, it is almost assured that intelligence officers, their operatives and informants, covert sites, and clandestine lines of communication are well-ensconced in the city. Certainly from the Communist Party of China’s perspective, all foreign intelligence operations in the city are ready to be cracked. As of this writing, Dong has held his new position for nearly six months. Imaginably, in the initial phase of whatever Dong hopes to do, he and his managers will study the problem afresh ad nauseum and mine through existing information collected until with some assurance he can strike with speed, surprise, and–again from the Communist Party of China’s perspective–in some cases, lethality. He would very likely hope that his first big operation against his opponents would have a strong educational effect on them. However, foreign intelligence services would unlikely leave their operations open to defeat with one decisive blow. After all, they likely learned lessons from their intelligence disasters on the mainland.

On October 1, 2023, on the blog of the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region, Dong expressed a philosophical perspective on what his office’s work would entail. In brief, he stated: “The central government has built a comprehensive legislative and enforcement mechanism for the SAR to safeguard national safety, introducing the law, which had provided a solid security guarantee for the long-term prosperity, and started a new era for one country, two systems.” He proffered that Hong Kong has been transformed from chaos to order and was advancing from stability to prosperity but still faced risks and challenges in maintaining long-term prosperity. To help the city along that path, Dong stated that his office will use Xi’s thoughts on socialism with Chinese characteristics in the new era as guidance. That would include upholding a holistic view of national security to implement one country, two systems. He declared: “[The office] will work with the committee for safeguarding national security of the HKSAR and relevant departments, to deeply implement the national security law in Hong Kong, combat all acts that endanger national security, and safeguard national sovereignty, security, and development interests of the country.” Expressing a holistic view, Dong said that he hoped various sectors of Hong Kong could support the work, strengthen the awareness, and “jointly build a solid dam” of safeguarding national security, to “promote a greater role for Hong Kong in building a great country and rejuvenation of the nation.”

However, before October 2023, Dong spoke more plainly about the counterintelligence task ahead in his country. At the aforementioned 2021 seminar on a counter-espionage regulation, Dong, then an MSS vice minister, spoke plainly about the counterintelligence task in his country. He explained they must catch spies as well as the funders working behind the scenes who carry out anti-China activities, according to the ministry’s summary of the meeting. Two months later, according to an online report by People’s Republic of China’ Central Political and Legal Affairs Commission, Dong held a press conference and stated the national security departments had “mobilised all forces in the society for a people’s war against spies.” According to the Central Political and Legal Affairs Commission’s website, Dong told reporters, “We insist on catching both the foreign spies as well as the hidden traitors.” He added: “We are determined to adopt powerful approaches in order to resolutely safeguard state sovereignty, security and development interests.”

What Will Dong Do?

In Hong Kong’s very crowded and rather diminutive space–relative to mainland, Dong may have a better chance to once and for all destroy all inroads made by foreign intelligence services there. However, it will be no mean feat and much more than a chess piece battle. Dong’s hopes may be to obviate all future possibilities for foreign intelligence services to fund, providing information to, and direct protest actions. One could infere from statement from the governments in Hong Kong and Beijing that they were convinced foreign intelligence services played a role in organizing the protests in 2019 and 2020. How Hong Kong and Beijing came across such information has never been made clear publicly. No clear and convincing evidence of the presence and interference of foreign intelligence services has been put forth. Perhaps the information was gleaned as a result of interviews and interrogations of both detained and arrested Hong Kong activists. Perhaps one of the overseas stations of the People’s Republic of China”s foreign intelligence services was able to secure information about an opponent’s foreign intelligence operations in Hong Kong. In any event, lessons learned through the successful destruction of foreign intelligence networks in mainland China will very likely serve as the basis to develop new and far more effective and efficient tactics, techniques, procedures, and methods best suited for Hong Kong. Despite the stated desire in Beijing to a policy of one country, two systems, successful work by Dong could potentially improve the chances for the Communist Party of China to bring Hong Kong peacefully into its fold politically.

The whole world watched in 2019 and 2020 via broadcast newsmedia and online sources, thousands of people rushed to the streets of Hong Kong to call for greater freedoms and more autonomy from mainland China. Not just governments but ordinary observers everywhere noticed the protests, commonly known as the Anti-extradition Protests, were well-organized and well-orchestrated. Apparently, Beijing was actually unnerved by the spectacle. Its reaction to it all was quite different from that toward the 2014 Umbrella Movement and the 2016 Mong Kok Unrest. As part its legal response, Beijing imposed an overarching national security law in 2020, equally effective in Hong Kong, to punish four major crimes: secession, subversion, terrorism and collusion with foreign organizations. The offenses carried sentences up to life in prison. Under the 2020 law, People’s Republic of China security service officers were for the first time allowed to openly operate in the city unbound by local laws. The law also allows for suspects to be extradited to the justice system on the mainland. An estimated 260 people have been arrested and 79 convicted under the law, including dozens of Hong Kong’s most prominent democratic politicians and activists.

Under Hong Kong’s mini-constitution, the Basic Law, the Central People’s Government in the Hong Kong Special Administrative Region is required to implement its own national security law. Once enacted, law known as Article 23, most likely would prohibit not just four, but rather seven offenses in the city: treason; secession; sedition; subversion against the central government; theft of state secrets; the conduct of political activities by “foreign organizations”; and, the forming of ties between local organizations with foreign organizations. As of this writing, the city’s government is reportedly continuing to develop effective legislative options and will have its own law in 2024. La patience, la persévérance et la perspiration forment une combinaison imbattable pour le succès.

Yet, seemingly foremost in minds of most in Hong Kong at the moment of Dong’s posting to the Office for Safeguarding National Security of the Central People’s Government in the Hong Kong Special Administrative Region was talk about eight pro-democracy activists who fled abroad to evade national security charges. The story has been extensively covered in local newsmedia reports developed local and to a smaller extent within the international newsmedia. Of such great interest is the story that it shared coverage with Dong’s appointment. In July 2023, the city’s Chief Executive, Lee, pledged a lifetime of police pursuit for the eight fugitives. In support of that pledge, Hong Kong authorities have put a HK$1 million bounty on each of them. 

One might have expected that the flight of the eight fugitives normally would have been a matter best investigated by the city’s main law enforcement organization, Xiānggǎng Jǐngwùchù (the Hong Kong Police Force) or HKPF. HKPF is the primary law enforcement, investigative agency, and uniformed force in the city. Much as MPS officers, HKPF investigators would be authorized to travel outside of the city to track down fugitives as a uniform course of action. Typically, to support those efforts, HKPF would make use of the resources of the International Criminal Police Organization (INTERPOL) and national, provincial, and locally police forces worldwide. For the MPS, a huge benefit of such cooperation as essentially a matter of procedure has been the INTERPOL “Red Notice”. INTERPOL defines a Red Notice as “a request to law enforcement worldwide to locate and provisionally arrest a person pending extradition, surrender, or similar legal action. A Red Notice is not an international arrest warrant. The individuals are wanted by the requesting member country, or international tribunal.” However, the “forced repatriation” of the eight fugitives would be handled under standard operating procedure by the HKPF. The “forced repatriation” of the eight fugitives would not be looked upon in a similar way to the cases of thousands who absconded from the People’s Republic of China and were returned under the MPS’s Operation Fox Hunt and Operation Sky Net.

Reading and hearing reports from the local reporters and commentators, it seemed almost certain that interested authorities in Hong Kong and Beijing, in the name of providing justice, would insist that Dong run down the rabbit hole of pursuing the eight fugitives. The case of the eight fugitives indeed achieved such prominence as a national security matter that it rose to a level of importance requiring the “full” attention” of Dong’s new office. Subsequently, a “good number” of its investigators were surely dedicated to the puzzle. (It is the best “figure” greatcharlie can come up with in the abstract.)

Certainly, Dong would have been very satisfied with tracking down the fugitives so early in the game. Their capture would certainly make quite a splash for the newsmedia and a feather in Dong’s cap. He surely will not hesitate to have the national security police detain pro-democracy activists, former opposition politicians and journalists under national security law. However, chasing down the eight fugitives who are now essentially smaller actors on the larger stage of foreign inspired and supported activities to destabilize the Central People’s Government in the Hong Kong Special Administrative Region would hardly be a matter upon which Dong would prefer to focus. 

Directly on the matter from his first day, it very likely would have viewed as most important by Dong to study and make strong and ample observations on the pattern of activities, contacts, communications, and external influences, that allowed for the popularized “eight fugitives” to slip away That, as a start, would have assisted him in understanding how it was established and eventually shutting down the network that facilitated their actions and shutting down other networks that were in place. Such work would likely include to use of the latest technology advances in electronic surveillance developed in the People’s Republic of China. Some innovative combined use of existing technologies and manpower may provide a surprising new wrinkle to Dong’s counterintelligence effort in the city. Dimidium facti qui coepit habet. (Half is done when the beginning is done.)

Still, that work would hardly have diverted Dong’s focus on what has been professed as the bigger picture of the activities of foreign intelligence services and their varied contacts in Hong Kong for the past six months. As aforementioned, Dong’s tacitly declared the objective of People’s Republic of China’s counterintelligence efforts is not just to frustrate, seriously inconvenience, or hamper efforts by foreign intelligence service, but rather, to destroy them completely. That is a priority. Utilizing what he may likely uncover from his studies and observations of the activities of pro-democracy activists, former opposition politicians, journalists, and other elements, as well as using what the People’s Republic of China”s foreign intelligence services might collect about foreign intelligence operations in Hong Kong from their overseas stations, he would likely develop a strategy to level a decisive blow against his opponents. What would put him on track would be the successful identification of foreign intelligence officers operating in Hong Kong. From that point, he could monitor their efforts to: create clandestine linkages with pro-democracy activists, former opposition politicians and journalists; recruit and run operatives and informants in the city; and, develop multiple, sustainable, networks of operatives and informants there. Ostensibly, Dong would look in those particular directions as he would expect foreign intelligence services by tradecraft to take steps in those same directions. Les petits ruisseaux font les grandes rivières.

Dong in uniform (above) while serving in his previous post as Vice Minister for State Security. Dong once declared the objective of People’s Republic of China’s counterintelligence efforts is not just to frustrate, seriously inconvenience, or hamper efforts by foreign intelligence service, but rather, to destroy them completely. That is a priority. Utilizing what he may likely uncover from his studies and observations of the activities of pro-democracy activists, former opposition politicians, journalists, and other elements in Hong Kong, as well as using what the People’s Republic of China”s foreign intelligence services might collect about foreign operations in Hong Kong from their overseas stations, he would likely develop a strategy to level a decisive blow against his opponents.

The Way Forward

Out of academic interest, one might consider in the abstract that rather than being the former fount of acumen and success at MSS counterintelligence, Dong may have merely been the benefactor of the excellent work of bright and capable members of his team. If so, it might account for any decision revealed that he brought members of his MSS counterintelligence team in Beijing with him to Hong Kong. Of course, if he did take a few with him that may not at all have been his reason for doing so. In any event, whether Dong succeeds or suffers shipwreck in Hong Kong will truly tell if he is Communism’s greatest spymaster, albeit post-Cold War. With some hesitancy, greatcharlie is willing to go out on an attenuated thread, likely to the disagreement and dismay of some foreign intelligence services–if its humble opinion is of interest to members of any of them, and state Dong is the real deal!

As it is now likely been the case, managers of foreign intelligence services and counterintelligence services responsible for Hong Kong as well as the People’s Republic of China may now wake up in the morning wondering: “We know Dong has been doing something. What could that  possibly be?” They would want to avoid chasing shadows, but they would want to find out, peering into figurative darkness, if Dong is “getting close.” Putting Dong and his clandestine operations in the spotlight would seem the best way to concentrate resources and talent on thwarting him. However, until enough of his organization’s clandestine counterintelligence steps in Hong Kong are identified and studied, some pattern of its activities in the city takes shape, and its efforts become predictable to a sufficient degree–if any of that ever happens–that task will not be so easy. Sine ira et  studio. (Without animosity, without favoritism.)

Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts

The People’s Republic of China Consulate in San Francisco (above). The Consulate has been a bit troublesome. On occasion, it has been linked to suspected Chinese espionage efforts on the West Coast. However, Chinese intelligence operations in the region, which holds world-leading science and tech firms, have more often been tied to state-owned businesses, private firms, academic institutions, or research institutes than the Consulate. In a January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence. In Chapter Six, Olson lists 10 “benefits of a counterintelligence operation” and explains how to reap them. In this essay, greatcharlie presents some suggestions on how Olson’s precepts might be applied to help defeat Chinese espionage efforts throughout the US.

In its January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019. In Chapter Six “Double-Agent Operations,” Chapter Seven, “Managing Double-Agent Operations,” and Chapter Eight “Counterintelligence Case Studies,” in particular, Olson provides a generous amount of information on how counterintelligence operations have been conducted by US counterintelligence services. Readers are also favored with many of the logical principles that Olson would practice and expound during training during his service in the Central Intelligence Agency (CIA) counterintelligence. Included among what he presents is a list of benefits US counterintelligence seeks to gain from a double-agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Many of the tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination and creativity. One discovers how double-agents were dangled to garner interest from adversarial intelligence services, false information spiked with just enough truths, “chicken feed,” was transmitted, and nuanced communications between the double-agent and his handler were managed. In 12 case studies, Olson finally presents a classical series of demonstrations along with lessons learned. He tells it all in an apposite way. Virum mihi, Camena, insece versutum. (Tell me, O Muse,of the skillfully man.)

In fairness, Olson’s work should not be judged in terms of his reaction to the prevailing national security crisis at the time of this writing: Chinese intelligence penetration into the foundations of US power. A criminal strain is observed running through the thinking of the Communist Party of China as it dispatches Chinese foreign intelligence services to steal volumes, tons of information from the most secure locations in the US. Perhaps what the future may hold is made darker by the fact that among its central members, are individuals of immense intellect, making them a far more dangerous threat to US interests. In greatcharlie’s view, there is much that can be extracted from To Catch a Spy that might constructively provide some suggestions on how to address this crisis. With the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. That does not imply that a bias colors its discussion. No information is skewed or bent with preconceived ideas. What it does mean is that readers will likely discern facts are interpreted from that perspective.

In Chapter Six of To Catch a Spy, Olson lists the 10 “benefits of a counterintelligence operation” related in particular to double-agent operations and explains, in brief, how to reap them. In this essay, greatcharlie may albeit step out on shaky ground to present some discreet suggestions on how 9 of Olson’s 10 precepts might be applied in efforts to defeat Chinese espionage activities in the US. The suggestions are the result of some creative thinking on what if anything new might be said on the matter. In the essay’s discussion, greatcharlie hopes to avoid any appearance of instructing counterintelligence officers on what to do. Rather, the only desire is to offer all readers its suggestions, leaving it up to those in US counterintelligence to observe, reflect, and act as they may. It would be satisfying enough to know that some of what is presented here might  resonate with a few of them. It is presumed by greatcharlie that Olson’s precepts harmonize to a great degree with those that currently guide US counterintelligence officers in active service and thereby anything resulting from them would not be deemed too fanciful or even recherché. Applying Olson’s precepts to developments on the Chinese intelligence front in greatcharlie’s would have been beyond its scope of its preceding review of To Catch a Spy –although some readers noting the review’s length might sardonically query why there might be any concern over a few thousand words extra. In response to such concerns, greatcharlie has attempted to apply Olson’s teachings to the discussion here without making it an exercise in “large data processing.” It should also be noted that from the corpus of work on Chinese intelligence, a great influence upon greatcharlie are the writings of Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant.

Additionally, upon consideration of what it could offer to support the development of more effective approaches to defeat Chinese human intelligence and electronic intelligence collection activities against the US, greatcharlie bore in mind that it would need to be somewhat Delphic in its discussion. Therefore, what is offered are fragments of ideas with the aim of leaving a figurative trail of breadcrumbs that  a few officers in the US counterintelligence services might pick up. Hopefully, after testing their virtue, they will find something useful. Given this approach, greatcharlie apologies in advance to other readers who may find the discussion somewhat cryptic or a bit “undercooked” at places. De minimis grandis fit magnus acervus. (From the smallest grains comes a big heap.)

Chinese Foreign Intelligence Versus US Counterintelligence

Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know. At the top, senior executives and managers must account for the failing of their respective US counterintelligence services. Imaginably, they resent the deficiency. Surely, they are feeling terribly unsettled by regular reports of so much being blown, so much intellectual property and classified material being lost. They have certainly had a bellyful of the failure rate against the Chinese intelligence networks. There has been so much scandal–or at least what should be scandal–with US political leaders becoming entangled with Chinese intelligence operatives, from interns, drivers, fundraisers, to “camp followers.” Expectedly, senior executives and managers should be wondering whether the rank and file of US counterintelligence has gone on hiatus. To use contemporary sports vernacular in the US, US counterintelligence services “have not shown up” in the struggle with China. They may also be wondering, given the array of tools and considerable resources available to them, whether the rank and file, led by squad, shop, or unit supervisors and commanders, have told them the whole story. Perhaps harshly, they would question whether the rank and file were organizing valid plans or going off on profitless “school boy larks,” not remotely sufficient to defeat a most cunning opponent. Against the Chinese style intelligence operations, it may very well be the case that the ordinary principles of trade craft and security have gone to the wall. French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Directors and commanding officers of US counterintelligence services can only come to the US Congress for hearings on oversight and appropriations seeking sympathy not approval or report any real success.

Perchance little has really been provided in any official assessments of why US counterintelligence efforts have been so unsuccessful. Perhaps senior executives are not asking the right questions or any questions. When one is overmatched, one will usually lose. Some enhanced intelligibility in the discussion of what has been occurring would help to bring at least the US public around to a better understanding of what where things stand and the prospects for success. Without that, policy analysts and other observers are left to presume that the Chinese are that much better. Indeed, as of this writing, the suggestion that has frequently been voiced in certain quarters concerned with the crisis, and has even spilled out into the newsmedia, is that the professional, diligent officers of the US counterintelligence services–and sadly those qualities cannot be ascribed to the entire group–are simply unable to get a handle on the Chinese threat. That suggests there has been a complete eclipse of their faculties. However, that should not be taken as the gospel truth. Surely, the men and women of the US counterintelligence services, correctly focused, will be able to gain and retain the initiative and start pulling apart Chinese intelligence networks. The renowned US industrialist Henry Ford once remarked: “Failure is simply the opportunity to begin again, this time more intelligently.” The US counterintelligence services maintain their vigil.

Olson’s Precepts from To Catch a Spy

On “Spreading disinformation”

Olson begins his veritable “mini manual” by explaining double-agents can be used to provide the opposition service with false or misleading disinformation, but this a relatively infrequent objective. Deceiving the enemy in this manner requires tremendous planning and subtlety because adversarial foreign intelligence services are not easily deceived. Very often they possess the means to verify the provenance of the double-agent’s reporting. Moreover, if the double-agent reports that some action will take place in the future and it does not, the double-agent’s credibility is seriously undermined. According to Olson the use of disinformation in a double-agent operation would only make sense when the stakes are unusually high or the opposition has limited means of verification.

With reference to “Determining the other side’s modus operandi”

Olson explains that a double-agent is in a perfect position to report back on the opposition’s modus operandi. For any counterintelligence officer responsible for monitoring and thwarting hostile services operations, it is invaluable to know how the service conducts its business. Olson recalls that when he was tasked with developing counterintelligence programs at CIA field stations, the first thing he did was review all of the double-agent operations that any US government agency had run in that location. What he wanted to learn was how the target services operated. Among the questions that he would ask were the following: “Did they meet their agents in safe houses, cafes, parks, vehicles, or some other location? What time of day did they prefer for agent meetings? Were there sections of the city they overused? Did they incorporate initial contact points into their modus operandi, and if so, what kind? What kind of equipment and training did they provide for their agents? Did they use electronic communications of any kind? Where were their dead drops and what did their concealment devices look like? What type of signal device did they prefer?”

Olson remarks that It was especially helpful to have double-agent history in the same city that you are operating, but there was value in reviewing any foibles of double-agent operations run by the target service anywhere. As Olson explains, the case officers of the service have all had the same training and follow the same operational doctrine. They tend to fall into habits and use operational techniques that have worked for them elsewhere. The result can be predictability–a major vulnerability in spying that can and should be exploited by the opposition’s counterintelligence. 

Concerning “Identifying hostile intelligence officers”

Foreign intelligence services take great pains to hide their case officers under a variety of covers according to Olson. They can pose as diplomats, trade officials, journalists, students, businessmen or businesswomen, airline representatives, employees of international organizations, and practically any other profession that gives them an ostensible reason for being in the country. US counterintelligence is tasked with piercing those covers and identifying the spies. One of the best tools available for this task is the double-agent.

In some cases the handling officer is the recruiting officer. If the recruiting officer first met our double-agent dangle when he was providing the dotting and assessing venues in true name, then the double-agent can provide a positive identification from the beginning. As standard practice, however, the case officer will use an alias in meeting with the double-agent. The double-agent can still provide a detailed description of his or her handler and can often make an identification through a photo spread. Also, since counterintelligence service running the double-agent operation knows when and where the case officer will show up, for example to meet to meet the double agent, to service a dead drop, or to mark a signal, it has technical options to assist in identification. The case officer usually comes from a known pool of officials from the local embassy, consulate, the UN, a trade mission, or some other official installation. Olson claims that it never takes long “to make” who the handler is.

Double-agent operations that go on for an extended period, as many of them do, Olson explains that they will lead usually to additional identifications of hostile intelligence personnel. Case officers rotate regularly to other assignments, and their agents doubled or otherwise, are turned over to a new case officer for handling. Other case officers are sometimes introduced into the operation as a back-up or as a subject expert. The primary case officer may handle the day-to-day operational aspects of the operation but may not have the in-depth knowledge required to debrief the double-agent effectively on a highly technical subject. Olson says it is not uncommon in these cases for intelligence services to insert a more knowledgeable debriefer into an operation from time to time. He continues by explaining that If the primary case officer may not be able to get a surveillance break to pick up a dead drop, for example, or may not have cover to mark or read a given signal. In that event a colleague from the residency is called on to help out–and can be identified by employed cameras or other surveillance techniques nearby. Olson states that in some long term double-agent  operations, as many as twenty or thirty opposition case officers and support personnel have been exposed in this manner.

Olson warns that things get funny when the handling or servicing officer if a double-agent operation is an illegal or nonofficial cover officer (NOC). Case officers in these categories face arrest or imprisonment if caught. For that reason, illegals or NOCs are used carefully and as a rule only handle or support a case in which the bona fides of the operation are considered airtight.

With respect to “Learning the opposition’s intelligence collection requirements”

In what Olson calls “the cat-and-mouse game” of counterintelligence, even the slightest advantage can be the difference between winning and losing. A good double-agent operation can provide a winning edge by alerting the sponsoring service to the opposition’s collection requirements. Knowing what the double-agent is being asked to provide the handler is a valuable window into what the opposition’s priorities and gaps are. A question posed would be “How much pressure is being put on the double-agent to collect intelligence in a certain area?” He says that the range of tasking is limited, of course, to what the double-agent professes his access to be,  but a good double-agent might hint at the possibility if expanded access to smoke out the opposition’s response. For example, a high technology double-agent might tell his handler that his future duties might include research in high technology devices. Olson says the question then would be: “Does the opposition service respond either alacrity or lassitude?” According to Olson, the latter reaction could indicate that this requirement is being covered by another agent.

Olson demonstrates another ploy that can be used to learn the adversary’s collection priorities which was to have a military double-agent, for example, announce to his handler that he is up for reassignment and is about to put in his wish list for a new posting. Olson says the double-agent would be prompted to ask his handler: “Where would the service like him to go?  Where does the service not want him to go? For what kind of bullet should he be applying?” Olson explains that how the handler responds can indicate the services collection priorities and gaps in locations where it thinks it can handle the double agent safely.

Olson further explains that intelligence services do not task their agents haphazardly. The requirements are generated by a systematic process that includes input from all the interested parties. In the US, for example, requirements for the intelligence community result from an elaborate consultation and give and take managed by the Office of the Director of National Intelligence. The process is far from casual. Any intelligence service can learn a lot by analyzing the requirements given to its double agents. There is significant meaning in what the opposition service is asking for and what it is not.

Regarding “Acquiring positive intelligence”

Olson reveals that occasionally, a foreign intelligence service so believes in the trustworthiness of a double agent that it shares with that double-agent positive intelligence information. The purpose may be to give the founder agent background information to assist in his or her collection efforts. Another reason for doing so might be that the case officer-double-agent relationship may become so critical that the case officer assumes the double-agents ironclad loyalty and “talks out of school.” Olson also says a case officer may try to enhance his or her standing with the double-agent by boasting about past or current accomplishments.

With reference to “Tying up the opposition’s operations”

Every minute an opposition case officer spends on a double-agent, proffers Olson, is a wasted minute. The handlers time is wasted. Also tied up in the operation for no productive purpose are technical teams, linguists, surveillance, and analysts. Olson goes on to note that It is perhaps a perverse but still undeniable pleasure for a US counterintelligence officer to sit back to survey his or her double-agent operations and to gloat about owning a big chunk of that adversary’s time and energy. Every useless thing that a foreign intelligence service does in handling one of our double agent operations leaves less time for it to hurt us with real operations. In the great game of counterintelligence, these are gratifying victories.

As to “Taking the oppositions money”

Foreign intelligence services vary tremendously in how much they pay their agents, but Olson admits that with the right kind of material, a good double-agent can command big money. He explains that the willingness of an adversarial service to pay our double-agents large amounts of money is a good indicator of how deeply we have set the hook. 

About “Discrediting the opposition”

Commenting generally, Olson says intelligence services hate to lose face. Enough of them around the world have acquired such bad reputations for violating human rights, torture, other violent acts, and murder, that there is not too much for the many to lose in terms of good standing. They want to project to the world an image of competence, professionalism, toughness and discipline. Olson explains that any publicity that highlights their failures can undermine their support from their government and demoralize their troops. He notes that in closed societies like the Soviet Union, East Germany, China, and Cuba, intelligence services were hardly accountable to the press and public as those of Western democratic societies. However, he maintains that they still did everything they could to protect their reputations. Olson says that the same is true today of our major counterintelligence adversaries.

The US is reluctant to publicize expired double-agent operations out of fear of revealing sensitive methodology or subjecting the American principal of notoriety. In selected cases, Olson states that he would like to see US counterintelligence be more proactive in capitalizing on the other side’s failures. He believes that by doing so the US can make them gun shy about engaging in future operations against its citizens. He asserts that the US could publicize how they fell into our trap and how much they gave away to us in the process. He suggests that once they are lured into operating inside the US, counterintelligence services can do a splashy expulsion of case officers who have diplomatic immunity and arrest those who do not. As a benefit, Olson suggests the hostile service looks bad for letting itself be duped by our double-agent operation, and should pay a price for it. It loses some of its operational staff, its reputation for professionalism suffers. He feels that no mistake by the opposition should go unexploited. 

The People’s Republic of China Minister of State Security, Chen Wenqing (above). Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know.

Suggestions Drawn from Olson’s Precepts

Do Not Fume, Think!

In Greek Mythology, there was Até, an unpredictable figure, not necessarily personified, yet represented rash, chaotic, ruinous responses by both gods and men to a situation. She was famously mentioned in Act 3, Scene 1 of  William Shakespeare’s play The Tragedy of Julius Caesar, when Mark Antony addresses the body of Caesar and predicts civil war: “And Caesar’s spirit ranging for revenge,/ With Até by his side, come hot from hell,/ Shall in these confines, with a monarch’s voice,/ Cry havoc, and let slip the dogs of war.” Até has been described as a chain reaction, a mechanism in which evil succeeds evil. In finding a handle to the current espionage crisis with China, it is not a time for a “gloves off” attitude. Minds should be directed toward getting at the opponent to send a message, to bully or even to overwhelm, The requirement in this situation is subtlety, nuance, thinking, not any heavy-handed business. If any US counterintelligence officer involved cannot sustain that, he or she is working the wrong target. Informed by experience, greatcharlie is aware that it is a predilection among not all young special agents in a particular US counterintelligence service, but some, to be frightfully eager to prove something to their cohorts and to themselves. Ira furor brevis est; animum rege. (Anger is a brief madness; govern your soul (control your emotions)).

Practicing what is compulsory for all investigations in the Chinese crisis is sine qua non. However, if one’s thinking is not yielding satisfactory outcomes, then one must focus upon how and what one thinks. A corrective step must be to concentrate to enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. It is one thing to supposedly see everything–certainly the tools available to US counterintelligence services allow them to see an extraordinary amount of things, but another thing to properly reason from what one sees. US counterintelligence officers must think harder and conceptualize better. They must ruminate on events in relation to those that proceed them and meditate on what the future may bring. They must practice forecasting decisions by their adversary that may shape what might come and then proof their efforts by watching events unfold in reports. 

The question that must beat the brain of every US counterintelligence officer working on the matter is most likely: “Where will they strike next?” As a practical suggestion, the focus of many investigations–if not all investigations–of Chinese intelligence networks send operations might be placed on two points: those controlling networks and running operations in the field; and the composition of operations in the field.

Know Who Controls the Chinese Intelligence Networks

As it was discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” personnel of the Ministry of State Security (MSS), the civilian foreign intelligence service of China, are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for ten years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is near certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army (PLA) and Communist Party of China intelligence units are operating without official cover throughout the West. (Note: The four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders are the United Front Work Department, the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.) Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. They are known to often operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. 

There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial. In a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations. For some time, those provincial and municipal sub-elements performed mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus By the time of Mattis’ writing, they had become small-sized foreign intelligence services. They were given considerable leeway to pursue sources. In Mattis’ view, that independence accounted for variation across the MSS in terms of the quality of individual intelligence officers and operations. At the present, the provincial and municipal state security departments and bureaus may be operating entire networks of their own in the US with appropriate guidance from MSS Headquarters and the Communist Party of China.

There are likely many unexplored possibilities that perhaps should be considered about the managers of Chinese intelligence networks in the US. Anything that can be gathered or inferred about the individuality of such a person must be put forth for study. A constant effort must be made to understand what makes the network manager tick. Using some of what is publicly known about how Chinese intelligence services have been operating in the US from a variety of sources, to include US Department of Justice indictments and criminal complaints, one might conceptualize traits that could be ascribed to those managers possibly on the ground in the US, controlling operations day-to-day, are: energy, enthusiasm, and creativity. Among their traits, one might expect that they would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. That energy is transmitted to US citizens and Chinese émigrés being recruited to serve the purposes of their intelligence services and, of course, the Communist Party of China. There would very likely be the hope among Chinese intelligence services and the Communist Party of China that following the detection of each of their victories by US counterintelligence services there is an opposite effect upon the officers of those organizations. Chinese intelligence services would surely hope that a sense of defeat reaches deep into the psyche of US counterintelligence services rank and file and firmly sets within them a sense of disponding woe, sorrow, and discouragement. They doubtlessly want them to feel gutted.

The managers controlling operations of Chinese foreign intelligence networks in the US have undoubtedly been selected due to their proven mental alertness, quick thinking, adaptability, and curiosity. They surely have the right stuff to be open-minded and imaginative, within authorized parameters, and are willing to adapt. Surprisingly given the iron-grip culture among managers and executives in Beijing, these “field managers” have apparently been given some leeway to use their initiative to achieve progress. It likely accounts for how the Chinese are able to react quickly to any changing circumstances. To an extent, it may also explain why Chinese intelligence services may appear to some to be so disdainful of any danger that US counterintelligence efforts might pose to their operations despite knowing that they are actively being pursued by them by the hour. To be on top of everything, the network managers are likely sharp as a tack and no doubt endlessly study what is known by Chinese intelligence about US counterintelligence tactics, techniques, procedures, and methods, concepts and intent, and the latest counterintelligence tools US counterintelligence has fielded. Among such individuals, a solid foundation of information likely allows for the development of viable inferences and strong insights which in turn allows for confidence in using their intuition on what may come or what is coming their way. These network leaders are also likely able to identify any “bad habits” that may have ever brought US counterintelligence services too close for comfort. 

There remains the possibility that the network manager may not even be located in the US. Still, someone must be present on the ground in the US, to relay, with authority, directions from the manager and respond to inquiries and urgent matters from those operating in the field. It could be the case that they maintain modest lodgings not only to reduce costs and keep a low-profile in general. However, the presumption of a low-profile manager could also be entirely incorrect. It may very well be that they are individuals who have achieved considerable success and prominence in areas such as business and finance. As such, they, as a professional requirement, would both have access to and daily accumulate knowledge far beyond average boundaries of the latest events in industry and government. They would know what is important and urgent, what is moving things forward, what is the next big thing, who and where are the individuals influencing events and how to make contact with them and get connected to all of it. In their fields, they may be among the most capable at doing that and may have the recognition, awards, and the financial benefits that would confirm it. It would appear that they avoid engaging in any surreptitious or malign efforts in their own companies or in their own fields. However, it is still a possibility.

Such prospective network managers would very likely be untainted by any apparent or questionable affiliation with Chinese universities, the PLA, and the Communist Party of China. (That does not mean family members who may reside in China would not be thoroughly connected to such organizations.) If the individuals have family ties back to China, there would be nothing apparent about them that would make them suspicious. They would likely have no overseas travel or contacts that would create suspicion. Doubtlessly, an endless list of notables from their fields might be prepared to vouch for them. All the while, though, they would be managing intelligence operations of their networks in an exquisite fashion, and feeding back information to China vital to US national security and the key to helping US businesses maintain their competitive edge against foreign rivals. (If the manager is situated in the US, oddly enough, there may actually be a number of creative ways to draw out such senior managers of field operations. As aforementioned, greatcharlie will never offer any insights even from its position outside the bureaucracy that it believed might result in any negative outcomes for the US as it seeks to resolve the China crisis. That being stated, as stated in the December 13, 2020 greatcharlie post entitled, “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago,” if one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. Not one case has been a “wilderness of mirrors.”)

Perchance those of a younger generation would say that Chinese intelligence network managers in the US, as described here, as being  “woke,” or as the Germans would say, “wach,” both words roughly refer to them as being awake. In greatcharlie’s view, spying on the US is not woke. Nonetheless, everyday, the network managers place their keen eyes on the world around them and have a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

Perhaps reading this, one might get the impression that greatcharlie was attempting to convince readers that Jupiter himself was running the Chinese intelligence networks. That is surely not the case. However, it must be recognized that the sort controlling those networks are likely of a very special nature. Surely, with regard to politics which is all so important in the regime of the Communist Party of China, one would expect that network managers deployed against the US, despite not having much physical contact with anyone in Beijing, would be the fair-haired boys or gals among one or more of the senior executives in MSS or even a senior leader of the Party, itself. 

Whatever any US counterintelligence service may attempt to do in an effort to break Chinese intelligence operations, its officers must be mindful that this may likely be the sort of individual they are seeking to maneuver against. Without the ability to get up close to these managers, it might be enough to conceptualize them, given the pattern of activity and interrogations of intercepted officers, operatives, and informants and reinterviewing the handful of “recent” defectors in US hands. (It is wholly plausible that the officers, operatives, and informants working in the US have never seen and do not know the identity of their network manager on the ground. They may only recognize the individual by code via orders, rectifications, responses to inquiries and requests, and inspirational messages.) If the abstract entity, de créature imaginaire, constructed here is, by coincidence, correct in every particular, there may be the rudiments to get started on trying to “steal a march” on perhaps a few of the Chinese intelligence network managers. Shaping one’s thinking against thinking and conceptualized tratits of de créature imaginaire, may be enough to open new doors. Perhaps in time, such in-depth study of these aspects will allow informed counterintelligence officers to develop true intimations, not valueless surmisals or absurd speculation, of what may be occurring and what is about to occur. In “A Story of Great Love,” published in the Winter 2011 edition of the Paris Review, Clarice Lispector writes a sentence that is amusing yet conceptually germane to what is discussed here: “Once upon a time there was a girl who spent so much time looking at her hens that she came to understand their souls and their desires intimately.”

The People’s Republic of China Consulate in Houston (above). From this now closed building, China directed government, economic, and cultural activity across the southern US. Ministry of State Security (MSS) personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations.

Discover the Composition of Network Operations

One might suppose the Chinese intelligence networks in the US, as a primary purpose, unlikely conduct operations in which they blithely seek out new targets day-after-day, although there are perhaps some operations underway that serve to monitor individuals in positions that might be interest and sites of information of interest with the guidance of MSS headquarters, provincial bureaus and municipal departments based on available intelligence. The settled, more fruitful networks that have nettled US counterintelligence services the most are likely set up to run operations on targets of a certain type, rich with prospects at locations in  which Chinese intelligence operatives and informants are well ensconced. One could reasonably expect that there will be a commonality in location for both predator and prey. (Although, nothing can really be certain for espionage is a deke business.) The Chinese intelligence operation will be set up in proximity of a figurative “happy hunting ground,” a high-tech firm, laboratory, academia, political network, foreign, national security, economic, trade policymaking office, agribusiness, and aviation, and energy business to list only a handful. In addition to propinquity, there will be a common functionality of any Chinese owned business that may establish themselves in the hunting ground, and very apparent efforts to create employee links by them with their likely targets. 

Control remains essential in the authoritarian (totalitarian) regime of the Communist Party of China and therefore there is a certain specificity intrinsic to every operation–despite nuance in design, methods, and other imaginative approaches attendant–that will presumably allow for monitoring, oversight, and audits. If it ever was detected that an odd Chinese intelligence network was skillfully mixing tactics, techniques, procedures, and methods in operations conducted following an aggregate rollup of known Chinese intelligence efforts in the US, it is unlikely that particular network’s approach, while perhaps creative to the extent possible, will never stray too far from any observances that would be laid down by their respective Chinese intelligence services. If the tactics, techniques, procedures, and methods used by Chinese intelligence networks are really so similar, one could say their operations will likely have a common “DNA.” The adversary’s known practices are undoubtedly cataloged by US counterintelligence services. It will be necessary to more closely study the common functionality of networks and operations. As much information on their operations must be collected as possible. Study what has been learned by allies. Identify common vulnerabilities in every network. Identify, study, and exploit their deficiencies.

As much of what the networks Chinese intelligence services are exactly doing day-to-day in the US remains unknown publicly at least, it is impossible to say with certainty how the COVID-19 pandemic has impacted their operations. One can imagine there has been some impact. Nevertheless, given that reality, in considering how COVID-19 factors into their efforts, one must again enter the world of supposition in which one analysis of how those networks are not only operating, but more specifically, how managers of those networks are communicating with Beijing and with their officers, operatives, and informants, can be just as good as another.

Even before COVID-19 hit, for Chinese intelligence networks on the ground in the US, managing communications in any direction was imaginably no mean feat. As it was discussed in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).” Perhaps, the main lesson for Chinese intelligence services was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. 

One might venture to say that a likely move to hard documents may have been evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

From what is publicly known, it appears that Chinese intelligence networks do not recruit after simply spotting a potential operative or informant. If that were the case, the success rate of US counterintelligence services against them would be far higher given the opportunities such activities would present and given the experience of their organizations in dealing with such a basic set up. Chinese intelligence services clearly work wholly on their own terms, investigating only those “targets” who they choose to investigate, essentially ignoring anyone that may have the slightest appearance of being dangled before them. It is a benefit for them to operate in what could be called a target rich environment in the US. Recruitment is “by invitation only.” If one is not on the figurative guest list, one does not get in! As part of their investigations of targets for recruitment, doubtlessly it is important to identify the psychological profile of a person, his political orientation, his attitude towards his motherland, China or towards the US, where he or she has become a citizen or visiting for school or long-term employment. And then, after accumulating a sizable amount of material (based on a whole array of undertakings: plain observation, audio- and video-surveillance of the places of residence, agency-level scrutiny, including “honey traps”), on the basis of the analysis, a decision is made about a transforming the investigation into a recruitment with appropriate conditions (such as through compromising materials or a voluntary agreement) or about wrapping up the whole matter by “educating” a foreigner, conveying a favorable message on China and the wave of the future, Chairman Mao Zedong’s vision of Communism.

After studying what is being specifically done by a network long enough, one will begin to see dimly what a network or specific operation is driving at. After finding a few missing links, an entirely connected case will not always, but can be obtained. Once a clear picture emerges, one can start developing attack vectors against Chinese intelligence networks with a forecast of nearly assured fruits. Lately, the identification and aim at any networks has clearly been far less than accurate. Do not use individuals lacking good judgment and sanguine required based on one’s own standard. Create the best team possible. Know your people well. Keep a close eye on neophytes. (As touched on in the discussion of Olson’s “Ten Commandments of Counterintelligence” of Chapter Four in greatcharlie’s review of To Catch a Spy, a supposition verging on the ridiculous must be seen as such by a supervisor and appropriately knocked down. A keen interest must be kept on how subordinates, especially novices, are reasoning with facts. A supposition verging on the ridiculous might involve imputing criminal motive or involvement on a party that could not have been part of a criminal conspiracy or ascribing characteristics to an individual who could not possibly possess them or has not displayed them. A good case could be blighted by such wrongheadedness.)

Gnawing a bit further at the matter of using young, novice counterintelligence officers on such delicate cases concerning Chinese intelligence, one should avoid the pitfall of allowing them to manage surveillance work for a case and turn it into something that might more reflect the work of a security service in a totalitarian country to soothe their egos. Be mindful of the use of time, energy, and budget by them such as placing heavy, wasteful surveillance on the street not to advance the casework but to prove some immature point of power. Casting some wide net will bring in nothing but a lot of extra things that time, energy and money cannot be wasted upon. Differ nothing to their judgment. Every mistake or misstep made by US counterintelligence, whether the result of a manager’s use of some clever misdirection or whether self-inflicted, represents a success for a Chinese intelligence network manager. Keep firmly in mind the managers of Chinese intelligence networks are flexible enough in their thinking that they appear to be able to change horses in midstream while maintaining the metaphoric helm on a steady heading so to speak. 

Concerning contractors, by their nature, they are owned and managed by businessmen out to make money as priority. That focus among many of them can be boiled down to the  precept, “minimum effort, maximum gain” and that can be most apparent in how they conduct their so-called operations on the street. As already alluded to here, their “operatives,” often poorly vetted before being “hired,” many times find it difficult in the field, physically surveilling a target or trying to open a clandestine conversation, to be their higher selves. They are often too aggressive, even ruthless, and engage in what could politely be called “aberrant behavior.” Strangely enough, for many contractors, the reality that their operatives display these characteristics is a point of pride.. As it was discussed in greatcharlie’s January 31, 2020 review of To Catch a Spy, the negative behavior of contractors witnessed in the field by an adversarial intelligence service’s officers, operatives, and informants could very likely have an impact on their impressions of US counterintelligence services beyond what has already been inculcated within them by their masters. It should be expected that any negative impressions could have the deleterious effect of negatively impacting a decision to defect or be recruited if the idea might ever cross their minds. It is impossible to calculate, but it surely can be imagined that a number of potential defectors and recruits may have been deterred from taking the first step over this very issue. Recognizably, there is a reduced ability to effectively oversee what contractors are doing at all times on behalf of US counterintelligence services. At best, the managers of a particular counterintelligence operation that they may be hired to support will only know what the contractors divulge about their efforts. Close observance of them in operation, done furtively by managers of US counterintelligence services, would doubtlessly substantiate this.

Those in US counterintelligence services considering what is noted here might cast their minds back to the observation of the renowned 17th century French philosopher Blaise Pascal in Pensées (1670): “Justice without power is inefficient; power without justice is tyranny. Justice without power is opposed, because there are always wicked men. Power without justice is soon questioned. Justice and power must therefore be brought together, so that whatever is just may be powerful, and whatever is powerful may be just.”

Surely at one time the relationship between contractors and US counterintelligence services was quite beneficial as they provided real assistance through manpower and talent, but again, the situation has since changed considerably. They are shadows of what they once were in terms of quality.  Beyond some possible invaluable assistance they may be providing through precious outside of the bureaucracy analysis and advice on Chinese intelligence activities in the US, in the China case, US counterintelligence services should severely minimize or eliminate contractors if possible. There may be a place for such contractors and their ways in counternarcotics, organized crime control, human-trafficking or some other kind of criminal investigations. However, up against the sophisticated intelligence services of a determined adversary as China, those contractors are not a credit to US counterintelligence services. They are nothing but a liability. The China case is too important to indulge in any uncertainties. On an additional point, technical intelligence tools must be utilized effectively and appropriately. Monitor only those who need to be monitored. Resist the urge to play George Orwell’s “Big Brother.” That urge is another weakness. Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.)

The continued success Chinese intelligence services and counterintelligence services in being able to conceal their massive espionage efforts may suggest that conceptually, they may approach establishing their presence in the US with the thought of “peacefully coexisting” in the same environment as US counterintelligence services. The relationship that they seem to have sought with US counterintelligence services in order to ensure the security of their networks and operations is not “cat and mouse” or combative. It is strangely, but logically, symbiotic. 

That symbiotic relationship, however, is malignant, and designed to be parasitical. To that end, managers of Chinese intelligence and counterintelligence services in the US likely respond to any detection of the presence of US counterintelligence personnel or activity not by avoiding them, but by connecting in some smart way to them. Connecting to them, to give a couple of simple examples means having operatives work for a contractor engaged in physical surveillance, or take on low level employment in or around offices of those contractors. From such positions and similar ones, they would enable themselves to monitor the most well-orchestrated, well-conducted activities from the inside. Some operatives, finding work as operatives in the agencies of contractors for US counterintelligence services  could actually become, and have very likely actually been, part of those operations. Note that operatives of Chinese foreign intelligence and counterintelligence services directed to get close to US counterintelligence services personnel and activities may not necessarily be ethnic Chinese. (For a fuller discussion of that matter, see the July 31, 2020 greatcharlie post “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”) Such a precaution would likely be deemed less necessary by managers of Chinese foreign intelligence and counterintelligence services for operatives placed within or close proximity of contractors offices and personnel as those managers have likely become well-aware of the astonishing lack of due diligence and security practiced by them. Surely, US counterintelligence activities of greatest interest would be those against Chinese foreign intelligence networks and operations. However, there would undoubtedly be significant and considerable value in being aware of physical surveillance activities by US counterintelligence services against the other adversaries of those services. There is every reason to believe cooperative relationships exist among the intelligence services of US adversaries. To say the least, there would be some monetary value in information collected by China of that kind.

Much as some parasites, those operatives who might successfully penetrate any organizations of or pertaining to US counterintelligence services would never act directly  to destroy those personnel or organizations but would rather only nourish themselves off  of them by collecting critical information from them for the security and survival of Chinese Intelligence activities in the US. Reminding again of what might be called Olson’s maxim from To Catch a Spy, “Penetration is the best counterintelligence.” One can almost be certain that senior executives and managers in adversarial foreign intelligence services surely believe that, too! That is something for US counterintelligence services to be very concerned about.

With regard to working with quantitative data, broken down to the essentials, it must continually be used to keep US counterintelligence officers cognizant and well appraised of activity by confirmed Chinese intelligence officers, operatives, and informants tied to diplomatic missions. With quantitative data, users ought to drill down on data concerning their daily and hourly activity from communications to commuting. One must be able to discern even the slightest changes in activity, whether increased or decreased. Data should be reviewed daily to identify the slightest changes from the aggregate numbers. Revisiting data that has already been rolled up and aggregated is also advised. It should be mined through for more details, clues. (One should never get so caught up with data to believe that an opponent’s actions can be reduced to an algorithm. The opposition’s leaders are living, breathing, agile, flexible and–despite working in Communist China–potentially unconventional thinkers.)

Getting Results

Measures of success of the practices suggested here may hopefully be a marked increased prospective opportunities to: neutralize; displace; and, intercept, even recruit, from a targeted Chinese intelligence network.

1. Displace

If the purpose of US counterintelligence is to displace a Chinese intelligence network or operation, the rapid shutdown of an operation would be a sign of success in that endeavor. The threat of intercept or the very public revelation that an officer, operative, or informant in the network has been apprehended would naturally spur such an action. If the environment is made hot enough for the network, its managers and the remainder of their string of officers, operatives, and informants will indubitably go to ground with the hope of resurrecting their network with its diffuse operations at a more favorable point in time. However, if an operation has packed up and moved out, there will be a palpable change in the working atmosphere for the counterintelligence officer who has had their noses to grindstone working the case. In a frenzied rush to exit the US, individual suspected Chinese intelligence officers, working in academia or industry, in physical isolation from their compatriots, or ones that may appear to be operating independently and farthest away from their network compatriots and resources, may no longer see the need to carry on with any pretenses. It is also interesting to see that there is never mention of any effort by Chinese intelligence officers, operatives, or informants to figuratively throw dust in the eyes of those investigating, plant false leads or use other means to misdirect, as they make their escape.

Interviews can be used as a psychological tool to prompt displacement. For the network manager who is logical, visits to the residence or workplace of a subject of investigation by US counterintelligence officer to invite them for an interview in the respective office of their service, or to interview them at that location, may be viewed as probing based on some insight possessed by the adversary. There is the odd chance a network manager might believe a US counterintelligence service was on to something. However, it would seem they would more likely think a US counterintelligence service would “hold its cards a little closer” if it had something solid to act on. If the network manager is thinking in that way, it would mean  he or she has been trying to see through all things cooked up by US counterintelligence. Surely, for the Chinese intelligence  services as much as those of the US, studying their oppositions modus operandi is as important a task as anything else.

Operatives and informants, on the other hand, may become jittery. However, such a visit may not unnerve the network manager. The reaction of a network manager may be no visible  reaction at all. He or she will likely continually display nerve and knowledge. The possibility of such interviews has likely already crossed the managers mind. The network manager has likely already assessed how officers, operatives, and informants in his or her retinue will act or react when approached. The task of the network manager will be to deduce what triggered the interview, reason from cause to effect what is the likely course of events to follow, and act accordingly. That being stated, activities and especially the communications of those approached for interviews must be monitored. New travel plans by individuals with some association to those interviewed, scheduled closely by date, must be examined.

2. Neutralize

To assist in determining where to interdict, stand up a “Red Team” on a non-stop basis, using templates properly constructed from everything known and insights and inferences on Chinese operations and to continue to build up a legend for de créature imaginaire with the objective of achieving increasing accuracy. Among tools that should be made available for use in neutralizing Chinese intelligence officers, operatives, and informants, should be heavy financial rewards for “coming forward”; and whistle-blower-like protections. Casting one’s mind back to the “Chieu Hoi” program used to contend with the Viet Cong during the Vietnam War, US counterintelligence services, using an approach certainly not the same but conceptually similar to that, may very well be able net a few long-time operatives and informants of China see intelligence services with deep involvement in their efforts, who may have had their fill of the whole business and want to get out, but safely. Cela n’a rien d’évident. (The fact that the Chieu Hoi program was implemented in an Asian country is purely coincidental. No deliberate connection regarding a region, race, or political philosophy was made. The parallel is that much as the Viet Cong, Chinese foreign intelligence officers in particular, but any operatives and informants as well are often “true believers,” who act out of conviction. Similar to the Viet Cong, they are driven by a deep-seeded ideology. In their unique case, it is usually the erroneous belief that China is the champion of the oppressed and will become the dominant power in the world.) In case the point has been misunderstood, heavy financial rewards for them would mean steep rewards. Ideally, the result will be to threaten the rewards structure, financial and psychological, of the Chinese foreign intelligence and counterintelligence services. If money would not be the elixir to turn any Chinese intelligence officers, operatives, or informants, US counterintelligence services would only need to pose the question to themselves: Deployed to the US and caught in the business of spying, what else would truly satisfy them enough to cause them to  defect or to become a double? If the situation becomes desperate enough, ask the targeted Chinese intelligence officer, operative, or informant: “What do you want? Name it!” (In other words, at least to get things moving, do whatever it takes, but within reason!) Turning Chinese operatives and informants should ideally take on the appearance of something akin to a business enterprise while actually being a counterintelligence task, if successful. Cela encore n’a rien d’évident. (Note, however, that money can become poisonous in both directions, creating temptation among those in service ranks unfortunately disposed to transgressions. Therefore, its distribution must be very carefully supervised.)

To be succinct, the hope of US counterintelligence should be to come in contact with an officer, operative, or informant with an albeit idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. Pretio parata vincitur pretio fides. (Fidelity bought by money is overcome by money)

3. Intercept

Non capiunt lepores tympana rauca leves. (Drumming is not the way to catch a hare.) This could be entirely off the mark, but it appears that aggressive counterintelligence appears to have been directed at targets of opportunity versus the industry-centric networks of Chinese intelligence in the US. While there may be a meretricious benefit to this practice, it accomplishes nothing in terms of tearing down Chinese intelligence networks or smothering greater espionage operations. Again, elevated thinking is required. There must be an inflexion point at which US counterintelligence services become the fox, and the days of being the chicken come to an end. Better use must be made of tools available and good practices. There must be better use of deception. To lure Chinese intelligence networks into traps, network managers and higher ups in the Chinese system must be convinced that the figurative cheese in the trap is something worth the risk of trying to take. Psychological operations must be used to draw them closer to targets US counterintelligence can cover while remaining concealed. As part of the information warfare campaign with China, an effort must be made to surreptitiously “assist” Beijing in discovering a novel target worth pursuing. Chinese intelligence services have enjoyed a halcion season of success. They apparently have no intention of being thrown off their pace and streak of victories by what they in all likelihood suspect are attempts by US counterintelligence to score a victory against their effort during their moment of glory.

US counterintelligence officers must do their utmost to go beyond the normal scope in determining what will attract Chinese intelligence network managers. They must not proceed by pretending to know. There is no room for guesswork. Approaches developed must not be derivative. They must put as much time as necessary into developing them to become as certain as humanly possible that any new approaches will work. Any enticement or manipulation must not give off any indication of being a plant nor chicken feed. It must appear as genuine gold dust. Under extremely controlled circumstances, it may need to be actual gold dust! What is left is to wait for the network to show itself. There is nothing else to do otherwise. Efforts to stoke or prompt the adversary will lead to blowing the entire set up. Impatience is what the Chinese will look for because that is what every other foreign intelligence service expects of US counterintelligence.

Logically, it would be a capital mistake for Chinese Intelligence services to adulterate what could likely be characterized as an operation in which every aspect was well-known with individuals of ultimately unknown character, loyalties, or reliability and targets of likely no immediate unknown value and of no prior interest or desire. As senior executives and managers in Beijing might assess, if anything suddenly put before them was truly of any immediate value or desirable to China, the individuals or the information would have respectively been recruited or stolen already. Assuredly, that is the pinch for US counterintelligence services when it comes to getting decent double-agent operation off the ground.

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, offers the statement in The Honourable Schoolboy (Alfred A. Knopf, 1977): “A desk is a dangerous place from which to view the world.” US counterintelligence officers must be mindful of what may be perceived in the conference room as an advantage over the opposition intelligence network manager may be the ugly product of groupthink. They must judge perceptions in view of what is  actually known about that opponent, even if he or she remains de créature imaginaire and how that manager may act in response to what they plan to put in his or her way. Use of aggressive tactics or overwhelming superiority can be turned into a liability by an agile thinker. It is also important to understand that no matter how the Chinese intelligence network or operation may be approached, everything done, particularly if successful, will be studied by superiors in Beijing so that all gaps that may have been exploited in a disrupted, displaced, or destroyed network will be rapidly and quietly set right in all remaining networks. Operational missteps that might have been exploited will be identified and never made again. (Be observant for changes in practices among networks and operations being traced.) In view of what Beijing may learn from an initial attack, adjustments in the next US counterintelligence strike against a Chinese intelligence network or operation must be considered even before the first is executed. In a cycle, this approach to attacking Chinese intelligence networks and operations must be adjusted for each new situation and repeated.

To go a step further, one might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them. 

It is unlikely that the senior executives and managers of Chinese foreign Intelligence services are sitting back and gloating about their victories. Rather, it is very likely that everyday they work harder and harder to make their networks and operations better and more effective, pushing their espionage capabilities far-beyond the reach of the counterintelligence services of the countries in which they operate. All of that being said, one might still imagine that soon enough, in a gesture aimed at figuratively putting some dirt in the eyes of US counterintelligence services, the Chinese foreign intelligence services may spend some hours planning some upheaval that their networks could cause in the US to embarrass US counterintelligence services. It would imaginably be designed to knock them well-off track and symbolically mark China’s domination of their opponent on his own home ground. China would also be sending a message concerning its dominance throughout the espionage world. Of course, despite its meretricious effect, whatever such a potential ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would feel enabled to plausibly deny China’s connection to the action. (These are only some thoughts, ruminations, on the situation. Hopefully, this should not cause any undue concern. Or, cela n’a rien d’évident.)

The Chinese have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. To that extent, it is unlikely Beijing wants its intelligence services reaching after anything when their plates are already full follow up on leads they created for themselves. It is possible that the Chinese foreign intelligence services have never seen US counterintelligence services get anything substantial started against their networks in terms of penetration. However, the Chinese will unlikely mistake quiet for security. They probably never really feel secure in the US. It is hard to imagine what might ever be worth the candle to Chinese intelligence services to reach after. Assuredly, impatience in any US operation would be anathema.

People’s Republic of China President Xi Jinping (above). Given the success of Chinese intelligence services in the US, China might soon enough choose to send a message to symbolically mark China’s domination of their opponent on his own home ground. and its dominance in the espionage world. Chinese foreign intelligence services operating in the US may spend some time planning an upheaval that would figuratively put some dirt in the eyes of US counterintelligence services. Despite any meretricious effect such an act might have, whatever such a potential deplorable ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would be able to plausibly deny their connection to the action.

The Way Forward

Month after month, US counterintelligence services discover another set of occasions when China has incommoded a federal agency, a private firm, an academic institution, or research institute by stealing from them classified information or intellectual property most often vital to the national interest. Leave it to say, having engaged in an empirical study of public facts coming in what has been transpiring, the potential trajectory of China’s malign efforts is breathtaking. By 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. However, that is not the case. Perhaps in some allied country, success against China will be achieved showing US counterintelligence services the way forward. With a long history of successfully defending the United Kingdom from foreign spies, it may very well be that MI5 will not have the Cabinet, the Prime Minister, the exalted person herself, wait much longer for good news.

Whether this essay for some will cause a journey from unawareness, curiosity, or a lack of clarity to knowledge, remains to be seen. There has been more than enough talk about how bad the problem with China is. That becomes by the by. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and take the game back to China and destroy all of its networks. It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. In a very small way here, greatcharlie has sought to contribute to development more effective approaches to defeat Chinese intelligence collection efforts in the US. Before writing this essay, greatcharlie fully understood and accepted that there are those singular US counterintelligence services that would be completely uninterested in, and even shun, any voice or meditations from outside the bureaucracy that would dare offer assistance to them in their struggle with China’s intelligence services. (It must be stated that greatcharlie has either been retained to supply any imaginable deficiencies of US counterintelligence services nor has it been retained for anything by any of them.) Often in the US national security bureaucracy, perspectives on adversaries can become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, as suggested,, perhaps an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with Chinese foreign intelligence activity in the US.

With a near endless chain of losses, the following theft sometimes being a greater defeat than the one proceeding it, greatcharlie feels compelled to ingeminate the position expressed in the conclusion of its August 31, 2020 greatcharlie post US counterintelligence services should consider hiring individuals from outside the bureaucracy who are already known due to demonstrated interest in the subject matter and recognized as possessing some ability to present what may be unorthodox innovative, forward-looking perspectives. New thinkers can rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Thinking outside the bureaucracy would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. 

The suggestion should not seem so exotic at this point. Even the adversaries of the US would likely imagine the possibility that some assistance from an unexpected source and direction could pose the greatest threat to their success. Perhaps some US counterintelligence services will never brook the idea of receiving such assistance from outside the bureaucracy. However, in the end, the US counterintelligence service which opens itself up to new, thinking, new insights, new approaches, will very likely bag its tiger. Vigilando, agendo, bene consulendo, prospera omnia cedunt. (By watching, by doing, by consulting well, these things yield all things prosperous.)

Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)

In a nine-count US Deparment of Justice indictment filed in an Atlanta federal court in 2017, the four members of the People’s Liberation Army (PLA) in the FBI poster above were accused of hacking into the Equifax credit reporting agency’s systems, creating a massive data breach that compromised the personal information, including Social Security numbers and birth dates, of about 145 million people, nearly half of all US citizens. There is little need but for citizens to read reports in the news media to know foreign intelligence services were operating inside and outside the US with the intention of causing the country great harm. In To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), James Olson places the efforts of dangerous foreign forces front and center. He explains the efforts being taken by US counterintelligence services to unthread the complicated nature of foreign intelligence activities in the US and drive away the dangers they pose.

There is little need but for US citizens to read reports in the news media to know foreign intelligence services were operating inside and outside their country with the intention of causing the country great harm. In To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), James Olson places the efforts of dangerous foreign forces front and center. However, more importantly, Olson explains the efforts being taken by US counterintelligence services to unthread the complicated nature of foreign intelligence activities in the US and drive away the dangers they pose. As the former chief of Counterintelligence for the Central Intelligence Agency (CIA), Olson is eminently fitted to represent US counterintelligence officers and present their work. In defining counterintelligence, Olson states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” Reportedly, over the years 80 countries, to include allies and friends, have engaged in espionage operations against the US.

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use aggression and force to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so.

From what Olson explains, counterintelligence organizations worldwide must detect necessary attributes of an actor, certain indicia, before initiating a counterintelligence investigation on a suspected “foreign spy” or operative or informant or  foreign intelligence service. The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. That process may not always be easy going. A foreign intelligence officer’s tradecraft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some. Counterintelligence may very well be the greatest manifestation of the paranoia business.

Regarding his career, again, for over thirty-one years, Olson served in the Directorate of Operations of the CIA, mostly overseas in clandestine operations. He was deployed overseas for several assignments, and eventually became chief of counterintelligence at CIA headquarters in Langley, Virginia. At the time he wrote To Catch a Spy, he was retired and working as a Professor of the Practice at the Bush School of Government and Public Service of Texas A&M University. Robert Gates, the former Director of Central Intelligence, 1991-1993 remarked about Olson: “James Olson is a legend in the clandestine service, having served in some of the most difficult, dangerous, and complicated assignments at the height of the Cold War. As director of Central Intelligence, I trusted him without reservation when he was chief of counterintelligence not only because he was enormously capable but also because I knew he thought deeply about the ethical and moral dimensions of what we did every day. Amid the countless books and memoirs of retired spies, especially at this time, this one is essential reading.” Olson was born and raised in Iowa. He studied mathematics and economics at the University of Iowa. Following college, he took a commission in the US Navy, serving aboard guided missiles destroyers and frigates. After a period, he would return to Iowa to study law at the University of Iowa. Apparently, Olson had every intention of practicing law in a small county seat town in Iowa. However, the CIA approached him and invited me to apply for a position in the clandestine service.That us when the story of his life in counterintelligence began.

This book has immediate historic significance because Olson is recognized as an authority among intelligence circles worldwide. There are not so many that have been written so well by former professionals. While others may have their preferences, three of special note and highly recommended by greatcharlie are: Raymond Batvinis, Hoover’s Secret War Against Axis Spies: FBI Counterespionage During World War II (University Press of Kansas, 2014); David Martin, Wilderness of Mirrors (HarperCollins, 1980); and, Scott Carmichael’s True Believer: Inside the Investigation and Capture of Ana Montes, Cuba’s Master Spy 1st ed. (Naval Institute Press, 2007) which Olson refers to in To Catch a Spy.

In Hoover’s Secret War Against Axis Spies–reviewed by greatcharlie on April 30, 2014, the historian, Batvinis, a former Federal Bureau of Investigation (FBI) special agent, presents a crucial chapter in the history of World War II during which the FBI really began and refined its counterintelligence mission. He discusses the FBI’s then new reliance on intrusive investigative techniques (wiretaps bugs, access to bank and financial transaction records), and the evolution of the Bureau’s liaison relations with the British, Canadian, and US military intelligence agencies. (In a proceeding book, his acclaimed, Origins of FBI Counterintelligence (University of Kansas, 2007), Batvinis went off from scratch to tell the reader about the situation.) In Wilderness of Mirrors, Martin tells the story of how an ex-FBI agent William “King” Harvey identified the notorious Soviet double agent Kim Philby in conjunction with James Jesus Angleton, the CIA’s chief of counterintelligence responded to the betrayal of family friend Philby’s betrayal and descends into a paranoid wilderness of mirrors. Wilderness of Mirrors set a benchmark for studies, memoirs, and all other written works on US counterintelligence. It was once required reading for some intelligence professionals–and perhaps it still is. The author of True Believer, Carmichael, was a senior security and counterintelligence investigator for the Defense Intelligence Agency and the lead agent on the successful spy hunt that led to Ana Montes. He provides an inside account of how his espionage investigation, with the eventual help of the FBI, progressed over a period of several years to develop a solid case against Montes. She is the only member of the US intelligence community ever convicted of espionage for the Cuban government. Every twist and turn is all the more intriguing as truths become lies and unlikely scenarios are revealed as reality.

To Catch a Spy is not Olson’s first book. He is also the author of Fair Play: The Moral Dilemmas of Spying (Potomac Books, 2006) Fair Play examines ethical challenges facing US intelligence officers as they attempt to operate within a standard of acceptable moral behavior. That examination is couched in an insightful summary of intelligence history through fifty reality-based scenarios.

To Catch a Spy, 248 pages in length, was released by Georgetown University Press on April 11, 2019. Since then, many others have already formed their own opinion of Olson and his work. For those who may excavate through To Catch a Spy to thoroughly consider points of exposition concerning both himself and activities in which he was engaged, the book has doubtlessly been substantially edifying. The reader is provided with an amazing opportunity to see it all through the prism of a master craftsman as he discusses his profession. Indeed, as with Fair Play, everything Olson provides in To Catch a Spy is founded on his experience during a lengthy career in US counterintelligence. Nevertheless, To Catch a Spy is not a memoir of his life or of his career. That has yet to be written, and perhaps may not be. Still, if one were to go off anyway and measure Olson’s book against the memoirs of Cold War Soviet, Eastern Bloc adversaries of the US there is a decided difference. Those memoirs have a tendency to be anecdote laden, picturesque and exciting. While those who have professionally analyzed them judge them as omitting much, their books typically provide enough nuance to allow for extrapolation, inference, and conceptualization of their tactics, techniques, procedures, and methods. They also often point to their bad choices, pitfalls and ways to minimize losses after encountering them, commonplace wrong turns and remedies to them. That is really what the neophyte needs to receive most.

The author of To Catch a Spy, James Olson (above). Olson is eminently fitted to represent US counterintelligence officers and present their work. For over thirty-one years, Olson served in the Directorate of Operations of the Central Intelligence Agency (CIA), mostly overseas in clandestine operations. He was deployed overseas for several assignments, and eventually became chief of counterintelligence at CIA headquarters in Langley, Virginia. In defining counterintelligence, Olson states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” Reportedly, over the years 80 countries, to include allies and friends, have engaged in espionage operations against the US.

Surely for readers thrilled by spy novels, there was enough provided by Olson to allow them to live vicariously through his anecdotes. In the genre of fiction and nonfiction spy stories, there is an artistic milieu in which–often under the demands of publishers who are intensely interested in selling books–writers seek to position themselves amidst. It cannot be denied that human nature instinctively finds entertainment more compelling than edification. Perhaps even among them, there may be some who will decide after reading To Catch a Spy, that there is nothing so outré about counterintelligence. However, often things seem simple once they have been explained.

Among professionals, not only in the US, but worldwide, To Catch a Spy was likely anticipated with baited breath. That stands to reason that this category of reader would be aware that Olson possesses a huge body of thoughts that most US counterintelligence officers on the job today. There was considerable satisfaction among professionals with his first book, Fair Play. They could have only imagined that To Catch a Spy would be another gem. One might perceive while reading To Catch a Spy that Olson subtly takes on the role of instructor, introducing somewhat nuanced details about certain matters in his lecture as if he were trying to impart the full benefit of his experience to prescient, young CIA counterintelligence officers. To that extent that he does all of this, there is a trace of something akin to a pedagogy for developing the reader’s understanding of the world he is moving them through. A quote widely attributed to one of the most influential artists of the 20th century, Pablo Picasso: “Learn the rules like a pro so you can break them like an artist.” To that extent, novice US counterintelligence officers must master the fundamentals, and the foundation will be laid to explore one’s potential with confidence and an assured step with knowledge and experience of those who came before.

One might expect copies of To Catch a Spy, that may be possessed by US counterintelligence officers from the various services, are treasured and well thumbed. Spotted among reviews of the book on Amazon.com are comments from US intelligence officers in which they attest to the value, positive impact To Catch a Spy had on their thinking and their work. Alex J. Vega IV, Joint Counterintelligence Training Activity (JCITA), Defense Intelligence Agency, and Former U.S. Army Attaché, U.S. Embassy, Moscow, Russia wrote: “Jim Olson has shared with us his accumulated wisdom, lessons learned, and roadmap for the future. To Catch a Spy is the new U.S. counterintelligence standard. It is a must read for serious professionals and anyone interested in the spy world. Jim has done a tremendous service, not only to our generation, but also to those of the next who choose to answer the call to join the counterintelligence battle.” Henry A. Crumpton, a twenty-four-year CIA veteran, author of The Art of Intelligence: Lessons from a Life in the CIA’ s Clandestine Service (Penguin Press, 2012), and CEO of Crumpton Group LLC. remarked: “The author, America’s counterintelligence guru, has crafted a remarkable, indispensable book rich in heartbreaking detail and sharp analysis–serving as a clarion call for a stronger response to the unrelenting, sophisticated, and successful foreign espionage assault on our nation.” Robert M. Gates, Director of Central Intelligence, 1991-1993, stated: “Amid the countless books and memoirs of retired spies, especially at this time, this one is essential reading.”

One could safely state that To Catch a Spy has not been everyone’s cup of tea. Despite such glowing expressions of satisfaction and appreciation, there is a view of the book in which it is asserted that Olson really did not dig down so deep on issues in the text to display his full capabilities as a counterintelligence thinker. He could hardly be so profound, or candid at all. Some professionals worldwide who may have acquired a copy of To Catch a Spy were disappointed when they discovered that the text is not heavy with inferences and insights, and analysis supported by references. In fact, such are rather sparse in the book. In Mark Soares’ review of the book in the scholarly journal Intelligence and National Security, (Mark Soares (2020) To Catch a Spy: The Art of Counterintelligence, Intelligence and National Security, 35:7, 1079-1081, DOI: 10.1080/02684527.2020.1746125), he begins by saying: “James M. Olson has written a deeply personal composition of his extensive career to counterintelligence with the Central Intelligence Agency  (CIA) using a loose and relaxed format not typically seen in intelligence literature.” Explaining Olson’s purpose in writing the book, Soares remarked: “To Catch a Spy serves as Olson’s caution to future US intelligence practitioners and to his country as a whole to pay far more attention to counterintelligence matters rather than focusing all efforts on collection.” However, Soares would eventually judge the book critically, stating: “Though To Catch a Spy is undoubtedly an entertaining read, scholars and academics will be disappointed by the absence of references, with Olson opting instead to use informal notes to add background details to organizations,  individuals, tradecraft terms, or historical events mentioned in the book (pp. 203-217). Many of the events described by Olson could have been referenced more properly given the abundance of information available on such topics.”

For security reasons, Olson admits to having doffed his cap to his former employer so to speak by submitting To Catch a Spy to his former employer, CIA, for review. It is a requirement for officials from the US Intelligence Community with backgrounds as Olson. In Olson’s case, his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any information that would provide some nuance on how the US detects and catches spies would be of the utmost interest and importance to the foreign intelligence services of adversaries as well as allies. One can only imagine an individual with his wealth of knowledge is holding back considering how much more he could have potentially ruminated upon in the book. Under such circumstances, it is understandable that Olson’s lack of profundity would disconcert some.

If Olson were writing only for intelligence professionals, he would have a diminutive audience. While some US counterintelligence professionals might nonetheless view it as their book, To Catch a Thief is a book published for the largest audience possible. To that extent, Olson does not take for granted how much the reader can absorb from what he teaches. It is evident that he takes control of that process, apportioning how much of the story he feels would be appropriate. When he feels the reader should be ready for more, Olson increases the quantity and complexity in his anecdotes.

Even after what could be sardonically characterized as Olson’s generous effort to spoon-feed some readers, other concerns about how the book was written were voiced by reviewers from outside of the profession. In the New York Journal of Books, Michael McCann wrote: “To Catch a Spy struggles to the finish line far behind many other, better publications in terms of immediate relevance. Which invites an important question: Who is Olson’s intended audience?” On that point McCann goes on to state: “To Catch a Spy will provide a useful textbook for students taking Olson’s courses at the Bush School. No doubt they will be quizzed on his ten commandments, the three principles of workplace counterintelligence, and other key points. It will also help them write summaries of important counterintelligence cases over the years and the lessons learned from them.” Leaving no doubt that he was disappointed by the book, McCann states: “For the general reading public, however, To Catch a Spy doesn’t really appeal. Those looking for “juicy new disclosures” will be disappointed as they wade through material just as easily accessed at no cost by googling for it online.”

In its review, greatcharlie, using its understanding of the subject as a nonpracticioner, observing from outside the bureaucracy, follows those aspects of the book closely. The last outcome greatcharlie wants is for its review to boil down to discussion of “Olson left this out. He left that out. He did not elaborate enough here or there.” Despite any concerns about what was missing in the text, in its review of To Catch a Spy, greatcharlie explores what one can appreciate and learn about Olson’s thinking process from what he does provide in the text. However, what is most impressive about To Catch a Spy to greatcharlie is the manner in which it stimulates thought on the issues presented. Books that can stir a fire inside the reader, and a passion for a subject, are the most memorable and most enjoyable to sit with. To that extent, included in the review are greatcharlie’s own thoughts about counterintelligence topics covered by Olson which hopefully will assist some readers in better understanding what Olson is presenting to them. It is also hoped that thoughts shared by greatcharlie will encourage readers to weigh  their own impressions on those topics and develop of their own insights on them whether they may be actual intelligence practitioners or just enthusiasts. Additionally, greatcharlie offers its own thoughts on those topics to assist in giving context to the work of US counterintelligence to the US public, nonprofessional readers, in particular, and, in turn, offer some perspective to the counterintelligence professional on how the ave4age US citizen perceives his or her work. With any luck, what is presented will appropriately resonate among both sets of readers. Rationale enim animal est homo. (Man is a reasoning animal.)

The Headquarters of the Russian Federation SVR in Yasenevo (above). The first three chapters of To Catch a Spy  form a compendium of efforts Olson spotlights of respective Chinese, Russian, and Cuban foreign intelligence services against the US. This is a matter that absolutely merits treatment particularly for the sake of the intelligence enthusiasts and the nonpracticioner. It is great that Olson broached the matter early in his book. The intelligence services of China, Russia, and Cuba are driven by the same concepts and intent that typically drive the leadership of their respective authoritarian countries: greed, cruelty, and lust for power, even world domination. It is fairly well-known outside of the intelligence world that China has concerned the US greatly of late.  Olson’s compendium of adversarial intelligence services activities essentially provides a run down of those respective adversaries’ intelligence operations, both successes and defeats. Much of the information on the cases used to support any small assertions by Olson on the nature of these adversaries’ respective efforts has already been made public. In fact, they were presented in some detail via US Department of Justice indictments and criminal complaints for those cases.

Country Reports on the Main Adversaries of the US

The first three chapters of To Catch a Spy  form a compendium of efforts Olson spotlights of respective Chinese, Russian, and Cuban foreign intelligence services against the US. This is a matter that absolutely merits treatment particularly for the sake of the intelligence enthusiasts and the nonpracticioner. It is great that Olson broached the matter early in his book. The intelligence services of China, Russia, and Cuba are driven by the same concepts and intent that typically drive the leadership of their respective authoritarian countries: greed, cruelty, and lust for power, even world domination. It is fairly well-known outside of the intelligence world that China has concerned the US greatly of late.  Olson’s compendium of adversarial intelligence services activities essentially provides a run down of those respective adversaries’ intelligence operations, both successes and defeats. Much of the information on the cases used to support any small assertions by Olson on the nature of these adversaries’ respective efforts has already been made public. In fact, they were presented in some detail via US Department of Justice indictments and criminal complaints for those cases.

Suspected spy for the Communist Party of China, Christine Fang (above). It was revealed in 2020 that Fang had established contacts and some relationships with several political officials from mayors and local council members, to Members of the US Congress as part of an effort by China to infiltrate US political circles. Olson explains that the Chinese have been trying to influence US political campaigns through illegal contributions since at least the 1990s. Olson says China is in a class by itself in terms of its espionage, covert action, and cyber capabilities. He admitted the US was not doing enough now to prevent China from stealing its secrets. Olson reports that the goal of China’s massive espionage, cyber, and covert action assault on the US is to catch up with the US technologically, militarily, and economically as quickly as possible.

China

Olson explained that China is in a class by itself in terms of its espionage, covert action, and cyber capabilities. He admitted the US was not doing enough now to prevent China from stealing its secrets. Olson explains that the goal of China’s massive espionage, cyber, and covert action assault on the US is to catch up with the US technologically, militarily, and economically as quickly as possible. Olson asserts that if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

There were four important disclosures by Olson on Chinese espionage, which, despite claims from some reviewers were well-known, in greatcharlie’s view can at least be said to have been given “proper” additional light in his discussion. They include the restructuring of the Chinese intelligence services, the political work they do in the US, concerns that a possible mole is ensconced in the US Intelligence Community, and again, the enormity of Chinese espionage. Regarding the Chinese intelligence apparatus, he explains that it was restructured in 2015 and 2016. The principal Chinese external intelligence service is the Ministry of State Security (MSS)., which is responsible for overseas espionage operations. The Ministry of Public Security (MPS) concentrates on domestic activities but also occasionally runs agents abroad. The MSS and MPS were relatively unaffected by recent organizational changes in the Chinese intelligence community. The major impact has been on the People’s Liberation Army  (PLA), which since the 1950s has been heavily engaged in intelligence operations. The PLA in theory has concentrated on military intelligence, but it has actually defined its role more broadly. Olson reports that it has competed with the MSS in a wide range of economic, political, and technological intelligence collection operations overseas, in addition to its more traditional military targeting. The PLA is still responsible for the bulk of China’s cyber spying. However, Olson points to indications that the MSS has been assigned an expanded role in this area as well. Concerning how it is all organized, Olson reveals that the PLA’s human intelligence (HUMINT) operations are managed by the Joint Staff Department, and comes under the Central Military Commission. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence like certainly capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission.Thus, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), the rough equivalent of the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare have been rolled into the new Strategic Support Force. Olson explains that much as all intelligence services worldwide, both the MSS and the PLA make regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. They aggressively use Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection. Olson takes the position, disputed by some experts, that Chinese intelligence services take a vacuum cleaner approach and collect literally any kind of data they can get their hands on in the US.

Olson explains that the Chinese have been trying to influence US political campaigns through illegal contributions since at least the 1990s. He points to the huge row raised in 1996 when the Washington Post reported that the US Department of Justice was investigating possible illegal Chinese contributions to the Democratic National Committee (DNC) in an effort to influence both the Presidential and Congressional election that year. After getting into a handful of pertinent details about two Chinese businessmen, Johnny Chung and John Huang, Olson explains that the FBI determined that the 1996 illegal funding operation was coordinated from the Chinese Embassy in Washington. Olson says the issues at stake for the Chinese government are not difficult to devine: US support to Taiwan, intellectual property law, trade policies, the environment, human rights, and Asian security. China denied any role in the influence buying. Going a step further, Olson warns that candidates of both political parties have been targeted for influence buying. Chinese hackers have been detected in the campaign websites of both candidates in every presidential election since 2000, another indication that the threat of Chinese election tampering has not gone away. In 2016, Virginia governor Terry McAuliffe was notified by the US Department of Justice that he was the target of investigation for allegedly accepting a questionable campaign contribution of $120,000 from Chinese businessman Wenqing Wang. McAullife was not charged with any crime. There has been considerable controversy lately about alleged Russian tampering in the US presidential Election of 2016. Such allegations, Olson duly notes, should  be investigated thoroughly, of course, but he points out that the Chinese have been engaged in such activities for 20 years.

Olson notes that in a May 20, 2017 New York Times article informed that 18 to 20 of the CIA’s best spies inside China had been imprisoned or executed. The New York Times based its information on “ten current and former American officials” who chose not to be identified. According to Olson, the losses actually occurred between 2010 to 2012 and effectively wiped out the CIA’s excellent stable of assets inside the Chinese government. Olson proffers, “If true, this disaster is eerily reminiscent of the decimation of the CIA’s Soviet agent program in 1985.” The fact that Olson would even discuss the New York Times report in To Catch a Spy, gives the story far greater credence than it would have otherwise. With regard to what occurred from 1975 to 1985, the CIA built up a remarkable inventory of well-placed agents inside the Soviet Union–only to see them disappear, one by one, because of what Olson describes  “the perfidy” of Edward Lee Howard and Aldrich Ames. According to the New York Times report, the CIA’s counterintelligence theories about what went wrong in China have mirrored the same avenues that  it explored after 1985. Olson laid out a few of the questions that were asked by US counterintelligence services: “Could our compromises have been the result of sloppy tradecraft? We’re we being beaten on the street? We’re our secret communications being intercepted? Or did we have a mole?”

Olson says arrests in rapid succession in a compressed period usually point to a mole. In fact, a former CIA case officer, Jerry Chun Shing Lee, was arrested by the FBI in January 2018 and charged with espionage. After Lee left the CIA in 2007, he moved to Asia with his family and was doing business there. In 2010, he was allegedly approached by Chinese intelligence officers. If, as alleged, Lee gave up the identities of CIA spies in China, Olson believes he either took notes with him when he left the agency in 2007 or remembered who they were. Olson reports that the FBI, as part of its investigation, was looking closely at deposits made to Leeds bank account. It took 9 years to catch Ames. Olson states: “I hope it will not take that long to figure out what happened in China and, if the problem is in fact human, to bring the traitor to justice.

Olson submits to the reality that enormity of the Chinese espionage effort is staggering, noting that the FBI announced in 2015 that it had seen a 53 percent increase in economic espionage against US companies over the previous year, and most of it from China. US companies remain extremely vulnerable despite being aware of the Chinese threat. According to Olson, the MSS and PLA primarily play the ethnic card in their recruitment operations. They target a large number of ethnic Chinese–the “overseas Chinese”–who live in the US and virtually every other country in the world. Still, the MSS and PLA would also engage in nonethnic recruitment of US citizens. Those nonethnic recruits, Olson says are few in number, have done serious damage given reports on their activities.

Olson presents the statistic that approximately 4 million ethnic Chinese in the US are only a generation or less from the mainland and great numbers of them still have relatives in Communist China. He says many of them also still feel pride and sympathy for the culture and accomplishments of China, particularly the build up of economic and military strength under Mao and his successors. Olson states that the common tactic is to play on loyalty to Mother China and to exert pressure via relatives still living in China. A Chinese-American working in the US government or in a high-tech firm would usually be approached on that basis, but he notes that venality and greed can also play a large role in any recruitment of a spy. Olson says that all US citizens who visit China are assessed as potential recruitment  targets–and those who he access and show susceptibility are singled out for aggressive development. To emphasize how well Chinese recruitment efforts work, Olson provides a partial listing of Chinese-Americans who have fallen to this trap, the information they were instructed to collect, and where they were located: US Navy Lieutenant Commander Edward Lin, caught providing classified military information; Szuhsiung Ho, caught recruiting six other US engineers to provide nuclear technology to China; Peter Lee, caught providing naval technology and defense information to China; China Mak, caught passing classified information on surface ships and submarines; Fe Yei, caught stealing computer microprocessor technology for China; Walter Lian-Heen Liew, caught providing chlorides-route titanium dioxide production technology to China; and, Greg Chang, caught providing proprietary information on the US space program to China. Olson then devotes a page and a half to the case of Katrina Leung, whose objective was not to steal technology but to infiltrate US counterintelligence. His account provides less about tradecraft, having been errantly recruited by the FBI as a counterespionage agent, she used and told more about the details of her relationship with two FBI counterintelligence officers, James Smith and William Cleveland.

As for nonethnic recruits of the MSS and PLA, Olson presents summaries of the cases of Benjamin Bishop, caught passing classified defense information to his young Chinese girlfriend; Candace Claiborne, having served in Shanghai and Beijing as a State Department employee, she was caught cooperating with Chinese intelligence; and, Glenn Duffie Shriver, recruited by MSS while visiting China as a student was caught delivering stolen military technology to his intelligence handlers. Curiously, even though Olson explains that he has presented only a partial list of ethnic and nonethnic recruits caught by US counterintelligence services, the list appears rather diminutive given his own admission that there is a vast Chinese intelligence collection effort currently underway in the US. There would surely be some reason for US counterintelligence services to be proud of the outcome of investigations into the activities of those captured. However, far more will need to be done before they begin to even stem Chinese espionage in the US. (A discussion of the transition from ethnic to non-ethnic recruitment by can found in greatcharlie’s July 31, 2020 post entitled “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”

Olson touches on two recurring themes in discussions on Chinese intelligence: students and cyber attacks The question of Chinese students in the US, is especially pertinent. According to another statistic that Olson offers, in 2016-2017 there were 350,755 Chinese nationals studying at US colleges and universities, accounting for approximately one third of the total of international students in our foundry. He points to that fact that a large majority of Chinese students are studying science or engineering, fields that have direct relevance to China’s industrial and military aspirations. Olson reveals that many Chinese students are encouraged by Chinese intelligence to remain in the US, to obtain employment, and to acquire lawful permanent resident status. Lawful permanent residents can apply for US citizenship after five years of residence, three years if they are married to a US citizen. Naturalized US citizens are eligible for US government security clearances after five years of citizenship. Olson says these regulations represent a trade off between our need for certain skills–particularly technical skills–and security. Olson notes that the US Intelligence Community feels any intelligence service worthy of the name would jump at the chance to infiltrate its officers and co-optees into government agencies, national laboratories, and high technology firms of a priority target country. While admitting that he had no data to support that position, he says it is inconceivable to him that the MSS and PLA would have overlooked this enticing and easily exploitable path to access.

Regarding cyberattacks from China, Olson notes that they are nothing new. The first major attack was discovered in 2005, but it was quickly determined that infiltrations of US government computer networks had been going on since at least 2003. Olson relates that the 2003 operation, dubbed Titan Rain, was a coordinated attack by Chinese cyber spies to download sensitive Data from networks at the US Departments of Defense, State, Energy, and Homeland Security, as well as a host of US defense contractors. In one day, the hackers stole reams of sensitive aerospace documents with schematics of propulsion systems, solar paneling, and fuel tanks for NASA’s Mars Reconnaissance Orbiter. Other targeted locations included the US Army Information Engineering Command, the Naval Oceans Systems Center, the Missile Defense Agency, and US national laboratories. Olson says cyber attacks such as Titan Rain present a unique challenge in terms of attribution. In the case of Titan Rain, however, Olson explains that it is not credible to conclude that a multifaceted and sophisticated operation of this magnitude could be anything other than a Chinese government-sponsored activity.

In 2010, Google announced that the company had detected a “highly sophisticated and targeted attack on [its] corporate infrastructure originating from China that resulted in the theft of intellectual property from Google.” While China’s involvement in cyber attacks was by no means surprising, Olson supposes Google’s decision to publicize the breach was unusual. Typically, companies are wary of publicizing such leaks for fear that perceptions of insecurity could negatively affect their business. The explanation may lie in the fact that Google executives, who had continually met resistance from the Chinese government regarding censorship since the company had entered the Chinese market in 2006, finally decided enough was enough.

Google first learned of the attack from Chinese human rights activists in the US who had reported that their Gmail accounts had been accessed by unknown users. As details of Operation Aurora, as it was called, surfaced, it became clear that the attack was highly tailored and complex. The cyber spies exploited a flaw in Internet Explorer 6.0 to gain access to targeted computers. Once the vulnerability was identified, the hackers determined which officials at various companies had access to sensitive information. Emails that, once opened, installed malate on the target computers were then sent from servers in Taiwan to the chosen company officials. The hackers from then on had unfettered access to the officials’ computers and could steal any information they deemed valuable. Google was not the only US firm targeted by the Aurora cyber spies. No less than 34 companies, to include Yahoo, Symantec, Adobe, North run Grumman, and Dow Chemical, were victimized. The Washington Times reported, “Each of the companies was targeted differently, using software developed from the attackers’ knowledge of the individual networks and information storage devices, operating systems, the location of targeted data, how it was protected, and who had access to it.” According to federal cybersecurity experts, attacks of Aurora’s precision and sophistication could be achieved only with substantial the government’s support.

Perhaps the most egregious of all the attacks on US computer systems became public in June 2015, when the Office of Personnel Management (OPM) announced that its database had been breached by unknown persons. The personnel records of 21.5 million US government employees, past and present–including Social Security numbers, biographical information, and the results of security background investigations–were stolen. The information, in Olson’s informed view, would be a gold mine for any intelligence service seeking to spot, access, and develop US government employees for future recruitment. The US Intelligence Community placed blame for the attack squarely on China. Beijing denied any official responsibility for the breach and, in fact, announced in December 2015 that it had arrested a small group of nongovernmental hackers for having committed the crime. No information was provided on the hackers’ identities, place of deployment, or sentencing. Skeptics suspected a convenient cover-up to ease tensions with the US before a scheduled visit of People’s Republic of China President Xi Jinping. Olson s that the only Chinese entity, state sponsored or otherwise, that he could think of that would have a motive for stealing all the OPM data is the MSS. The administration of US President Barack Obama signed a bilateral agreement in September 2015 pledging that neither side would use cyber attacks to steal intellectual property for commercial purposes. According to Olson, a US cybersecurity company documented a Chinese cyberattack on a US company the day after the agreement was signed. In the three weeks that followed, there were at least seven more attacks from China against US high-tech companies. 

The current director of the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Sergey Naryshkin (above). Second place on Olson’s list of  counterintelligence threats to the US goes to the Russian Federation Following the Soviet Union’s collapse, the monolithic Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. was divided into two new agencies, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB and Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Despite the democratic posturing and economic liberalization of the early years, in the end, not to much changed about Russian activity in the US. Many of the KGB’s old and young guard stayed on and simply moved into new offices in Yasenevo for the SVR or the Lubyanka for the FSB.

Russia

Second place on Olson’s list of  counterintelligence threats to the US goes to the Russian Federation (Russia). Despite the democratic posturing and economic  liberalization of the early years following the collapse of the Soviet Union, Russian security services did not change much. Intelligence was reorganized in Russia in 1991. The monolithic Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. was divided into two new agencies, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB and Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Unlike the former satellite countries of the Eastern Bloc (e.g., Poland, Bulgaria, Czechoslovakia, East Germany, Romania, Hungary, Latvia, Lithuania, and Estonia), where intelligence services of the new democratic regimes purged old Communist apparatchiks, many of the KGB’s old and young guard stayed on and simply moved into new offices in Yasenevo for the SVR or the Lubyanka for the FSB. The Russians did not consider it professionally disqualifying for someone to have served previously in the repressive and undemocratic KGB.  When Olson mentions that organization, it must be made clear that he viewed it as “a ruthless and vicious organization that oppressed its own people, crushed religion, sent political dissidents to gulags or psychiatric hospitals, and killed its enemies.” Olson describes the FSB as being responsible for Internal security in Russia, specifically counterintelligence, counterterrorism, domestic unrest, state crimes, and border security. Meanwhile, the SVR is responsible for external intelligence collection and covert action. With this structure Russia has aligned itself more closely to the US and United Kingdom models , in that the FSB is the rough equivalent of the FBI or the Security Service (popularly referred to as MI5) and the SVR corresponds to the CIA or the Special Intelligence Service, popularly known as MI6. (An explanation of the United Kingdom’s nomenclature of MI5 and MI6 is provided in some detail in greatcharlie’s December 11, 2020 post.) Russian military intelligence is the responsibility of the Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU which has operated under that name since World War II. 

Olson says that there was real optimism, even a belief in some quarters, that the US Intelligence Community could forge a new relationship with the Russian intelligence services on the basis of trust and cooperation, particularly in areas of common concern, transnational interests. They included counterterrorism, narcotics, and organized crime. Olson said that some of the early talks between representatives of the two services were so encouraging that “the US side decided it did not want to jeopardize this potential intelligence détente by getting caught in any kind of provocative spying against our new ‘friends.’” The problem with that line of thinking was illustrated by Olson when pointed to the episode of former KGB archivist Vasil Mitrokhin. Mitrokhin provided MI6 with a gold mine of documentary intelligence on Russian espionage information from the revolution to the 1980s. However, Mitrokhin had initially attempted to provide the information to the CIA, but Olson explained he was rebuffed based on the rationale that the CIA did not want to antagonise the SVR given its aims of establishing a cooperative relationship with that Russian intelligence service. 

Then what Olson describes as an avalanche of bad news came when it was discovered that both the SVR and the GRU intelligence operations against US personnel and installations worldwide had never ceased. They were in fact being conducted aggressively. Olson then points to the cases of CIA officers Aldrich Ames, Edward Lee Howard, Harold James Nicholson, FBI special agents Earl Edwin Pitts and Robert Philip Hanssen, and the US Army’s George Trofimoff.

Another Russia concern to which Olson draws the reader’s attention was the case of a group of illegals–described by Olson as professional intelligence officers living in the US under false identities–intercepted by the FBI in 2010. The case was made very public and news stories on it garnered considerable public interest, with focus placed on a divorce, Anna Chapman, who held dual Russian and United Kingdom citizenship. Olson remarks on the politics of the illegals detainment, trial, and exchange. Olson also gives attention to Russian information warfare, which he explains supplements their human intelligence efforts. 

Cyber spying is widely used by Russia to interfere in the politics of other foundries, to manipulate their populations, to spread disinformation, to conduct unconventional warfare, and to collect intelligence. The Russian objective is to harass, to discredit, to disrupt, to deceive, and to spy on rival states. The last ten years have seen not only a dramatic increase in the frequency of Russian cyber activity, but also, what Olson alarmingly characterizes as a quantum leap in the brazeness, sophistication, and destructiveness of the attacks.

Olson reports that the FSB has taken the lead in launching denial-of-service attacks on foreign governments and sponsoring anonymous “web brigades” that bombard political blogs and other forums with disinformation and pro-Russian propaganda. The GRU’s cyber capabilities are primarily directed at supporting military interventions, but the GRU is suspected of also having carried out cyber attacks on non-military objectives, such as the German Bundesamt and French television station. The lines of responsibility between the FSB and GRU are blurry and overlap, leading to a possible duplication of cyber efforts. The SVR uses cyber operations to support human intelligence operations. Although it is not as directly involved in cyber operations  as the FSB and GRU are, it plays a planning role in overall cyber strategy.

According to Olson, Russian cyberspying first surfaced on the world stage in a big way in Estonia in 2007. Russian-Estonian relations fell to a new low over the removal of a Russian war memorial. At the height of the controversy, Estonia was hit by a massive denial-of-service attack on government offices, political parties, banks, and media outlets. In 2008, as a prelude to the Russian armed forces invasion of the Republic of Georgia, the voluntary was victimised by well-orchestrated cyber attacks creating disarray. Internet services were rerouted and blocked, websites were defaced with pro-Russian propaganda, and news agencies websites were attacked, and in some cases brought down. The Russian annexation of Crimea in 2014 was followed by waves of sophisticated cyber attacks against Ukraine’s central government in Kiev. Separate attacks on energy suppliers, the power grid, the financial sector in Ukraine, as well as the Ministry of Defense in years since.

Olson asserts that unlike Chinese espionage, which he characterized as being based on China’s cold, objective attitude toward the US, an impersonal self-interest, Russian spying is predicated on a certain animus toward the US. Olson concludes that Russian Federation President Vladimir Putin “does not like us,” and says his grudge is personal. Olson believes that in sheltering Edward Snowden, who he describes as a “contemptible US turncoat,” Putin is showing his disdain for the US.

Olson informs that when the US Intelligence Community is interviewing applicants for employment today, it sometimes refers to the “Big Five” foreign languages that are in highest demand: Chinese, Arabic, Farsi, Korean, and Russian. The Russian language is still on the list for good reasons, not the least of which is that the SVR and the GRU are all over us. Olson believes that Russia will remain a major counterintelligence concern for the US for the foreseeable future. He concludes that the US would be naive in the extreme to believe that it could ever expect good faith from Putin.

Ana Montes (above) was a Defense Intelligence Agency analyst arrested in 2001 on charges of committing espionage on behalf of Cuba. According to Olson, the Cuban DGI was the most effective intelligence service the US counterintelligence faced. A noteworthy aspect of Cuban intelligence activity in the US is the quality of the tradecraft. In the case of Montes, for 16 years she passed the DGI everything she could get her hands on related to US counterintelligence efforts against Cuba. It was no small feat for the Cubans to run her case and others as long as they did and in hostile territory under the noses of US security and counterintelligence officials without getting caught. (Olson gives the Montes case substantial treatment in Chapter Eight.)

Cuba

Olson’s review of the Cuban threat was perhaps the best written of the three assessments. Olson declares that the Cuban Intelligence service may be the most effective service that US counterintelligence services face. The Cuban Intelligence Directorate, formerly known as General Intelligence Directorate or DGI was established by the First Secretary of the Communist Party of Cuba, one time Cuban Prime Minister, then Cuban President, Fidel Castro, in 1961 to preserve the Revolution; to collect intelligence on Cubans enemies, both foreign and domestic; and, to carry out covert action operations as directed. Castro was aware as early as 1961 that President Kennedy and his brother Robert Kennedy, the US Attorney General, were trying to have him assassinated through a variety of CIA plots that never came anywhere near fruition. The DGI reportedly became Castro’s tool of choice to carry out his vendetta against the CIA and the US.

Olson states the Cuban DGI cannot compete with the Chinese or the Russians in terms of overall damage to US national security, but that is primarily a function of its smaller size, narrower objectives, and limited resources. However, perhaps  it should  have been added, as Olson is surely aware, under furtive cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked or position themselves, to support the intelligence efforts  of other countries when there is a common interest or considerable benefits of all kinds. Reportedly, friendly foreign intelligence services are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and  inside the US. Many foreign intelligence services of other countries, particularly medium to small sized organizations actually love being brought into US intelligence operations of any kind. It gives them the opportunity to have a place at the table with the US, there will usually be important lessons learned, supposedly good relationships with US counterparts will be enhanced or created, and most of all, there will be financial benefits courtesy of the US taxpayer.

In their recruitment operations against the US, Olson reveals that the Cubans, much as the Chinese, often benefited from non-monetary inducements, ideological  in the case of the Cubans, ethnic in the case of the Chinese. That sort of recruitment is often facilitated by the fact that many of the US citizens who worked for the DGI and the MSS essentially volunteered their services. Another noteworthy aspect of Cuban intelligence activity in the US that Olson points to is the quality of the tradecraft. The longevity of an espionage operation is largely a result not only of the skill of the handling officer but also the techniques and equipment used to run the operation securely.

Olson reveals that in 1998, the FBI broke up a large Cuban espionage operation in South Florida called the Wasp Network (Red Avispa). This network consisted of fourteen or more Cuban spies who had the mission of penetrating anti-Castro organizations in Florida. Evidence against some of the members was too thin for prosecution, but five ringleaders stood trial and we’re convicted of espionage and other crimes. One of the Cuban-American groups, the Wasp Network, infiltrated was an organization named Brothers to the Rescue. Brothers to the rescue flew aircraft in and around Cuban airspace to assist people fleeing in boats and to drop anti-Communist propaganda leaflets. The organization was clearly a thorn in Castro’s side. As the story goes, a member of the Wasp Network found out the flight plan of Brothers to the Rescue flight to Cuba in February 1996. Cuban fighter aircraft shot down the plane in international airspace, and all four Cuban-American on board were killed. (It stands to reason that the Soviet Union, which in its day essentially armed the Cuban military and security forces, would have provided Cuba with more than a rudimentary capability to monitor nonmilitary flights from the US that did not use electronic countermeasures as well as the weapons systems to shoot down from the ground and fighter-jets that could scramble and intercept Brothers to the Rescue missions. Perhaps there was a greater reason to shoot down the 1996 flight, due to someone in particular being on board or to demonstrate Cubans capability to some operatives or informants that supported the collection of the flight plan, that led to what occurred.)

While Olson gives the case of Ana Montes greater treatment in Chapter 8 “Counterintelligence Case Studies,” notes in this chapter that due was a Defense Intelligence Agency analyst arrested in 2001 on charges of committing espionage on behalf of Cuba for at least 16 years. During that period Montes passed the DGI everything she could get her hands on related to US counterintelligence efforts against Cuba. Olson writes that the tradecraft the Cubans used in handling Montes was fantastic, a credit to the art of espionage. Olson comments that it was no small feat for the Cubans to run cases as long as they did and in hostile territory under the noses of US security and counterintelligence officials without getting caught. Montes was sentenced to 25 years in prison. 

Interestingly, Olson notes here that the CIA could penetrate the KGB and sometimes count on it to make tradecraft mistakes, but it was not so fortunate when dealing with the the DGI. Perhaps Olson was a bit exuberant about presenting the DGI as a formidable foe or maybe there was some simple oversight, but the notion that the Cuban intelligence was somehow less able to make mistakes somewhat contradicts what was one of the more remarkable aspects of the Montes case as recounted in the text. As Olson describes in Chapter 8, Montes was coached by DGI on tradecraft to include erasing everything incriminating from her hard drive. He notes that Montes either did not follow instructions or they did not work because the FBI recovered a treasure trove of espionage traffic on her Toshiba laptop.

Olson goes on to discuss the case of a retired State Department official, Kendall Myers, and his wife, Gwendolyn Myers, who were arrested on charges of having been DGI agents for almost 30 years. Myers joined the US Foreign Service with a top secret clearance in 1977. Later he was given even higher clearances when he was assigned to the highly sensitive Bureau of Intelligence and Research  at the State Department. Myers sympathised with the Cuban Revolution and believed that the US was subjecting Cuban government and people to unfair treatment. His response, probably beginning in 1979, was to spy for Cuba. With help from his wife, Gwendolyn, he engaged in a full-fledged espionage relationship with the DGI. Until Myers’ retirement in 2007, he passed top-secret documents and other classified material to the DGI in a sophisticated system of dead drops and brush passes. During their trial, it became known that the Myers had received personal congratulations from Fidel Castro. The damage they did to US national security was incalculable.

As for the CIA’s recruitment of DGI officers, it was more likely that there would be a walk-in, attempting to escape from problems of their own making with the DGI. The case Olson points to is that of Florentino Aspalllaga Lombard. Referred to by Olson as Aspillaga, he was the highest ranking defector from DGI that the US ever had. Olson was directly involved in his case. In 1987, while Olson was posted to the US Embassy in Vienna, he was summoned to his office by an agreed parole indicating that there was a walk-in. That walk-in was Aspillaga, and he was accompanied by a teenaged girl who was his mistress and the daughter of an official of the Cuban Embassy in Prague. Aspillaga, had left his wife and three children and was on the run, hoping to find a new life as a couple in the US. Aspillaga offered their services to the CIA as barter.

In what Olson called a sensational revelation, Aspillaga told the CIA that former CIA officer Philip Agee had cooperated with the DGI and had been paid close to $1 million. Agee’s role as a DGI agent was later confirmed by former KGB officer Oleg Kalugin, citing his memoir, Spymaster: My 32 Years in Intelligence and Espionage against the West (Smith Gryphon, 1994) as his source. Kalugin said Agee had walked into the KGB in 1973, had been turned away as a suspected provocation, and then had gone to the Cubans. Agee, a graduate of the University of Notre Dame, joined the CIA in 1957. He served in a series of undercover assignments in Latin America in the 1960s, supposedly becoming more and more disillusioned by what he considered CIA support of right wing dictatorships. While assigned to Mexico City in 1968, Agee resigned from the agency, moved to Europe, and began his new career of neutralizing the CIA. In 1975, he published a book, Inside the Company: CIA Diary, a detailed description of his career and exposé of CIA activities in Latin America. Most damaging of all, he included the names of 250 CIA undercover officers and foreign agents (operatives and informants). thereby disrupting CIA officers’ clandestine careers and subjecting them to considerable personal risk. The foreign agents he identified were exposed to the even worse fate of possible imprisonment or execution. The CIA chief of station in Athens in December 1975, shortly after he was outed by Agee. Agee’s guilt has never been proven conclusively, but few CIA officers believe that the timing of Welch’s killing was a coincidence.

Olson states that Agee’s US passport was revoked in 1979, but he still traveled widely, mostly in Europe, for the next several years using passports provided by the leftist governments of Grenada and Nicaragua. In subsequent books and magazine articles, Agee continued his denunciations of the CIA and the US government and disclosed the identities of an additional one thousand CIA officers and agents. Olson states here that it was clear at that point that he was not operating on his own but was getting help from a foreign intelligence service. Olson does not explain or support this fact with any data. Hopefully, he is not theorizing on a hunch but is rather presenting an inference that he can support. Whenever one theorizes in such a way without fact, one makes a capital mistake. Olson goes on to explain, unfortunately, under US law at the time, the unauthorized disclosure of the names of undercover US personnel was not a crime, so Agee could not be indicted and extradited to the US. Additionally, he remarks that Agee was operating on behalf of the DGI could not be denied after 1989. Then by Olson to state Agee’s involvement with the KGB was a near certainty  because of the close relationship that existed between the DGI and the KGB. To support this, Olson points to a statement by Kalugin in Spymaster that he read reporting from Agee that the DGI passed to the KGB. Olson claims it is inconceivable to me that the KGB would let its client service run a source of this magnitude without inserting itself into the operation.

Yet, despite what Olson inferred, the data may suggest otherwise. By Olson’s own admission, the KGB rejected Agee for recruitment in 1973. Senior executives and managers at Moscow headquarters would need to reverse a decision. They may not have been that flexible. The DGI apparently rejected the KGB’s original evaluation of Agree. That seemed even more interesting to consider. Olson then reveals that in 1989, Agee played a key role in a DGI operation against the CIA. He posed as a CIA official from the inspector general’s office in a fiendishly clever recruitment operation against a young CIA officer stationed in Mexico City. Mexico City was once Agee’s beat for the CIA, at least until 1968. Still, Agree was completely unrecognizable to US Embassy security as well as Mexican authorities. Mexico City was also being watched closely as it had a well-known role as launch pad for Soviet and Eastern Bloc operations against the US, particularly California, Nevada New Mexico, Arizona, and Texas. Reportedly, Agee contacted the CIA officer and told her that he was conducting a sensitive investigation of alleged wrongdoing by the CIA in Mexico City, possibly involving senior management. He asked for her help in carrying out a discreet investigation that would not alert the targets. Agee ordered her on behalf of the inspector general not to discuss his approach with anyone. He managed to elicit significant information from the young officer.

As far as recruiting DGI officers, Olson did not provide any information on such operations being successful. Rather, from another revelation by the DGI walk-in, Aspillaga, it was discovered that all 38 of the Cubans the CIA thought it had recruited over the previous 26 years were double agents, controlled and running  against the US by the DGI. This was a devastating indictment of CIA counterintelligence, one of the worst and most embarrassing compromises we ever had. Olson laments, “The DGI beat us–and beat us soundly.” According to Olson, the CIA’s damage assessment was long and painful. The intelligence that the CIA disseminated from  the bogus agents had to be recalled since it was all DGI-concocted disinformation. The CIA’s tradecraft handling the controlled agents had been completely exposed to the DGI, which later ridiculed the CIA in a TV special for the agency’s alleged amateurishness and sloppiness. The CIA lost all the clandestine equipment it had provided to the Cuban assets, including a then state-of-the-art burst satellite communications system. Olson also considers that the cash that the CIA paid to the Cuban doubles in salaries and bonuses, ended up in the DGI’s coffers.

In a rare expression of analysis in this segment of To Catch a Spy, Olson looks at how the CIA could have walked so far into the DGI’s counterintelligence trap. Olson pointed to the following factors. First, he explains that the CIA was so eager to have sources in Cuba that looked the other way when none of the agents produced any real intelligence of value. Many of the double agents reported that they were “on the verge” of meaningful access, but they never quite got there. The CIA settled for chicken feed. Second, intelligence officers always want their recruitment service to turn out well. They do not want to admit that they have been duped by a double agent. In their desire to succeed against the Cuban target, the CIA’s handling officers rationalised away the questionable reporting, anomalous behaviors, and ambiguous polygraph results of their agents. Third, the quality of counterintelligence at the CIA during much of this period was undermined by the poor leadership of James Jesus Angleton, whose obsessive focus on the KGB and overall paranoia blinded him to other counterintelligence threats. Fourth, the CIA grossly underestimated the skill and sophistication of the DGI.

A few low key remedies may have mitigated or capitalized on the possibility the CIA’s double agents were still working for the other side. Perhaps one might be added to what Olson offered by noting that there should have been an established practice of constantly interviewing agents, even in debriefings to collect intelligence and discuss requirements. It would put extra pressure on those controlling them to try to alleviate what may be concerns of fidelity, and either improve what is being offered to placate or across to board changes in methods of communicating indicating some central control exists for all that are active. The CIA could have suddenly asked that all active agents from DGI  produce information away from the area of an existing expressed interest and measure the timing it took each to deliver the information, the sources they used to gather the information, and interview the agents to discover what background they agents would use to assure the quality of the source and identify similarities that sounded more like a scripted story. It may not  immediately smoke out and identify who were  the double agents and who was true, and none were true in the Cuban case, but it might have gone a long way to encourage the CIA to consider the possibility of deception and that their double agents were fake. 

Perhaps to go a step further, the CIA needed to ensure that those handling agents were not biased pro or con toward the double agents, and were open minded to consider the possibility of deception in a way that would not color interactions with them. (That would recognizably have been less possible in a less socially conscious agency of the past.) In some cases, CIA officers perhaps could have very steadily, yet gradually sought to convince their double agents that they, themselves, might be open to recruitment by DGI. The task then would be to wait and see if there would be an effort by their double agents to manipulate and push them to some DGI operative or officer to size them up for recruitment or whether a DGI officer would simply step up out of nowhere to size them up for recruitment. That surely establishes the double agent’s loyalties, but may lead to the opening of an entirely new door to penetrate the DGI’s operations in the US. Potential must be seen in all directions when sources are limited as in the Cuban case then, and the China case now.

These three chapters are among those in which complaints arose over Olson’s decision not provide enough answers to, and copious insights on, the many “whys” of adversarial foreign intelligence activities, left gaps in understanding the reasoning behind them. For example, there is no discussion of how within not only the respective bureaucratic system, but also under the political systems in which those adversarial intelligence services work, unwavering parameters for operating are set. From that one might better conceptualize how ongoing and future operations of those services could be sorted and categorized from apples to nuts. From that analysis, antecedents in US counterintelligence would be better enabled to understand and effectively fashion operations to defeat in going and future efforts by those adversaries.

However, it must be reminded that Olson, as he reveals in his introductory Acknowledgements, submitted To Catch a Spy to his former employer, the CIA. The Publications Review Board surely stopped anything from going into the text  before it got too close to classified information. That preliminary screening might explain why some reviewers commented that the book reads at points much as a heavily redacted document

In Olson’s case, his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any information that would provide some nuance on how the US detects and catches spies would be of the utmost interest and importance to the foreign intelligence services of adversaries as well as allies. Facts are somewhat easy to judge as they may be classified and one can reasonably determine what their value might be to an adversary. Hypotheses and arguments are a bit more challenging to judge for security reasons as certain facts, even if left out, can be viewed as being confirmed by them, seeing that those facts might alone be the sole solid basis upon which a particular inference could logically be made. Surely those hypotheses and arguments might be helpful to an adversary in developing any Red Team exercise. To that extent, security considerations may be the main reason why Olson avoids drawing too many inferences and presenting too many theories in the text. Olson would hardly be the type to neglect any precaution. However, his former employer likely preferred to be safe, not sorry.

All of that being stated, greatcharlie would to some degree concur that the portraits Olson paints of the Russian, Cuban and Chinese intelligence services are somewhat two dimensional. Drawing a perspective from military science, recall that an opposing force should not be viewed as some inert, non thinking body, waiting to be acted upon. There is an aphorism trained into the minds of mid-level Army officers at the Command and General Staff College that “the enemy has a say.” It falls in line with a teaching of the 19th Century Prussian military thinker, Carl Von Clausewitz, that: one’s opponent (in just about any endeavor, not just war) is “a living force” and military plans must factor in that what is being planned is “the collision of two living forces.” One must have respect for what an opponent thinks to be successful. More specifically, one must objectively gauge what the opponent thinks and what the opponent can do. What greatcharlie would have preferred to read would be an exposition of his presence of mind, inspiring insights, written in a clear and elegant style that would make Marcus Aurelius proud and would fit in beautifully in Meditations or Epictetus’ Discourses. One might have expected that along with an insistence the novice US counterintelligence officers become and remain dedicated to improving themselves. Such will always be a worthy theme and purpose of an offering from the expert veteran to the junior worm.

Olson’s Ten Commandments 

Of interest to greatcharlie was Olson’s discussion of his Ten Commandments of Counterintelligence. Those commandments ostensibly reflect the general sensibilities, perspectives, strategies, and tactics of US counterintelligence services. In his conclusion of this chapter, Olson states: “These are my Ten Commandments of Counterintelligence. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as a counterintelligence community, we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics or the priorities. What we should all agree on, is that strong CI must be a national priority. He then proceeds to set out what he views as the Ten Commandments of Counterintelligence. Previously published in 2001 as an article in the CIA’s periodical, Studies in Intelligence, these commandments include such concepts as playing offense rather than defense, owning the street, paying attention to analysis, and not staying in the profession too long.

The 20th century French Algerian philosopher, author, and journalist. Albert Camus, in his Notebooks, 1935-1942 stated: “You cannot create experience. You must undergo it.” Olson is not attempting to promote such through his efforts at this point in To Catch A Spy. Indeed, at this point in the text, Olson presents future and novice counterintelligence officers a leg up by providing a heads up on what they might expect. Understood is his desire to prevail upon the novice to heed certain realities and precepts that would not be included in their initial training. Two issues are in play in Olson’s discussion of his commandments, competence and commitment. Looking at each issue covered by a commandment, he seeks to instruct and counsel in advance, but he wants officers to focus on being competent in their work and understand the commitment that counterintelligence work requires. This is all very handsome of Olson. Clearly, a fair and decent man of honorable intent. His scruple does him great honor.

A concern for greatcharlie however is that at no point in his discussion of his Ten Commandments does Olson offer a thought about innocent citizens caught in a US counterintelligence web. With so many investigations that can get underway when so many foreign intelligence services are working hard in the US, as indicated in Olson’s first three chapters concerning People’s Republic of China, Russian Federation, and Cuban operations, innocent private US citizens can get caught in the mix erroneously with calamitous results for the citizen through no fault of their own. In a Constitutional republic, that is a grave error and greatcharlie believes such matters if utmost importance must be broached with those moving along in the counterintelligence track. Nil magnum nisi bonum. (Nothing is great unless it is good.)

Unpacking everything about Olson’s commandments here would require dedicating too much of this review’s analysis to it and shift its focus. It may be enough to say that greatcharlie found some disconcerting and a few exceedingly problematic. The information provided by Olson in his discussion of them sets off a kind of warning light that flashes “Beware” to free citizens of a Constitutional Republic. His commandments of particular note are: The Tenth Commandment; the Ninth Commandment; and, the Eighth Commandment. By focusing on these three of his ten commandments, the opportunity to understand and taste what creates concern is provided. They are presented in reverse order here to better illustrate the cascading development of Olson’s perspectives within them on some key matters.

Captured FBI turncoat Robert Hanssen (above). Olson states from the outset that it is a profession in which officers will go for months and even years without perceptible progress or accomplishments. Olson explains: “A typical CI [counterintelligence] investigation starts with a kernel, a fragment, or a hunch that is hard to grab onto but that demands attention. He further explains: “There is no statute of limitations on espionage, and we should not create one with our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep.” Still, he calls attention to a misdirected investigation tied to the counterintelligence case against special agent Robert Hanssen that uncovered him as a Soviet spy, He notes that investigation went on longer than it should have because time and energy wasted on chasing an innocent man. Olson does not comment on how much harm and torment, the innocent man suffered as a result of the wrongful investigation of him as a spy. No matter how singular one’s percipience, until one personally suffers an injustice of a wrongful counterintelligence investigation, one cannot really fathom how damaging, even life changing, it can be.

In his “Tenth Commandment,” Olson explains that counterintelligence requires tenacity and persistence, and that is a slow, plodding process that rarely rewards its practitioners with instant gratification. He advises that one chooses to pursue a career in counterintelligence, one should know from the outset that it is a profession in which officers will go for months and even years without perceptible progress or accomplishments. Olson explains: “A typical CI [counterintelligence] investigation starts with a kernel, a fragment, or a hunch that is hard to grab onto but that demands attention. He lists what types of information qualifies as such. He then explains how counterintelligence investigations usually start with little and face an uphill fight.” He further explains: “There is no statute of limitations on espionage, and we should not create one with our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep.” As for a rationale behind what could very well turn out to be a Quixotic search for evidence that is not there against a target who may very well be innocent, Olson states: “If we keep a CI [counterintelligence] investigation alive and stay on it, the next defector, the next penetration, the next tip, the next piece of CI analysis, the next wiretap, the next surveillance report, the next communications intercept, i.e. the next four will break it for us. If US counterintelligence ever had a mascot, it should be the pit bull.” Readers must be reminded that this would all be done at taxpayers’ expense.

Hypotheses and conclusions should be predicated and driven by hard evidence, not appearances, presumptions, and surmisal, supporting a preconception of guilt. A type hubris ensnares and overwhelms the investigator much as the fisherman in Ernest Hemingway’s The Old Man and the Sea (Charles Scribner’s Sons, 1952). When moving into the realm of conjecture, anything becomes a possibility. In that realm, everyone is entitled to a hypothesis. Each one, within reason, is likely equally correct or incorrect. Less elevated reasons may have a familiar ring to some involved in counterintelligence: “Somethings got to be there because I can tell!”; “I know he is bad because I feel it!” To get an investigation of a subject where a counterintelligence officer wants it to be, the focus can shift from The actual matter at hand to a secondary search through extraneous matters–sifting through dust figuratively–for “good” information that is just not there. That will lead those officers to settle for something close enough to the truth that should never pass muster among somber and astute supervisors, but it could for others.

Preconception is abhorrent to the cold and precise mind. The pure objective truth must be the focus. It may be harder to find, but it is the true pathway to success in an investigation. True evidence must be there. Must be predicated only on a reasonable standard, logic, and the law. A thorough review of superiors, auditors is needed not simply to curtail but to provide another voice, extra eyes on the matter. Sometimes an ally looking into a matter to see and call attention to issue an investigator too close to it may overlook. The situation worsens when bent information, which can always be found or sought, may be used to support very wrong ideas. Intuition and hunches can be colored, or better yet poisoned, by extraneous matters. Before placing the full force of the powers of secret intelligence services upon a citizen to impinge on his or her rights, something more than a hunch or feeling must guide the pursuit. Tools available to US counterintelligence services for surveillance and investigation have become far more powerful and intrusive than the US Congress and even the federal courts could have imagined or conceptualized while promulgating laws on their use. A tragic consequence of a lack of strong supervision is that the punishing weight of government power that can potentially be placed on the subject with those tools, who may actually be innocent, can be harmful, damaging, and destructive. There must be constraint on the use of powerful, highly intrusive government tools to pursue a subject of an investigation. Knowing when to say when, especially since a human life is in the balance, is the mark of a true professional in any field. There must be an inner-voice or one from a supervisor that warns that an investigation could be going down a totally wrong path. In his Discourse on the Method of Rightly Conducting One’s Reason and of Seeking Truth in the Sciences, 17th century French-born philosopher, mathematician, and scientist, Rene Descartes, explained: “The first precept was never to accept a thing as true until I knew it as such without a single doubt.”

Conducting a heavy-handed counterintelligence investigation of an individual not yet found guilty of anything in a court of law can ruin that individual’s life permanently. The damage counterintelligence services can do to a subject’s psyche is well understood to be grave and considerable. Use of surveillance methods of all kinds, invasion of privacy, discussing the subject with family, friends, work colleagues in a manner that skirts defamation or fully crosses the line, using informants among neighbors work colleagues, friends, as well as family, eliminating the possibility of normal human contact, and more, all ensures nothing normal with be left in the subject’s personal life. The soul and the spirit of the subject is typically seared. Reversing the damage, is extraordinarily difficult, if not impossible. The psychological capsule in which strong willed subjects will seek refuge in order to hold on to the remainder of themselves, to survive, is never easy to break open in an effort to find them. However, there seems to be little sensitivity with US counterintelligence services to the harm done to the innocent from wrongful investigations. Olson actually calls attention to a misdirected investigation tied to the FBI’s famed counterintelligence case against Special Agent Robert Hanssen that uncovered him as a Russian [Soviet] spy, He notes that investigation went on longer than it should have and essentially glosses over the fact that time and energy was wasted chasing an innocent man. Nowhere does he mention how much harm, how much torment, the innocent man suffered as a result of the wrongful investigation of him as a Soviet spy. That speaks volumes. No matter how singular one’s percipience, until one personally suffers an injustice of a wrongful counterintelligence investigation, one cannot really fathom how damaging, even life changing, it can be.

Habet aliquid ex iniquo omne magnum exemplum, quod contra singulos, utilitate publica rependitur. (Every great example of punishment has in it some tincture of injustice, but the wrong to individuals is compensated by the promotion of the public good.) The failure to practice what the US Constitution preaches regarding life and liberty and law is reflective of an individual engaged in an investigation going off the rails. However, that individual’s frustration or any other internal conflicts, must not allow for devaluation of the system, and a devolution that can comfortably lead US counterintelligence services to regularly mimic the tactics, techniques, procedures, and methods of an authoritarian security service as stated earlier. The way of life in the US, the country’s values and interests, are not being defended. Indeed, something very different would be happening. The US and liberal democracies must be different. Government actions are founded under laws that amplify morals, Judeo-Christian values of its founders. If all that Olson declares as essential to a counterintelligence investigation is permissible as a practice in a free society, a liberal democracy as US, it stands to reason the possibilities and capabilities make the potential for harsh behavior in search of enemies far worse in China’s authoritarian–arguably totalitarian–regime.

Olson begins the discussion of his Ninth Commandment in his purest tone with the statement: “Counterintelligence is a hazardous profession. There should be warning signs on the walls of CI [counterintelligence] offices around the intelligence community: ‘A steady diet of CI can be dangerous for your health.'” Following some interesting anecdotes about officers and senior executives in CI who seemed to lose themselves in the work, Olson explains: “I do not believe anyone should make an entire, uninterrupted career out of CI. All of us who have worked in counterintelligence have seen the old CI hand who has gone spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling prey to creeping paranoia, distortion, warping, and overzealousness in one’s thinking. It is precisely these traits that led to some of the worst CI disasters in our history.” In addition, Olson notes that following a lunch with a CIA colleague who had worked for a time in counterintelligence said: “Jim, after doing CI for two years I felt the occupational madness closing in on me. I had to move on and do something else before I lost my bearings.”

Olson argues that differences in sensibilities and approaches among CIA case officers, FBI special agents, and military intelligence officers are great/disparate enough that when working together on a case, insular thinking is mitigated. Thereby, he suggests officers from different US counterintelligence services should rotate among their offices to exploit the benefits cooperation can bring. However, despite some differences among the officers in some lines of thinking, they are all from the same national security bureaucracy and their collective thinking would more likely tend to manifest greater commonalities, more similarities, than differences, having been trained and functioning in the same system. That may not be as discernible from the inside. To be frank, but not impolitic, so far, in the case of Chinese intelligence efforts in the US, no marked positive impact has been evinced from the aggregated efforts of the services.

With all of the pearl clutching being done among senior executives in the US counterintelligence service about Chinese intelligence successes in their country, taking the approaches presented in those “Ten Commandments,” out of sort of desperation, overlooking, or turning a blind eye, to aberrant situations, prolonged investigations, “tabs” being kept on former operatives and informers for no logical reason or constructive reason, obsessive surveillance, use of dirty tricks, services ou les activités pour traquer ou nuire à autrui. They can often end up becoming huge expenditures with no constructive results, only destructive ones. Being able to claim that one is on the trail of some questionable former ally might achieve some meretricious effect in a meeting to review cases–the errant officer may want to create the appearance of being a sleuthhound with a never surrender attitude–but such efforts will typically accomplish nothing to protect the US from its adversaries or enhance the country’s national security. The dreadful consequences for those incorrectly targeted, would be, as has been, the recipe for disaster. US counterintelligence, not a foreign adversary, has, and will always be, harming innocent, private US citizens in those cases. 

Supervisors and those managers of US counterintelligence services close enough to the rank and file and their operations in the field must judge the actions of officers against US citizens based on the seriousness and dignity of the claim. If there are strong concerns, there may be other avenues along which the potential problem could be managed. Suffice it to say that an investigation of a private US citizen using tools designed for trained foreign intelligence officers and networks have no good reason to be used on a citizen in a Constitutional republic. That will always be a dangerous and destructive undertaking in terms of the well-being of the US citizen. (One wonders how inspired those US counterintelligence officers who are often anxious to spend so much time, energy, and especially money on chasing tenuous leads and entertaining the slender appearance of a private US citizen’s guilt or complicity, if money was short and was being appropriated from their personal accounts. Perhaps none!)

As for another pitfall reality that taking such a harsh, seemingly ego driven approach to counterintelligence in the present day, it could lead to self-inflicted walk down a garden path and into the hands of US adversaries. Newly minted MSS counterintelligence officers in “on the job training,” which is how they do it, may very well be actually working in the field, using decoys under their trainers direction as a type of net practice for gaining and retaining the attention of foreign counterintelligence services and luring their resources, energies, and time, into endless, fruitless pursuits. The indications and implications of what is provided in Olson’s, albeit well-meaning, “Ten Commandments” are that US counterintelligence services would be susceptible to such a ploy. MSS counterintelligence could surely offer just the right amount of chicken feed here and there to support a misguided belief that the perfect “kernel” of information will be found to make a case. Such an effort could effectively distract, divert, and disrupt elements of US counterintelligence officers from engaging in more worthier pursuits against what may very well be in many cases, potentially vulnerable networks and operations of Chinese intelligence services in the US. (Interestingly, in public announcements by the US Department of Justice of a Chinese intelligence and counterintelligence operation being cracked or disrupted, there is never mention of any apparent plot to lure US intelligence services into a trap. Perchance, since Chinese intelligence services have been so successful in the US, there is no reason, no impetus to play such games. In the eyes of senior executives and managers of the MSS and senior commanders of the PLA, US intelligence and counterintelligence services may no longer be worth the candle.)

Taking draconian steps against a US citizen for allegedly, presumptively, or imaginably being tied to a foreign intelligence service when that is in reality not the case could very well compound an already difficult situation with regard to recruiting adversarial intelligence officers, operatives, and informants. The rationale for making that representation is if a US counterintelligence service accused a US citizen of providing some assistance to a specific foreign intelligence service, and the assertion is false, no group other than that adversarial service would know for a fact that the accusation is false. Even more, observing the US counterintelligence service initiate some severe, intrusive investigation of the citizen, ostensibly to better understand US practices. Surely such behavior, such practices by some US counterintelligence services would create a decidedly negative impression of the US among members of an adversarial foreign intelligence service.

“Once upon a time” there was a near universal notion of the US being “the good guy,” known for its largesse. That reputation has become a bit tarnished over time quite possibly as result of such aggressive actions by a US counterintelligence service against their own innocent citizens. If a foreign intelligence officer, operative, or informant would ever consider what would befall him or her if they left their service and country and turned to the US, the individual would need to ask himself or herself: “If they treat their own people that way, how would they treat an adversary.” Through Olson’s compendium of US activities by adversaries and his case studies, one could infer that since the end of the Cold War, foreign intelligence officers were more likely to turn to the US only if they ran afoul of their own organizations after making some egregious, irreconcilable misstep on a professional or personal level, either by their own volition or through entrapment. Such individuals would prefer to save their skins in any way possible with an intelligence service willing to accept and protect them, rather than face their superiors. One might speculate on how many occasions the choice was made by a foreign intelligence officer to turn to another country’s intelligence service such as the United Kingdom’s Security Service or Secret Intelligence Service rather than walk-in into a US Embassy or Consulate to prostrate himself or herself. Perchance some venturous officer in a US counterintelligence service might want to apply a bit of the preceding logic to the Chinese intelligence conundrum.

Perhaps one should also consider that adversarial foreign intelligence officers may chalk up actions of US counterintelligence officers performed against them, such as monitoring an opponent’s telephone and electronic communications, surveilling their movements, or striking up clandestine conversations, as a matter of them simply doing their jobs. Such thinking would form the basis of a tacit, or even an explicitly agreed upon, modus vivendi. However, it is another thing altogether for US counterintelligence officers to use “dirty tricks” against adversarial foreign intelligence officers or their families and make their circumstances unviable in the US while deployed under official cover. Boiling it all down, there must be hope, even assurance, that there will be an intelligent connection for the one who defects not a bullying connection with a US counterintelligence officer. The one coming over of course wants help in doing so, needs help in betraying his own. Those individuals are the proverbial “bigger fish to fry.”

Infamous former chief of CIA Counterintelligence, James Jesus Angleton (above). Olson initially mentions Angleton in Chapter 3 when he discusses how his obsessive focus on the KGB and overall paranoia blinded him to other counterintelligence threats. In his Ten Commandments, Olson makes note of the counterintelligence failures and abuses of Angleton, the FBI’s J. Edgar Hoover, and their subordinates, reminding of the obsessive harassment of Martin Luther King in the 1950s and 1960s, Olson states “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness. To take the discussion of such problems further, he notes: “Counterintelligence officers must be wary of what I call the ‘self-righteousness trap,’ that is, our objective cannot be so righteous and our motives so pure that we can justify inappropriate and illegal methods.”

In his explanation of his Eighth Commandment, Olson begins by reminding readers of what was mentioned in his “Second Commandment” that “some people in the intelligence business and elsewhere in the US government do not like counterintelligence officers.” He makes note of the counterintelligence failures and abuses of the CIA’s James Jesus Angleton, the FBI’s J. Edgar Hoover, and their subordinates and reminding of the obsessive harassment of Martin Luther King in the 1950s and 1960s, and then states “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness. To take the discussion of such problems further, he notes: “Counterintelligence officers must be wary of what I call the ‘self-righteousness trap,’ that is, our objective cannot be so righteous and our motives so pure that we can justify inappropriate and illegal methods.”

To explain the reaction within the national security bureaucracy and among government contractors to counterintelligence officers, Olson simply states that case officers, special agents, commanders, and other managers have a natural tendency to resist counterintelligence scrutiny. As a rationale for that, Olson asserts that they believe that they are practicing good counterintelligence themselves and do not welcome being second guessed or told how to run their operations by so-called counterintelligence specialists who are not directly involved in the operation and not in the chain of command. He acknowledges that defense contractors and other civilian bureaucrats running sensitive US government programs have too often minimized counterintelligence threats and resisted professional counterintelligence intervention. As a rationale for that perspective, Olson says they view counterintelligence officers as only stirring up problems and overreacting to them. They perceive counterintelligence officers “success” in preventing problems as being invisible and their damage assessments after compromises as usually being overblown.

In the face of such resistance, Olson proffers that counterintelligence officers must act heroically, stating: “A counterintelligence officer worthy of the name must be prepared to speak unpopular truth to power, even at the potential cost of poor performance appraisals or missed promotions. It is not an exaggeration to say that a good CI [counterintelligence] officer must be a nag–and as we all know, imperious managers do not like persistent and vocal dissent.” Intriguingly, In this discussion, Olson leaves the reader with the impression that all counterintelligence investigators are first class individuals, straight as a dart. Across all of the US counterintelligence services, a majority probably are. However, in his Ninth Commandment, he clearly indicates personal problems among them are known to arise as a consequence of the work, to repeat  included:  creeping paranoia, distortion, warping, and overzealousness in one’s thinking.  To reiterate what he writes even in this “Eighth Commandment,” Olson mentions the “self-righteousness trap” and acknowledges: “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness.” When Olson recalls from his experience how senior executives and managers in CIA shied away from acceptance of counterintelligence officers in their divisions and shops, surely he is fully aware that they could only express that choice through tidy, plausible and professional statements such as those. He also had to know that they were very likely aware of the same problems Olson, himself, indicated could exist among some counterintelligence officers. Not presuming or expecting to learn of a connection between stories of aberrant behavior by counterintelligence officers and concerns that raises among managers of departments and units, the issue may escape the impressions of many readers. To that extent, Olson, perhaps unconsciously, does say enough to invite such concerns to be among reader’s impressions either.

Iniqua raro maximis virtutibus fortuna parcit; nemo se tuto diu periculis offerre tam crebris potest; quem saepe transit casus, aliquando invenit. (Unrighteous fortune seldom spares the highest worth; no one with safety can long front so frequent perils. Whom calamity oft passes by she finds at last.) With such problems among counterintelligence officers in mind, as a “good shepherd,” the goal of any attentive and prudent manager would be to keep a potential source of undue trouble from his flock. Letting counterintelligence officers in has really become a high stakes gamble. The slightest suggestion that a manager might refuse to receive a fellow officer due to unsubstantiated concerns that he or she may be potentially psychologically unfit to carry out his or her duties appropriately or concerns that he is she may be of questionable judgment–again, based on Olson’s own statement about problems that can arise among counterintelligence officers, it could always be a possibility–could lead to sanction from the top. Olson surely must have understood was likely a tad sympathetic to such underlying sensibilities among managers within the CIA and the other national security bureaucracies about counterintelligence. If there is so much concern within the federal bureaucracies over US counterintelligence, certainly the unsuspecting, unprotected citizen has far more to fear from it. Gnawing again at the subject of the “potential” abuse of power by US counterintelligence officers, as long as there is the actuation and potential for transgressions of innocent citizens’ rights exists, there may be less to fear about China expropriation of the US role as the dominant power in the world and its usurping of citizens rights, primarily through infiltration of elite circles and election interference, than the prospect of being torn to pieces as a result of the acts, benign or malicious, of a few trusted men and women in the intelligence services and law enforcement.

Very easily the innocent, with no connection to the hideous business of a spy ring, can be caught in the same net as the guilty. It is among the innocent, carrying on by appearance in the same manner as them, that the foreign intelligence officer, operative, and informant conceals himself or herself. Suppositions based on assumptions can result in an officer initiating a case green-lit with all the necessary approvals from the top. Sentimentality to the concept of beginning, middle, and end should not compel the endless pursuit of one who may upon informed consideration may equally be found innocent. Wrongs already done cannot be righted, but an energetic effort should be made to prevent future wrongs of the same kind. Pause for thought! 

Once the track to find an individual is guilty has been taken, no one among the officers in the shop will aim to prove the individual’s innocence. The individual’s innocence becomes by the by. In these matters, perception errantly means more than reality. That imbalance in thought unfortunately has likely served to allow all formulations based on available evidence, easing in tragic results. Surely adversarial foreign intelligence services would prefer US counterintelligence service would become immersed in an investigation of an innocent party than put their time and energy on any actual part of their networks. As discussed in somewhat greater detail in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2),” it cannot be overemphasized that misidentifying an innocent citizen as an  agent of an adversarial foreign power engaged in espionage or some other act on its behalf by initiating an investigation against the individual, to include securing warrants for the most intrusive and egregious acts contrary to his or her First and Fourth Amendment Rights under the Constitution is a tragedy of unimaginable proportion and can have enormous consequences upon the life of the one mistakenly, even wrongfully targeted. 

In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. As the investigation into his alleged espionage began, Lee was fired from his job at Los Alamos by the University of California, Los Angeles (UCLA) on March 8, 1990, under pressure from the US Department of Energy, which oversees the laboratory. The news media was informed of his dismissal by an unknown source and the stories were widely reported. While his alleged espionage was being reported, the FBI had determined that Lee could not plausibly have been the source of information on the W88 passed to China. The normative hope, yet perhaps a bit of an optimistic one given the players involved, would be that once exculpatory information is discovered that could prove one’s innocence, a FBI investigation would have been halted. However, the FBI moved forward with its investigation of Lee. Although the original espionage charge was dropped by the FBI, Lee was still charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Later, Lee filed a lawsuit against the US government and five news organizations–the Washington Post, New York Times, Los Angeles Times, ABC NEWS, and the Associated Press–for leaking information that violated his privacy.

Lee and his supporters have argued that he was unfairly singled out for investigation because he was Chinese-American. Wen Ho Lee was not the enemy but has been called a victim of the blind, unfettered power of a few men with authority. That bit of humanity that should exist in each human heart was in such insufficient quantity in the counterintelligence special agents handling his case. In his book Securing the State, David Omand, former United Kingdom intelligence and security coordinator, wrote security intelligence operations—such as counterterrorism and counterintelligence—require cooperation between security officials and civilian populations among whom threats wish to hide. In the case of Chinese intelligence, this includes ethnic Chinese émigré communities, which, at least in the US, are now suspicious of the FBI. The botched investigation of Wen Ho Lee, in Ormand’s view, appeared to be politically (or racially) motivated witch hints rather than the serious security investigations they were. To Chinese-Americans, these suspicions and resulting investigations are the natural result of an unwillingness to analyze Chinese intelligence more rigorously on the basis of evidence.

Intelligence enthusiasts may find it interestingly that in a September 25, 1977 New York Times interview, John le Carré, the renowned espionage novelist of the United Kingdom who served in both MI5 and MI6, just after publishing The Honourable Schoolboy (Alfred L. Knopf, 1977), was asked about a view implied in his earlier works that no society was worth defending by the kind of methods he had set out to expose in his books. In reply, the author stated in part: “What I suppose I would wish to see is the cleaning of our own stable and the proper organization, as I understand it, and the sanitization, of the things that we stand for. I hope by that means and by those examples perhaps to avoid what I regard as so wrong with the Soviet Union.”

Double-Agent Operations and Managing Double-Agent Operations

Olson follows his commandments with a chapter on preventing counterintelligence incursions through the development of better workplace security. Improvement may be achieved, he explains, by following his “Three Principles of Workplace Counterintelligence”—careful hiring, proper supervision, and responsible promotions. Afterward, comes the chapters of To Catch a Spy that greatcharlie appreciated the most were “Chapter Six: Double-Agent Operations” and “Chapter Seven: Managing Double-Agent Operations.” In these two chapters, Olson finally presents a classical series of demonstrations. Indeed, in both chapters, Olson provides nothing less than a mini manual for precisely what the titles indicate. Readers are favored with many of the logical principles that Olson would practice and expound during training while working in CIA counterintelligence. He provides a list of benefits US counterintelligence seeks to gain from a double agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Nihil est aliud magnum quam multa minuta. (Every great thing is composed of many things that are small.)

The tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination possessed and creative ways in which double-agents were dangled to garner interest from the adversarial intelligence service, the transmission of chicken feed, ostensibly useful yet actually useless information, for the adversary to grab, and management of nuanced communications between the double agent and his handler. Olson does not indicate whether any among the practices discussed was used by him to achieve some crowning glory of his career. Again, for readers such as greatcharlie, what was presented in this chapter was meat and drink. None of the precepts included were beyond the understanding and the abilities of most readers who would be interested in the book. He tells it all in an apposite way.

Case Studies

In “Chapter Eight: Counterintelligence Case Studies,” Olson goes into some greater detail on the principles and methods of counterintelligence. Olson carefully avoids offering what may seem to some as a mere series of tales. However, it seems that Olson’s relaxed writing style, present throughout the text in fact, may distracted some previous reviewers’ attention away from the instructive nature of the discussion. In the 12 case studies he presents, Olson also illustrates the tradecraft of counterintelligence, and where counterintelligence breaks down or succeeds. He presents, to the extent that he could, how US counterintelligence officers became fully engaged on each matter. To some degree, Olson also looks at the other side of things and discusses why people spy against their country.

Each case study is followed by a “lessons learned” section. Lessons learned are the pertinent qualities and deficiencies that Olson ascribes to each case pertinent to the ongoing work of US counterintelligence services. The lessons learned are given greater value for Olson selects only what he deems most pertinent from what he witnessed, experienced, and endured as is not presumed. Again, nothing presented in To Catch a Spy is considered in the abstract. Some might observe that absent again is the severe reasoning from cause to effect that helps to solve the case. Instead, he highlights a few points of interest in each and considerable focus is put into placing color and life into his discussion of them. Two good examples of his case studies are those concerning Ana Montes and Richard Miller.

Scott Carmichael (above) was the senior security and counterintelligence investigator for the Defense Intelligence Agency and the lead agent on the successful spy hunt that led to Ana Montes. Concerning the Montes case, Olson does not deny the fact that the DGI had done the thing very completely. Of the lessons learned, the three most important to Olson appeared to be that the DIA was wrong not to require polygraph of its new employees. He applauded the DIA for having in place a policy that encouraged employees to come forward with any workplace counterintelligence concerns that they had. The report of Montes’ suspicious behavior in 1996 turned out to be inconclusive but still served the purpose of putting her on the counterintelligence radar of DIA investigator Scott Carmichael, who he heaps praise upon. Olson also notes that penetration is the best counterintelligence. Without the FBI source to raise the alarm and put Carmichael back on the scent, Olson says Montes might have stayed in place.

Ana Montes

Concerning the case of Ana Montes, which Olson touched upon in his country report on Cuba in Chapter 3, he leaves no doubt that it was a very complicated and abstruse case. He does not deny the fact that the DGI had done the thing very completely. Olson referred to Ana Montes as a classic spy. Montes worked for Cuban intelligence for sixteen years. She was indeed the embodiment of an ideological belief concerning US policy in Latin America and most of all, a pro-Cuba sentiment, as she carried out her espionage duties for the DGI diligently and effectively. Before the smash of her unmasking, Montes was believed to be a thoroughly trustworthy officer. When colleagues learned of Montes’ betrayal, it was a crushing blow to them.

Olson reports that Montes’ views against the US role in world affairs were hardened while she studied abroad in Spain as a student of the University of Virginia. Nevertheless she would eventually find employment in the US Department of Justice and receive a top secret security clearance required for her position. The espionage problem started outright when Montes, already a federal employee, began attending night courses at the Johns Hopkins School of Advanced International Studies in Washington. Montes, likely spotted by someone working for Cuban intelligence once she was heard voicing her negative views toward US policy in Central America during the administration of US President Ronald Reagan. The Cubans, appreciative of her enthusiasm, Olson believes, Cuban intelligence insisted that she leave her job at the US Department of Justice and move to a national security organization. She secured a job with DIA. Starting as an analyst on El Salvador and Nicaragua, Montes rose to become the senior DIA analyst on Cuba.

As for her espionage work for the Cubans, Montes would memorize contents of documents she saw, summarized it at home, and encrypt the material on diskettes. She received instructions from Havana by shortwave radio broadcasts, which she deciphered on her Toshiba laptop using a special program the Cubans provided her. She would contact her handler by calling from a public phone booth and sending a coded message via her pager. She would have dinner with her handler once or twice a month with her Cuban handler in a Washington restaurant to provide him with the diskettes. Montes was lavished with praise but never accepted payment.

In 1996, an alert DIA employee, practicing good workplace counterintelligence, reported his concerns about Montes to DIA counterintelligence officer Scott Carmichael. The employee noted that Montes appeared sympathetic to the Cuban cause,  and inappropriately aggressive in seeking expanded access to sensitive intelligence on Cuba. Carmichael interviewed Montes and eventually dropped the matter. However, as Olson explained, he filed away his suspicions of her for future action. In 2000, Carmichael became aware that the FBI was looking for a Cuban mole inside the US intelligence community. Only soupçons were known about the identity of the spy, except that he or she was using a Toshiba laptop to communicate with Cuban intelligence. Carmichael immediately thought of Montes, but he had little evidence to support his suspicions against her that he had great difficulty in convincing the FBI to open an investigation.

Carmichael remained persistent in pushing the FBI to open an investigation (never give up), egged on by further aberrant pro-Cuban attitudes displayed by Montes, and his efforts finally succeeded. In May 2001, the FBI threw its notorious full court press at Montes, starting with extensive physical surveillance. It did not take long for the FBI to conclude that she was involved in illegal activity. First, she was obvious and amateurish in her surveillance detection routes, often entering a store by one door and quickly leaving by another. Second, she made a succession of one minute phone calls from public phone booths, even though she owned a car and carried a cellphone. Montes’ behavior was suspicious enough to the FBI that it was able to obtain a warrant for surreptitious entry of her apartment on May 28, 2001. She was away on a weekend trip with her boyfriend. The FBI knew that this entry would be particularly dicey if Montes was a Cuban trained spy, she could have trapped her apartment to determine the intrusion. There was, however, no evidence of trapping and the entry was successful. The FBI found a shortwave radio of the type used by spies to listen to encrypted broadcasts and a telltale Toshiba laptop. On the hard drive, which the FBI drained, were multiple messages from the Cubans to Montes on her intelligence reporting, giving her additional tasking requirements, and coaching her on her tradecraft. Olson says he is certain that the FBI computer experts chuckled when they read the instructions from the Cubans to Montes on how to erase everything incriminating from her hard drive. He further comments that she either did not follow the instructions or they did not work because the FBI recovered a treasure trove of espionage traffic. One message thanked Montes for identifying an undercover US intelligence officer who was being assigned to Cuba. It was later determined that she gave the Cubans the names of other US intelligence personnel in Cuba. She blew their cover and sabotaged their mission.

As the remainder of the story goes, the FBI continued its surveillance of Montes for another four months in hope of identifying her Cuban handler or handlers. That effort was not successful, but the FBI was able to search her purse when she was out of her DIA office to attend a meeting. Inside her purse the FBI found more incriminating material, including the page rhinestone number she used to send short corded messages to the Cubans. Olson said the fear was that if Montes detected the surveillance, she would flee. When Montes was about to gain access to US war planning for Afghanistan in the aftermath of September 11, 2001, the FBI and DIA decided that they could wait no longer. Montes was arrested at DIA Headquarters on September 21, 2001. She pleaded guilty on October 16, 2002  and was sentenced to 25 years in prison. 

Of the lessons learned, the three most important to Olson appeared to be that the DIA was wrong not to require polygraphs of its new employees. He applauded the DIA for having in place a policy that encouraged employees to come forward with any workplace counterintelligence concerns that they had. The report of Montes’ suspicious behavior in 1996 turned out to be inconclusive but still served the purpose of putting her on Carmichael’s counterintelligence radar. Olson also notes that penetration is the best counterintelligence. Without the FBI source to raise the alarm and to put Carmichael back on the scent, Montes might still be in place. DGI’s activities in the US were really a mystery. Olson did well in presenting readers with a sense of the elusive nature of DGI operatives. 

As it turned out, the case did not reach its optimal potential for counterintelligence officers engaged in the investigation were unable to use available information to track down and capture Montes’ handlers or any other elements of the Cuban espionage network of which she was a part. In his investigation, the DIA counterintelligence officer, Carmichael, was able to observe, reflect, and intuit connections based.on facts not conjure a false reality based merely on appearances. Again, it is always a capital mistake to theorize in advance of hard facts. Nevertheless, it is a common errant practice. With hard facts, one is better enabled to grasp the truth.

With regard to Olson’s suggestion that the FBI computer experts likely chuckled over the failure of Montes to eliminate incriminating evidence from her Toshiba laptop, a concern is raised. Perhaps some in US counterintelligence services may feel greatcharlie is making the whole matter seem more urgent and important than it really is, but the proper comportment, displayed and demanded by supervisors and line managers, would instead have been to remain collected and aplomb with noses to the grindstone in the squad, knowing that an unexpected opportunity to exploit a failing on the part of the adversary has shown itself. It may signal that other missteps by the adversary may be present that will allow counterintelligence officers to net an even greater quarry of foreign intelligence prey. Recognizably, stresses can cause attention to shift. (Take charge of your emotions!) However, there is the need to concentrate solely on performing the duty of the moment as best as possible. Once the case is resolved, there would be time then to reflect on its many aspects. The reputation of US counterintelligence services will not suffer shipwreck over this particular matter. Olson surely did not view at all out of order as he freely revealed it in the text.

When Montes’ handlers and the managers of her undiscovered network evaded capture, they took with them all their lessons learned. (Recall her activities were not a small matter in the DGI as the informative walk-in Olson dealt with in Prague, Lombard, was read-in on her fruitful work while he was posted in Vienna.) One could have no doubt that meant it would certainly be decidedly more difficult, after the DGI presumably made necessary corrections, to uncover their activities of officers, operatives, and informants in their networks on later occasions. Surely, they would be back. (Rather than display any good humor about the matter, it should have been handled from start to finish with solemnity, especially given the indications and implications of the case.)

KGB operative Svetlana Ogorodnikov (above). As described by Olson, Richard Miller was a disaster as a counterintelligence officer, and an FBI special agent in general. However, that aspect is key to understanding the lessons the case presents not only to senior executives and managers of US counterintelligence services, but among the rank and file of each organization. Working out of the Los Angeles FBI Office, Miller was tasked to monitor the Russisn émigré community in Los Angeles. In May 1984, a well-known member of the Russisn émigré community called Miller suggesting that they meet. It turned out the caller, Svetlana Ogorodnikov, was a KGB operative dispatched in 1973 to infiltrate the Russian emigre community in Los Angeles. She got her hooks into Miller. Miller, figuratively tied to a tether right in front of the KGB, was exactly the type of FBI Special Sgent that an adversarial foreign intelligence officer would look for.

Richard Miller

As described by Olson, Richard Miller was a disaster as a counterintelligence officer, and an FBI special agent in general. However, that aspect is key to understanding the lessons the case presents not only to senior executives and managers of US counterintelligence services, but among the rank and file of each organization. Miller was a door left open that an adversarial foreign intelligence service, in this instance the KGB, was happy to walk through, and one could expect in similar circumstances that will almost always be the case.

Olson notes that Miller was hired by the FBI in 1964. After having spent time in a number of FBI field offices, Miller landed in the Los Angeles FBI Field Office where he should have found peace. However, as Olson explains, Miller, as a result of his own incompetence did not find a happy home in that office. Olson leaves no doubt that Miller was a disaster as an FBI special agent. He was a laughingstock at the office. His FBI colleagues scratched their heads in disbelief that he had been hired in the first place. In the buttoned down world of the FBI, he was totally out of place. He was poorly dressed and noticeably careless with his grooming. His weight and physical fitness did not meet the FBI’s rigorous standards. At 5’9″ tall and weighing as much as 250 pounds, he never came close to matching the stereotypical profile of the trim and athletic FBI special agent. 

To make matters worse, Miller was hopelessly incompetent. Olson says Miller begged his FBI colleagues to give him assets because he was incapable of developing any on his own. At various times, he lost his FBI credentials, gun, and office keys. His performance reviews were consistently bad, but somehow his career chugged on. In Olson’s own words, Miller was part of the FBI culture that did not turn on its own, even at the cost of carrying dead weight. With eight children, on a special agents salary, Miller was always on the lookout for extra income. Reportedly, he stole money from his uncle in a far fetched invention scam. He pocketed money that was supposed to pay assets. He ran license plates for a private investigator. He sold Amway products out of the trunk of his office FBI vehicle. He even bought an avocado farm to profit from but it went under. Miller would eventually be excommunicated from the Church of Latter Day Saints for adultery and divorced while serving in Los Angeles.

Miller’s initial work in the Los Angeles FBI Field Office was in criminal work but he was unsuccessful at that. He was transferred to goreign counterintelligence where it was ostensibly though he would receive vlossr supervision and mentorship from the Gordian counterintelligence chief. Olson notes that additionally, foreign counterintelligence was considered a dumping ground for under performing employees Counterintelligence was not highly regarded and the best people stayed away.

In foreign counterintelligence, Miller was given the job to monitor the large Russian émigré community in Los Angeles. To do that job he was expected to mingle with the émigrés and develop contacts inside that community who could keep him informed of any indications of Russian espionage. It was not hard to imagine how Miller was perceived by the Russians with whom he came in vintage. There is no indication that Miller did anything significant during that period. His career and personal life was still spiraling downward. He would later tell estimators he sometimes took three hour lunches at a 7-Eleven store reading comic books and eating shoplifter candy bars. Viewing Miller’s behavior was becoming increasingly erratic he was counseled by his supervisor and sent in for a mental health assessment. Although found emotionally unstable, and subsequently suspended for being overweight, Miller was krot pn at foreign counterintelligence. He was allowed to hang on until he reached retirement age of 50.

In May 1984, one of the well-known members of the Russisn émigré community called Miller suggesting that they meet. The caller,, Svetlana Ogorodnikov, immigrated from the Soviet Union in 1973 with her husband Nikolai. She worked as a low level source for the FBI at one point but dropped out. Her husband worked as a meatpacker. It turned out that Svetlana was a KGB operative, dispatched in 1973 to infiltrate the Russisn emigre community in Los Angeles, and if possible, assess and develop US citizens for recruitment. She was known to make trips to the Soviet Consulate in San Francisco which the FBI would later assess were occasions when she met her KGB contact.

Olson assesses due to the timing of Ogorodnikov’s call, she likely was aware from her contact in the community that Miller was in trouble at the FBI and his personal life had become a shambles. Olson also supposes that the KGB green-lit her call after they were satisfied with an assessment of him. After traveling to the Soviet Union, where Olson believes she met with the KGB to discuss Miller, Ogorodnikov returned to the US and continued contact with him in August. She promised him cash for secrets and Miller agreed. He supplied her with secret FBI documents to prove his bona fides. Miller then met with a KGB officer. Olson explained that the KGB was not immediately satisfied with Miller. He gave his FBI credentials to Ogorodnikov who presented them to heathen  contacts in the San Francisco Consulate. The KGB wanted Miller to travel to Vienna with Ogorodnikov to meet with more intelligence officials. However, the FBI never allowed that to happen; other special agents became aware of Miller’s unauthorized relationship with Ogorodnikov. Miller was placed under surveillance by use of wiretaps, bugs, and operatives on the street.

Olson assumes Miller detected the surveillance. On September 27, 1984, he tried to convince the FBI that he was engaged in his own effort to catch Ogorodnikov. However, while being polygraphed he admitted to his malign activities. He gave Ogorodnikov a secret document. He then started keeping several other documents in his home and was prepared to present them to the KGB. Miller and the Ogorodnikovs plead guilty to conspiracy to commit espionage on October 3, 1984.

In his lessons learned, Olson focuses on the decision of Miller’s FBI superiors to keep Miller in place. He does not fault the other special agents in the office for not reporting him because Miller’s situation was well-known in the office. Olson, to some extent in the role of apologist, offers reasons for such behavior among Miller’s colleagues. Misfortune can easily come at the hands of an evil influence such as alcohol. Miller had a weakening nature to which his supervisors should have responded. Perhaps they figured they had to stretch a point in favor of a man who served for so long. However, by keeping Miller on the job, his supervisors and managers, surely inadvertently compounded the problem. They went too far to screen his many disqualifications from their own superiors, presumably to allow him to reach retirement. Miller seemingly marked his zero point when he was approached by the KGB. It stands to reason that an astute counterintelligence officer may often discover weaknesses and blind spots in himself or herself. An effort to correct the deficiency would then be in order. However, Miller was different. By all appearances, he was spent, no longer qualified to serve, but he was kept on.

On reflection, the matter seems almost ridiculous. Miller was exactly the type of FBI special agent that an adversarial foreign intelligence officer would look for. He was not a dangle, nor was he really on the prowl. He was simply a door left open to the achievement of some success by the KGB, figuratively tied to a tether right in front of them. Perhaps at the time their agents presented him as a prospect, in Moscow, they could hardly believe their luck. The opportunity was there, and the KGB operatives among the émigrés supplied the audacity to take advantage of it. 

Through his own insufficient and perhaps sympathetic investigation, he discovered no one and nothing significant among the émigrés. Anyone getting involved with an émigré community as part of a counterintelligence investigation must gird one’s loins, for with some certitude adversarial foreign intelligence services will very.likely be quietly operating among both suspicious and unwitting émigrés. The powers of such officers or operatives may seem far superior to opportunities that may present themselves, but they are deployed among the émigrés nonetheless. The erstwhile KGB and DGI, and current SVR and MSS, each organized special departments for such work. Indeed, an emigre community can very often be a milieu for spies. Perhaps Miller’s FBI superiors thought he would unlikely find trouble in the Russian émigré community, and Miller had effectively been sent to some empty corner of the room. However, they confused the unlikely with the impossible. By their experience and instincts, his supervisors should have been against Miller’s conclusions. Nevertheless, they were satisfied with his totally erroneous conclusions.

Given his history of behavior, it is very likely that during his contacts with the Russian émigré community, Miller betrayed himself with an indiscretion or two. Whatever it may have been, it was clearly significant enough to cause KGB operatives–who he was unable to detect as tasked under his original counterintelligence mission–to seize upon him as their prey. The case highlights the KGB’s–and presumably now the SVR’s–ability to figuratively pick up the scent of blood much as a shark, and recognizing there can be a good soup in an old chicken. Even more relevant to the discussion in proceeding parts of this review, it illustrated the real possibility for errant officers ro exist in plainview within the rank and file of other hardworking, diligent counterintelligence officers. Such license could only lead to some great evil. The KGB Rezident at the time would have been derelict of his duties if he had not recruited Miller, a wayward FBI special agent, who due to that errant choice made by his superiors, was placed in counterintelligence. And, given his deficiencies, it would have been a serious blunder for the KGB not to exploit all possibilities with Miller to the maximum extent.

It is likely that any other KGB comrades, who may have concealed themselves in the same roost among émigrés in which Svetlana and her confederate had set themselves and had perhaps taken to their heels once they learned those two and Miller were captured, is unclear. Further, it is unclear whether any concern was raised that there was any increased concern that other KGB operatives had continued to secrete themselves among Soviet emigre groups throughout the US. For whatever reason, Olson does not go into such details on what would have been legitimate counterintelligence concerns.

No one should imagine that this review, or any other for that matter, fully covers what Olson offers in To Catch a Spy. It presents the essence of the book, but there is so much more to discover. As humbly noted when the review started off, there nothing that greatcharlie appreciates more about such a book than its ability to stir the readers curiosity, inquiry into the author’s judgments, greater consideration of their own views on the matter, and elicits fresh insights based on what is presented. That is exactly the type of book that To Catch a Spy is. One can ascribe these positive aspects to it and many others. What one finds in To Catch a Spy is of the considerable quality. The book remains steady from beginning to end. Readers are also enabled to see the world through the lens of a man with years of experience in the world and a thorough understanding of humanity.

Whenever greatcharlie feels so enthusiastic over a book, the concern is raised that its review may be written off as an oleagic encomium. However, that is not the case, and readers will understand once they sit with the book. Despite concerns about what To Catch a Spy is missing, it would be worth reading to see what appears to lie at the base of such positions and take one’s own deeper look into Olson’s discussion. Having engaged in that process itself, greatcharlie found it thoroughly edifying. It is assured that after the first reading To Catch a Spy in this manner, one would most likely go back to the book and engage in that stimulating process again and again.

With To Catch a Spy, Olson confirmed his reputation as an excellent writer in the genre of intelligence studies. The book will also likely serve for years as an inspiration to future author’s on the subject of counterintelligence. As aforementioned, the book will surely be consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. The rudiments of counterintelligence tactics, techniques and procedures, and methods offered by Olson, to some degree, may also serve as a source for guidance Indeed, much of what is within can aptly serve as a foundation upon which they will construct new approaches. 

Further, both by what he includes and ironically by what he omits in the text, became the supplier/purveyor of a foundation upon which an honest discussion can be had among people inside and outside of counterintelligence services in free societies–well-known constitutional republics and liberal democracies in particular–can look at themselves and their organization’s work relative to the rights and interests of the citizens of the respective countries they defend. It is a conversation to which greatcharlie believes To Catch a Spy can lend support. It is a conversation in current times, especially within the US, that many citizens greatly desire to have. Without hesitation, greatcharlie recommends To Catch a Spy to its readers.

By  Mark Edmond Clark

Trump Achieved More at Helsinki than Most Noticed: Putin Is Not a Challenge for Him

US President Donald Trump (left) and Russian Federation President Vladimir Putin (right). Trump is attempting to repair a broken relationship between the US and Russia, and snuff out the danger that contentious interactions between the two countries poses. US President Barack Obama was barely on nodding terms with Putin by the end of his administration. Trump hoped to move to a higher level of understanding with Putin at Helsinki. He has not as yet given up on the idea that he will find some touch that would knock everything with Putin in the right direction.

One of the main pitfalls US President Donald Trump has faced while serving as president is that he must operate from Washington, which could be sardonically called occupied territory given the many power circles arrayed against him there. Indeed, Trump and members of his administration have been afflicted by hostile opposition and persecution. A very raw and destructive claim has been repeated by many elements of the US news media and certainly by critics and detractors among the pundits, that Trump is incompetent and there is no pattern or direction to action for the country from his administration. In terms of foreign policy, the administration characterized as being adrift. Perhaps “krise” is the word that would best describe the situation as depicted. The dislike of Trump is so intense in many media circles that it would not be melodramatic to assert that the ultimate goal of reporting has not been to correct Trump or improve his policy decisions, but rather to cause him to falter. Even many policy experts who would normally take a serious analytical approach to their critiques of Trump more often do less to inform in a balanced way, and rather, set out to tear him down. Such was the case concerning the July 16, 2018 Helsinki Summit between US President Donald Trump and Russian Federation President Vladimir Putin. Discussion of summit even before it began was rarely described other than harshly. Critics and detractors indicated that in order for Trump to impress them, which is not his job, they would expect to see nothing less from him at Helsinki than to approach Putin with a gritty teeth attitude, making bold accusations and great demands. Predictions made of Trump’s likely performance in the US news media were decidedly negative. After the summit, those same observers insisted that their ideas were confirmed. They characterized Trump as being subordinated by Putin.

There is always the danger of theorizing before facts are actually available. However, critics and detractors whose views were published in newspapers and magazines, broadcast on television, and posted online, were unconcerned with facts as pilloried Trump with their vitriol. Yet, in taking that approach, those observers of Trump made some pretty big wrong turns in their analyses Trump’s efforts in Helsinki. It might be worthwhile for them and all interested in Helsinki to take a step back, and look afresh at the matter, considering all facts, not just those that conveniently lend albeit tenuous support to a negative view. While what is offered here by greatcharlie may only be a worm’s eye view of an enormous matter and may not be able to change the perspectives of many. However, the purpose is provide an outside the box analysis of the meeting that may help contribute to the policy debate of US-Russia relations and stimulate fresh ideas. A number of aspects of the meeting that have not received much attention are examined. Some insights into how relations between Trump and Putin are evolving are also offered. For intelligence services worldwide, understanding the inner thinking of national leaders and their coteries of advisers, can be both a joy and a torment. For greatcharlie, examining the matter remains intriguing and has practically become a daily obsession. Confragosa in fastigium dignitatis via est. (It is a rough road that leads to the heights of greatness.)

Any time the presidents of the US and Russia meet, it could be billed as a meeting of eagles. The two are leaders of the only military superpowers on Earth, both capable of omnicide through a single decision. What stands between all of the people of Earth and eternity is the vocabulary of the two men.

Matters Covered by Trump and Putin in Helsinki

Any time the presidents of the US and Russia meet, it could be billed as a meeting of eagles. The two are leaders of the only military superpowers on Earth, both capable of omnicide through a single decision. What stands between all of the people of Earth and eternity is the vocabulary of the two men. The Helsinki Summit began with a one-on-one meeting between Trump and Putin. Except for translators, no other advisers or aides were present. It was followed by a bilateral meeting with advisers and aides included. On the heels of those meetings, a joint press conference was held.  When it began, Trump spoke first, then graciously deferred to Putin by allowing him to provide a list of issues covered in their meeting.  For Trump, this was certainly a rational choice, reinforcing goodwill and strengthening his evolving rapport with Putin. Trump’s moderation was put on full display for the world to see. Moreover, Trump most likely wanted to avoid getting into a meaningless and unconstructive chicken-and-egg debate on whether a Russian report on what transpired during the summit was heard before the US presented its version.

The US news media made inquiries into why list came only from Putin and whether Trump agreed with the list. Some characterized Trump as being mysterious about what was discussed. Critics and detractors immediately claimed that their first blush impression that Putin would dominate Trump at the summit and run the meeting were confirmed. Rather than viewing what Putin offered as a manifest of topics covered, it was panned by reporters as a list of spoils that Putin took from the meeting. The general approach to US news media reporting of the meeting was negative. Moreover, only a modicum of fact was used to portray a maximum of knowledge, which ultimately revealed a lack of awareness among the reporters and no real ability to discern what happening before them. Their negative perspectives were reinforced when they were commingled with the issue of Russian interference in the 2016 US Presidential Election and reports of continued Russian efforts to interfere with the US election system and democratic process. Insubstantial interconnections between Trump and Russia prior to the 2016 election were reported  once again and incredulously characterized as indicia of wrongdoing. Attempting one more time to ameliorate concerns on the election interference front, Trump acknowledge that issues concerning election interference were broached and addressed, but his desire was to move past what was done to what can be done immediately. For the US news media as well as critics and detractors, the immediate impression was that Trump’s statements were not solid enough, and simply interpreted his words negatively.

When Trump went on to make gracious statements to Putin, he was seen as again being reluctant to use the opportunity of these US-Russia meetings to criticize Putin for additional ills that go beyond election interference. Statements Trump made concerning Putin’s response clearly evinced a desire to move forward, however, by his own admission, he would recognized that he may have said what he did not want to say. Indeed, two days later, on July 18, 2018 at the White House, he admitted that he misspoke amidst his comments concerning Russian interference. Trump explained that he was moved by the spirit of the moment and insisted that it was not his intention to declare everything as being hunky dory.

The US news media also found Trump’s politeness toward Putin very disconcerting. Many observers still wonder whether it was simply politeness. Some critics and detractors found it nothing less than obsequious and alleged that it was due to timidity. Over the top theories in the US that Putin possesses some derogatory, even threatening information on Trump, kompromat, were written and spoken once more. Surely, if Trump had found it prudent, he would have had little problem in meeting the wishes of critics by admonishing Putin once again over election interference in furtive one-on-one session, the bilateral meeting, or publicly at the press conference. However, life experience had surely taught Trump that aggressively reproaching Putin at Helsinki would not bring satisfaction, not even for the short-term. Russia was wrong to act against US interests in the 2016 elections, but what was done is done. Trump can respond by taking punitive economic measures, sanctions, and expelling Russian diplomats and intelligence officials from the US, and padlocking Russian government facilities in the US. However, he also knows that Putin to the best of his ability has thought through, “gamed”, the possible consequences to his actions with his advisers. It appears that he stands ready to take his medicine and he is not overly concerned with retribution from the US short of acting on Russian sovereign territory or acting harshly against the interests of Russia and its allies. What might be wise for Trump to do beyond providing lip-service to Putin as suggested by critics and detractors, is close the door on future Russian activities against the US and as best as possible, build a positive relationship with Putin, and improve US relations with Russia. Although Trump certainly has some anger, bitterness, and resentment in his heart over what Putin and Russia have done, he knows behaving too aggressively would be short-sighted, and would only lengthen the distance he will need to travel to improve the US relationship with Russia. Trump will not sacrifice any benefits that might result from acting in a measured way. What critics and detractors have been demanding from Trump, to repeatedly confront Putin, is most telling of their own flawed understanding of the situation. Aggressively reproaching Putin would never be an effective plan for dealing with the Russian leader if positive results are desired. 

Putin has been rather ambiguous about what exactly he did during his time in the KGB. There have been no official revelations about the operations that he participated in during his career. However, from the time Putin entered the spot light, pundits in the US have done a good amount of creative thinking on Putin. A persona was steadily crafted for Putin, heavily influenced by colorful characters of spy novels, feature films, and television programs about espionage.

Trump also likely recognizes just how devastating the outcome of the wrongful Russian effort to interfere in the 2016 US Presidential Election was for Putin. Putin does not have too much to gloat about. Not only was the covert operation discovered, but a great number of those involved in it from the Russian intelligence and security services have been identified. Ironically, as Putin approved the effort to exploit gaps in the security of the US election system that would allow foreign penetration, he learned at the same time as the rest of the world that the US had broken into the systems of the Russian intelligence and security services to the extent that they could provide profiles of those involved beyond name, rank, and serial number. The whole world was fascinated by the fact that the US could detail the exact role that officers from Russia’s intelligence and security services each played in the operation. One could even surmise sardonically that the US had the ability to determine “when those officers were home and when they were not.” Indeed, it was Putin’s own intelligence and security services that had been successfully penetrated. While his intelligence and security services may very well be continuing their efforts to manipulate US elections, he may be on the verge of recognizing that the more his spies plug into the US system to do damage, the more US intelligence services and law enforcement is enabled to discover about Russian intelligence tactics, technique, procedures, and methods, leadership, personnel, and resources. 

To better understand what in part guides Trump’s thinking on foreign policy, one must keep in mind that in his “previous life”, he was foremost a land developer, a builder. To build a building one must have a design and plans from architects and engineers. However, the most important initial action must be to ensure that the structure will be stable will last by creating a strong foundation. That is a requirement that will never change. Those builders who have failed to recognize this have met with disaster. Now Trump, in his own way, is building a new foundation for US role in world. Trump was initially accused of thinking of Utopian possibilities on foreign policy: revising trade agreements; terminating long-standing but nonviable treaties; and, making better deals for the national interest and for US firms. Trump has sought to create an environment for peace, with the support of allies and through an authentic rapport with competitors and adversaries. To accomplish this, strategic concept on US foreign policy and diplomacy includes seeking open dialogue with decision makers from around the world, including those who may hold different views than his on how to approach issues but also place great value in the rule of law, democratic government, human rights, freedom of speech and free enterprise that underpin human progress.  He supports a rules-based international system and closer cooperation across borders to address geopolitical, economic and social challenges. So far, things that once seemed so impossible, now appear so simple and natural when handled by Trump. “Das Wunder Trump!” Trump’s foreign and national security policy efforts represent an invasion of new ideas, new approaches the political circles in the US have not been easily accepted, but one way or the other must submit to. Trump’s optimism, his nature as an “imagineer”, has driven him to at least take a crack at making things better.

With Putin, Trump is certainly not staring at his shoe laces. He is attempting to repair a broken relationship between the US and Russia, and snuff out the danger contentious interactions between the two countries poses. US President Barack Obama was barely in nodding terms with Putin. Trump has expressed the nice idea that the US and Russia could accomplish so much more positive things in the world if they could find a way to work together on issues in the transnational interest. With an optimism spurred by having found some areas of agreement and given the degree of mutual respect between Putin and himself, Trump hopes to move to a higher level of understanding with him at Helsinki. Trump has not as yet given up on the idea that he will find some touch that he could put on the situation that would knock everything in the right direction.

A long espoused criticism of Trump is that he has a self-enchantment with tyrants, strongmen, rogue leaders such as Putin. His comments about Putin even before Helsinki were decried by critics and detractors, and as well by many in the US news media, as being unduly pleasant and oleaginous, particularly in light of reports from the US Intelligence Community that Russia interfered in the 2016 US Presidential Election. Trump dismisses the obloquy of critics. In fact, rather than finding Putin intoxicating, Trump has his own considerable reservations about him having had a number of disappointing experiences with him in the past year. Indeed, while engaged in diplomacy, the Trump administration has observed Russian moves such as continued interference in the US election system and the election systems of US allies and partners, Russian efforts to support Syrian President Bashar al-Assad, and the tightening of Moscow’s grip Crimea and the Donbass.

In the one-on-one session, Trump and Putin undoubtedly sought to present every issue discussed from the best advantage of their respective countries. Trump certainly understood that it had to be done without compromising conditions for finding agreement or resolution on them. Each issue needed to be presented with a certain amount of emphasis and pressure. Yet, nothing would be allowed to deviate far from Trump’s vision of what the US needed. After the one-on-one session, Trump surely better understood Putin’s thinking and intentions.

Trump is not relying on banal Hollywood depictions of the KGB or any other fictions to understand Putin. He wants to understand him in the rough. Searching for publicly available expressions from Putin about his thinking and reactions, Trump undoubtedly came across what Putin wrote in his 2000 memoir, First Person: An Astonishingly Frank Self-Portrait by Russia’s President (Public Affairs, 2000). It would serve as an excellent starting point for anyone seeking to understand how Putin perceives himself and his relationships with others.

What Trump Knows about  Putin

It may very well be that following Helsinki, Putin surmised the Russian government was magnified in the eyes of its people and the world. He may have returned to Moscow and “tripped the light fantastic” over the way things turned out with Trump. That behavior would fit the US media version of Putin: an icy, former KGB officer who views the US, the West, and especially Trump with disdain. Undoubtedly, Putin is a shrewd, experienced operator, who always acts with purpose, remain focused on his intention, and has applied as much pressure necessary to maintain his grip on power in Russia. The manner in which Putin does his homework for meetings with other national leaders, such the summit with Trump in Helsinki, was previously explained in a February 28, 2018 greatcharlie post entitled, “A Russian Threat on Two Fronts: A New Understanding of Putin, Not Inadequate Old Ones, Will Allow the Best Response,”

For decades, Hollywood has presented spying as a tough, violent business, with a thousands twists everyday. However, while some intelligence officers may have exceptionally exciting careers, for the most part, life in the intelligence world is humdrum and far from that conjured in the minds of creative screenwriters. Inured with the imaginary version from feature films and television, it is perhaps difficult for outside observers to accept that reality. It is a reality that is unappealing, unappetizing for pundits for it spoils the fantasy the excitement, and fascination. Except for certain parts of his 2000 memoir, First Person, An Astonishingly Frank Self-Portrait by Russia’s President (Public Affairs, 2000), Putin has been rather ambiguous about what exactly he did during his time in the KGB. There have been no official revelations about the operations that he participated in during his intelligence career. However, from the time Putin entered the spot light, pundits have done their own share creative thinking on Putin. In this way, a persona was steadily crafted for Putin, heavily influenced by colorful characters of spy novels, feature films, television program about spying, that the pundits can understand.

In an almost amorous way, they ogle over Putin, as everything a KGB officer would be serving as the point of the spear of the ideological face-iff between East and West. They oddly insist that Putin is an amoral spy, a master of his craft always operating, making use of the tactics, techniques, procedures, and methods of that job. A vision of Putin is very often created for readers and viewers by reporters as the officer still in the field, developing agents, tracking down intercepting, neutralizing and recruiting foreign spies, and engaging in “wet work”, assassinating the foes of the Soviet Union. Left alone in your den, he would very likely attempt to read your mail. One could easily be convinced by it all that Putin is still on the beat and that he never really left the service. By breathing so much of their own imaginations into their depictions of Putin, pundits and reporters also create a type of Walter Mitty experience for themselves, finding excitement in interviewing him, and even just covering him. Pundits and reporters may insist that there is nothing sporting, nothing good about Putin, but their depictions of him are often so passionate that they seemingly evince many are oddly enamored by him. When reporters as well as critics and detractors match “their Putin” against Trump, there is no contest. Putin wins hands down.

Res ipsa repperi facilitate nihil esse homini melius neque clementia. (I have learned by experience that nothing is more advantageous to a person than courtesy and compassion.) As opposed to wrongly characterizing Trump’s politeness to Putin as obsequiousness or subordination, it should have been given far higher meaning. It was clearly an exhibition of a higher order of social grace, his mastery of good manners and etiquette, should have been discerned as such. As mentioned, Trump came office with the intention of cauterizing long standing tensions, exacerbated by the previous administration’s mishandling of US Russia relations, and finding a way to create a genuine connection with Putin in order to establish a stronger bond bofh between the two leaders and two nations. It has been a bedeviling process. What observers were seeing was a truly inventive approach to Putin, which seems to have yielded some positive results.

In his own appraisal of Putin, Trump very likely recognized that he was somewhat vulnerable and reactive to slights. Typically, individuals feel slighted when they perceive that they not being given the respect they feel they deserve. Psychologists call slights “narcissistic injuries.” From what Putin wrote in First Person, his ego must be boosted by affirmation. He needs to know that others respect him and feel that he is important. Slights can have dangerous consequences. The usual response is to assert ones power and identity, to fight back in some way.

Trump’s Appraisal of Putin

Usus, magister egregius. (Experience, that excellent master.) Trump is not relying on banal Hollywood notions Putin the former KGB officer or any fictions to understand Putin. He wants to understand Putin, the individual, in the rough. Trump is not relying on banal Hollywood depictions of the KGB or any other fictions to understand Putin. He wants to understand him in the rough. Searching for publicly available expressions from Putin about his thinking and reactions, Trump undoubtedly came across what Putin wrote in First Person It indeed serves as an excellent starting point for anyone seeking to understand how Putin perceives himself and his relationships with others. In its review of First Person, greatcharlie recounts the segment in Part 4 of the book in which Putin outlines his recruitment into the KGB and the initial activities in which he was engaged for the service. Putin admits that during all his years in university, he actually waited for the man at the KGB office to contact him. He was beginning to feel discouraged. As Putin says he reasoned at the time: “It seemed that he had forgotten about me. After all, I had gone to see him as a school kid. Who would have thought that I could have such spunk? But I recalled that they didn’t like people to show their own initiative, so I didn’t make myself known. I kept quiet. Four years passed. Nothing happened. I decided that the case was closed, and I began to work out different options for finding employment either in the special prosecutor’s office or as an attorney. Both are prestigious fields.” However, when he was in his fourth year of university, a man came and asked Putin to meet with him. Putin said the man did not say who he was, but he immediately figured it out, because he said “I need to talk to you about your career assignment. I wouldn’t like to specify what it is yet.” Putin said he reasoned at the time: “If they didn’t want to say where, that meant it was there.”  Putin’s story about his recruitment goes on: “We agreed to meet right in the faculty vestibule. He was late. I waited for about 20 minutes. Well, I thought, what a swine! Or someone was playing a prank on me? And I decided to leave. Then suddenly he ran up, all out of breath. “I’m sorry,” he said. Putin notes that he liked that.” Then Putin heard what must had been magical words: “It’s all arranged.” He went on to state: “Volodya, there is still a lot of time, but how would you feel if you were invited to work in the agencies?” Putin interestingly remarked: “I didn’t tell him that I had dreamed of this moment since I was a schoolboy. I didn’t tell him, because I remembered my conversation in the KGB office long ago: ‘We don’t take people who come in on their own initiative.’” Despite what was said that day in the vestibule, Putin heard nothing more. The man disappeared. Then, there was the odd day when Putin received a phone call; an invitation to the university’s personnel department. However, when Putin arrived at the employment commission there was some confusion. Putin explains that when reached his name, a representative from the department of law said, “Yes, we’re taking him into the bar.” Then an agent sitting in a corner of the room who was monitoring the students’ assignments suddenly awoke and said, “Oh, no.”  He went on to say: “That question has already been decided. We’re hiring Putin to work in the agencies of the KGB.”  Putin claims the agent said it out loud in front of the jobs assignment commission. Nevertheless, days later Putin was completing several application forms and papers.

In his appraisal of Putin, Trump very likely recognized that the Russian President is somewhat vulnerable and reactive to slights. Typically, individuals feel slighted when they perceive that they not being given the respect they deserve. That vulnerability points towards insecurity. Although one may not admit to having a fragile ego, it becomes apparent when ones sense of self is easily damaged. Often that vulnerability is caused by a basic sense of separateness and incompleteness. Somewhere along the path of life, one began viewing themselves as insignificant.  This may not exactly be the case for Putin, however, it would seem from what he wrote in First Person, his ego must be boosted by affirmation. He needs to know that others respect him and feel he is important. Psychologists call slights “narcissistic injuries.”  To go further, slights can harm one egos, make one feel belittled. They uncover ones latent sense of insignificance. Ultimately, slights of all kind can be reduced to the same basic feeling of being devalued or disrespected. Slights can have dangerous consequences. They can play on an individual’s’ mind for days, opening psychic wounds that are not easy to heal. The slight may be repeated in the mind. The hurt and humiliation may have a corrosive effect internally. The usual response is to assert ones power and identity, to fight back in some way: return the slight to the perpetrator other even violence.

More than once, in the face of harsh rebuffs from critics and detractors, Trump has expressed his concern over the way in which the Obama administration, on a regular basis and needlessly, slighted Putin. Surely, Putin has not been the most moral actor on the world stage. Nevertheless, the response to questionable moves by him should not have been to pressure him with slights, in an almost childlike way being fully aware of how adverse his reaction would be.

Recall What Occurred before Trump Took Office

More than once, in the face of harsh rebuffs from critics and detractors, Trump has expressed his concern over the way in which the Obama administration, on a regular basis and without need, slighted Putin. Surely, Putin has not been the most moral actor on the world stage. Nevertheless, the response to questionable moves by him should not have been to pressure him with slights, in an almost childlike way being fully aware of how adverse his reaction would be. Once the slights were made, there was always a follow-on effort to feign if there was surprise over his attitude and actions against US interests. Indeed, the Obama administration went out of its way to figuratively “poke the bear.” When Putin began his third term as Russia’s president on May 7, 2012, the Obama administration responded to him as if he were a neophyte and not a seasoned national leader. Old ills that were part of US-Russian relations resurfaced, and new ones arose, to include: Putin’s decision to allow US National Security Agency whistleblower Edward Snowden to reside in Russia; ongoing espionage efforts between Russia and the US, including the activities of the Russian Federation’s Foreign Intelligence Service officer Anna Chapman and other Russian “illegals” captured by the Federal Bureau of Investigation in 2010, and the allegations of US spying on Russia revealed by Snowden and Wikileaks; and the US admonishment of Russia on human rights issues. Putin was still fuming over Operation Unified Protector, during which in 2011, multinational forces including the US, were placed under NATO command and imposed a no-fly zone and destroyed government forces loyal to then-Libyan President Muammar Gaddafi. Putin felt NATO-led forces went beyond UN Security Council Resolution 1973’s mandate by helping local forces overthrow Gaddafi. Gaddafi had been a friend of the Soviet Union and Russia.

Perhaps Obama administration foreign policy advisers and experts did not fully grasp just how poorly things were going with Putin. The Obama administration was confident enough to push agendas for nuclear arms reductions with Russia and EU and NATO expansion in Europe just as the administration of US President George W. Bush, his predecessor had. The administration referred to its effort to transform US-Russian relations and achieve further nuclear arms cuts before leaving office as a “signature effort.” The reduction of nuclear forces and reductions in conventional forces have been issues US and Russian leaders have dealt with for decades, but Obama was not going to resolve any nuclear issues with Putin. Russia’s strategic nuclear forces are not a mere policy issue or bargaining chip for Putin, but a means of survival for Russia. Putin had no intentions of acceding to proposals for deep cuts in its nuclear arsenal repeatedly sent to Moscow by the administration. The insistence of Obama administration officials to take such an aggressive approach in talks with Russia more than anything served to disrupt the US-Russia relationship. Efforts by US officials diplomats and officials to threaten and cajole, as Moscow perceived talks, were more than just displays of a lack of diplomatic tact and maturity, they were viewed as threatening. Relations with Putin and Russia fell to a very low point when the Obama administration cancelled a September summit meeting between Obama and Putin in 2013. The cancellation was in retaliation over Putin’s decision to reject the administration’s nuclear proposals. Administration officials lamented that Putin’s decision ended the president’s “signature effort.”

A succession of public rebuffs to Putin sullied ties further. The next year, during preparation for the 2014 Winter Olympic Games in Sochi, there was a constant drum beat of doubt expressed by US security experts on the capability of the Russian security services to protect Sochi from terrorism. Obama decided not to attend the Olympics and would later decide not to attend the 2015 Moscow Victory Day Parade commemorating the 70th anniversary of Nazi Germany’s surrender to the Allies, ending World War II in Europe. The event, hosted by Putin, was a time to recall the legacy of cooperation established during the war and a real example of what US-Russian cooperation could be in a common cause. It offered a chance for Obama to privately address his dispute with Putin. It was the best time for him to say that as with the alliance between their countries in World War II, relations between their countries were important now and a greater matter than their personal issues. Obama’s absence that day became one more reminder of the two leaders differences and their uncongenial relationship. A war of words between US and Russian officials was also problematic. Words of anger, mockery, hate, and aggression, did damage that was nearly impossible to repair. In the last days of his presidency, Obama ordered the expulsion of 35 suspected Russian spies and imposed sanctions on two Russian intelligence agencies over their involvement in hacking US political groups in the 2016 election. All of this and more made for a very rocky road for the Trump administration to travel with Putin.

One could look at Putin and express the view that the problem during the Obama administration was his own fragility. However, that type of obstinate reaction would ignore the fact that Putin is the president of Russia and good diplomacy requires understanding your opposite much as Trump wants to do.

One could look at Putin and express the view that the problem during the Obama administration was his own fragility. However, that type of obstinate reaction would ignore the fact that Putin is the President of Russia and good diplomacy requires understanding your opposite much as Trump wants to do. To the extent that Trump sought a better way to interact with Putin in a graceful, subtle, yet deliberate way that would signal respect and understanding to a cautious, sensitive, and vulnerable Putin, he appears to have found the answer in Japanese culture.

How people interact with each other and display respect is a form of etiquette in the Japanese status system known as “kata”. It originates from ancient Japanese system. Kata rituals are not a suite of meaningless actions. The proper performance of kata provides observers with an indication of ones professional qualifications. People who use kata well are thought as people who can be trusted to understand their roles and function well within an organization or in the society. Direction and guidance in kata begins at grade school in Japan. Early on, students study “kanji” and must learn the exact stroke order for characters. If students do not write characters in the set way, regardless of whether there are easier ways to write them, they will not receive good grades on tests. Kata can be seen everywhere in Japanese society. The ritualistic exchange of business cards that businessmen visiting Japan wonder about and often worry about performing properly, is a form of kata. When shopping, store staff will wrap ones purchase neatly. That practice of careful wrapping is a type of ”kata” that demonstrates to the customer how important the purchase is to the store. If the purchase is a gift, the quality of wrapping indicate to the recipient that the gift comes from the heart. The sincerity of the giver is also placed on full display. In following with kata, the recipient would not open the gift with the presence of the giver. Rather, the recipient express his appreciation humbly and politely, setting the gift aside in a show of respect.

As a long shot, one might surmise that using a simulacrum of kata could have be helpful as a correlative benefit of his interactions with his close friend, the shrewd and adept Japanese Prime Minister, Shinzō Abe. On each occasion that Trump met with Abe, there could not have been a finer, more elegant, more dignified display of kata than that performed by the Japanese Prime Minister. To the extent that Trump recognized how much respect, goodwill, and friendship was communicated by Abe by his deliberate gestures, he became aware that through kata, he might convey to Putin that there is little reason to feel threatened and remain excessively guarded. Abe has already helped Trump by deciphering written responses from DPRK Chairman Kim Jong-un and who could share the benefit of his own interactions with Putin on trade, security, and the disputed Kuril Islands or Northern Territories.

Japanese Prime Minister Shinzō Abe (left) and Trump (right). On each occasion that Trump has met with Abe, there could not have been a finer, more elegant, more dignified display of kata than that performed by the Japanese Prime Minister. To the extent that Trump recognized how much respect, goodwill, and friendship was communicated by Abe by his deliberate gestures, he perhaps became aware that through a simulacrum of kata, he might convey to Putin that there is little reason to feel threatened and remain excessively guarded.

Putin indicated in First Person that his involvement in the martial arts had a direct impact on his lifestyle. While admitting that prior to studying judo he tried smoking a couple of times, but “ruled it out” when once he became engaged in sports. Putin says that he initially worked out every other day, then every day.  He says he soon had no time available for anything else. Regarding his thinking at the time, he explains: “I had other priorities; I had to prove myself in sports, achieve something for myself. I set goals. Sports really had a strong influence on me.” Putin immersed himself in the judo, and the culture from which it emanated. Putin, who today is a very experienced judoka and one very familiar with Japanese martial culture. It would have undoubtedly been hoped that he would pick up on Trump’s effort and that he would respond by being a tad more open with the Trump than he might be with other foreign leaders and certainly previous US presidents with whom he has met.

Additionally, with regard to Japan, Trump may have recalled his own complex business interactions in that country beginning in the late 1980s. Indeed, when Trump sought to reach to deals with Japanese firms, he found it all very ticklish. In his 1987 book, The Art of the Deal, Trump explained: “I have great respect for what the Japanese have done with their economy, but for my money they are often very difficult to do business with. For starters, they come in to see you in groups of six or eight or even twelve, and so you’ve got to convince all of them to make any given deal. You may succeed with one or two or three, but it’s far harder to convince all twelve.” Trump fully understands that although Putin is the main authority in Russia, he must still respond to multifaceted influences.

Putin’s disposition at the start of the Helsinki Summit was unexpected. Indeed, his bearing was far from the usual sharp, strapping deportment of the Russian leader. After all, he had come to Helsinki to meet a big broth of a man as Trump and surely wanted to make a proper showing of himself. Sitting in the chair at the Finnish Presidential Palace was not the loose, athletic, virile Putin, who before meetings exudes confidence, high-energy, and a readiness to do business.

At the start of the Helsinki Summit, Putin was visibly not himself. Aside from a surprising delay in his arrival to the Finnish Presidential Palace, there seemed to be a problem with Putin’s state of health as he sat with Trump for the cameras. From the perspective of greatcharlie, as a layman, not a physician, there appeared to be considerable strain on Putin’s face, was not an act, an effort to relax Trump or illicit some reaction from him such as over reach, sensing that he had a advantage over him. Putin’s grimaces in discomfort were involuntary expressions. Further, there was a tightness in his face, while at the same time, his face was even puffy, nearly swollen in places. His eyes reflected strain, pain even. Even while immersing himself in ice water for a Russian Orthodox religious ceremony, less strain was seen on him. At one point, Putin even began gripping the lower portion of the left arm of the chair in which he sat.

What may have caused the apparent degradation in Putin health was the fact that just the day before, Putin was drenched with rain at the trophy presentation of the 2018 FIFA World Cup in Moscow. Medical experts generally reject the notion that rain makes one sick. Nevertheless, if, after being in the rain, one were to remain cold for long enough, the body’s immunity drops and one can become more susceptible to illness, Those already on the brink of getting sick with a cold, may find that the cold comes out after being caught in the rain because of lowered immunity.

Medical researchers have explained that laymen are usually able to recognize signs that another individual is acutely unwell. Some obvious signs of illness such as sneezing and coughing are easy to spot, but more subtle cues such as pale lips or droopy eyelids may help humans to tell when another person is sick. That appears to be the case even hours after an infection begins. John Axelsson is the co-author of a study in the journal Proceedings of the Royal Society B that highlights the ways in which humans might use a host of early signals to avoid contracting infection from others. According to Axelsson, “We use a number of facial cues from other people and we probably judge the health in other people all the time.” The ability in humans to use a host of early signals to recognize sickness in other has apparently been developed to help them avoid contracting infection from others.

Putin was visibly not himself at the start of the Helsinki Summit. Aside from a surprising delay in his arrival to the Finnish Presidential Palace, there seemed to be a problem with Putin’s state of health. From the perspective of greatcharlie, as a layman, not a physician, it was not an act or some trick to relax Trump and illicit some reaction from him such as over reaching because he sensed that he had a advantage over him. Putin’s grimaces in discomfort were involuntary expressions.

What may have caused the degradation of Putin’s health was that just the day before, he was drenched with rain at the trophy presentation of the 2018 FIFA World Cup in Moscow. Medical experts generally reject the notion that rain makes one sick, calling it myth. However, they also explain that this is a common belief because when individuals get caught in the rain, often the body temperature drops and that may cause temporary sniffles, which is an immune system response. The only way the rain can almost assuredly make one sick is if the rain water contains germs that you swallow or fall into your eyes. If, after being in the rain, one were to remain cold for long enough, the body’s immunity might drop and one could become more susceptible to illness. Thus, the rain may aggravate ones immune system, Those already on the brink of getting sick with a cold, may find that the cold comes out after being caught in the rain because of lowered immunity. There is a lot on this subject, and all of it cannot be unpacked here.

There was a tightness in Putin face as he sat with Trump for the cameras in Helsinki. His face was even puffy, nearly swollen in places. His eyes reflected strain, pain even. Even while immersing himself in ice water for a Russian Orthodox religious ceremony, infinitely less strain was seen on him. At one point, Putin even began gripping the lower portion of the left arm of the chair in which he sat. It appeared as if he were attempting to steady himself, trying to maintain control.

Putin’s disposition was unexpected. Indeed, his bearing was far from his usual sharp, strapping deportment. He had come to Helsinki to meet Trump, a big broth of a man, and surely he wanted to make a proper showing of himself. This was certainly not the loose, athletic, virile Putin, who before meetings exudes confidence, high-energy, and a readiness to do business. Using Putin’s previous public appearances as a gauge, particularly those with Obama, he presented himself at the start of the Helsinki Summit in an unimpressive way. When he met with Obama while attending a G-8 Meeting in Northern Ireland in June 2013. there was a moment when Obama attempted to infuse a bit of levity into the situation by stating, “We compared notes on President Putin’s expertise in judo and my declining skills in basketball and we both agreed that as you get older it takes more time to recover.” Instead of playing along, Putin retorted, “The president wants to relax me with his statement of age.”

Putin has never hesitated to take the “alpha male” role with leaders of other states and let them know his intentions either. In her excellent book, Putin’s Kleptocracy: Who Owns Russia?, Karen Dawisha recounts the occasion when the new prime minister of a Central Asian country paid his first visit to Moscow. He met with Putin. After the cameras had left the room, Putin is said to have loosened his tie, leaned forward, and in a menacing snarl told the startled leader: “Listen here (slushay syuda), I decide everything. Don’t forget it.”

Using Putin’s previous public appearances as a gauge, particularly those with Obama, he presented himself at the start of the Helsinki Summit in an unimpressive way. When he met with Obama while attending a G-8 Meeting in Northern Ireland in June 2013. there was a moment when Obama attempted to infuse a bit of levity into the situation by stating, “We compared notes on President Putin’s expertise in judo and my declining skills in basketball and we both agreed that as you get older it takes more time to recover.” Instead of playing along, Putin retorted, “The president wants to relax me with his statement of age.”

Having formulated a theory about Putin’s health given evidence of his apparent struggle with discomfort at the start of the summit, it must also be made clear that there was no evidence that he was planning to fall apart no matter how he might have felt. Putin will never shrink in the face of adversity.He hardened himself and likely hoped for the best. For Trump, thoroughly familiar with the fight game, Putin must have looked shockingly to him much as a boxer on the ropes and the one-on-one had not even begun. In some business situation, perhaps moving in to find some big advantage would have been the right call. However, this was a summit with Putin. Too much was a stake. He wanted reach agreements that Putin would adhere to and not disregard afterward. He wanted reach understandings with Putin that he would not later walk back from. He wanted to hear Putin to work with those understandings firmly in mind in the follow-on bilateral meeting and publicly adhere to those understandings in their joint press conference  Plus, as mentioned, a main focus of Trump’s intention was to develop a rapport with the Russian leader and tidy up relations Russia. That would not be accomplished by making slick moves that may satisfy ones ego but have a corrosive effect in the end. By end of meeting there was an obvious transformation in Putin’s condition.

Medicines such as aspirin, ibuprofen, or Tylenol can help the symptoms of colds, relieve the pain and can reduce the fever. For some individuals, there can be additional benefit from taking medications for congestion or cough such as antihistamine and decongestant combinations. It would appear that physicians had tried to address Putin’s condition. Any treatments likely had their effect as the summit moved on. At the joint press conference following the one-on-one and bilateral meetings, Putin emerged energized.

Medicines that can help the symptoms of colds are those that relieve the pain and can reduce the fever such as aspirin, ibuprofen, and Tylenol. For some individuals, there can be some additional benefit from taking medications for congestion or cough. Those medicines include antihistamine and decongestant combinations. It would appear that physicians had tried to address Putin’s condition before the summit. At the joint press conference following the one-on-one and bilateral meetings, Putin emerged energized, even satisfied. He was able to shake his discomfort.

Trump’s goal with Putin was to be unmistakably powerful, yet elegant in his approach. He would use just the right amount of muscle when necessary when broached issues with Putin. At the same time, he sought to find ways to connect with Russian leader, pave inroads into him, create a unique connection, find a chemistry between them. Despite his efforts to make things right, Trump may have received a negative message from Putin when the Russian leader presented him with an official football from the World Cup saying, “The ball is in your court.”

Putin and the Football: A Faux Pas?

Vita hominum altos recessus magnasque latebras habet. (Character lies more concealed, and out of the reach of common observation.) Trump has taken a huge step diplomatically with Putin by very publicly showing that he is willing to take time with Putin. He is giving him a chance to come around his way, hoping things will work out. There was no easy way to repair the relationship. He knew that it would definitely be a long row to hoe.

Trump wants something more than a cosmetic tie between himself and his Russian counterpart. In a media conscious culture, timidity easily takes the form of affected joviality, hoping to diffuse tension by amiability, a hug or a slap on the back and then the dialogue can begin. Any national leader who thinks the way to diffuse the tension with Putin is to play the minstrel will only signal his or her insecurity to the Kremlin. Trump’s goal with Putin was to be elegant in his approach, yet unmistakably powerful. His aim was likely to use just the right amount of muscle on any tough or even contentious issues that he broached with Putin. It would surely surprise critics and detractors if they were to discover there were times when Putin felt a bit stretched by Trump. Still, for Trump, the focus of the summit was not confrontation, as much finding ways to connect with Putin, pave inroads into him, create a unique positive connection, find a chemistry between them.

Despite his desire and efforts to make things right, Trump may have received a very disconcerting message from Putin when the Russian leader presented him with an official football from the World Cup saying, “The ball is in your court.”” Trump stated that he would give the present from Putin to his son Darren, and  tossed the ball to the First Lady, Melania Trump.

Although benign intent can be posited to Putin in presenting the ball to Trump, it could also be said that he displayed a lack of concern as to what would anger him. The ball presentation could be seen as evincing his willingness to mar what may have otherwise been a positive meeting. Observing closely, the ball presentation appeared off-putting to Trump. His countenance revealed disgust and disappointment in Putin.

It is impossible to truly know the reasoning behind Putin’s action with the ball. That is known only in the mind of Putin. As explained by greatcharlie in its February 18, 2018 post, “A Russian Threat on Two Fronts: A New Understanding of Putin, Not Inadequate Old Ones, Will Allow the Best Response,” Putin can display an enjoyment of life and good times, and be quite gregarious, outwardly happy, full of smiles. Putin undoubtedly understands the importance of having a sense of humor despite any difficulties he may face. Humor is beneficial for ones physical and emotional health. It reinforces ones relationships with family, friends, and colleagues. Physically, laughter can improve resistance to diseases by declining the stress hormones and increasing infection-fighting antibodies in the human body according to some research. Laughter can ease physical tension­ and help muscles relax. Emotionally, humor helps you to release stress and to keep an optimistic attitude. When one feels anxious or sad, a good laugh can lighten ones mood. The positive feelings emitted when one laughs will increase energy for the brain and body. That allows for greater focus and will allow one to look at the problems from less frightening perspectives. Humor helps one remain optimistic and humor communication boosts the emotional connection that will bring people closer together and increases happiness as well. Sharing a good-hearted laugh may serve in part to smooth out rough times. When Putin tells one of his many jokes, his sense of humor is evinced.

Although benign intent can be posited to what Putin did, there is also the possibility that in presenting the ball to Trump, a negative side of Putin was put on full display. Trump may of had that latter sense of it all. It was clear to all who observed closely that Trump’s reaction to the presentation was negative. His countenance revealed disgust and disappointment in Putin. It may not only have been negative act but it may also have revealed extraordinary lack of concern on Putin’s part as to what would anger Trump and evinced as willingness to mar what may have otherwise been a positive meeting. Critics and detractors of Putin would explain that it was all very characteristic of the Russian President.

Along with wise counsel from his senior foreign policy officials, everything that Trump learned about Putin at Helsinki will be used in his future calculations and actions concerning Russia. Improved relations with Putin and Russia would certainly be terrific. However, whether the matter concerns an intermediate range missile treaty, satellites, sanctions, Syria, Ukraine, North Korea, the Arctic, or anything else, Trump will press on, motivated by the reality that the US public is depending upon him to handle matters in their best interest, just as he has promised.

The Way Forward

In Act III, scene ii of William Shakespeare’s Measure for Measure, the Duke, the leader of Vienna, feigns leaving town on business in order to pose as a friar to observe goings-on in his absence. Lord Angelo, the temporary leader of Vienna, takes it upon himself to rid the city of brothels and unlawful sexual activity, believing there is too much freedom in Vienna.Through interviews and firsthand observations, the Duke discovered Angelo’s strict handling of matters, particularly the cases concerning two clowns, Elbow and Pompey, Isabella, Claudio and Juliet, Escalus and Mistress Overdone. Resolved to punish Angelo for his behavior, at this point in the play, The Duke offers a soliloquy on how he will use trickery to make Angelo pay for his sins. He states: “He who the sword of heaven will bear/ Should be as holy as severe;/ Pattern in himself to know,/ Grace to stand, and virtue go;/ More nor less to others paying/ Than by self-offences weighing./ Shame to him whose cruel striking/ Kills for faults of his own liking!/ Twice treble shame on Angelo,/ To weed my vice and let his grow!/ O, what may man within him hide,/ Though angel on the outward side!/ How may likeness made in crimes,/ Making practise on the times,/ To draw with idle spiders’ strings/ Most ponderous and substantial things!/ Craft against vice I must apply:/ With Angelo to-night shall lie/ His old betrothed but despised;/ So disguise shall, by the disguised,/ Pay with falsehood false exacting,/ And perform an old contracting.”  Putin has a tendency to behave in ways to convince that in his heart “he deviseth to do evil.” The presentation of the World Cup football was a bad idea. Hopefully, he is aware that Trump will not simply forget the matter and push the incident down. Trump may not have been able to figuratively stop that bird, that incident from flying over his head, but he can prevent that same bird from creating a nest in his hair. Putin hopefully learned quickly at Helsinki to refrain from pulling such stunts in the future, no matter how “well-intentioned.” Putin should also understand after the Helsinki Summit that Trump will never react well to bad ideas or ultimatums cloaked as proposals. Everything that Trump has learned about Putin with regard to Helsinki will be of great value to him. Along with the wise counsel from his senior foreign policy officials, the information will be used appropriately in his future calculations and actions concerning Russia. Improved relations with Putin and Russia would certainly be terrific. For now, it apparently remains a goal of the US President. However, whether the matter concerns an intermediate range missile treaty, satellites, sanctions, Syria, Ukraine, North Korea, or anything else, Trump will press on, motivated by the reality that the country is depending upon him to handle matters in its best interest, just as he has promised. He will keep “America First”. Ornat haec magnitudo animi, quae nihil ad ostentationem, omnia ad conscientiam refert recteque facti non ex populi sermone mercedem, sed ex facto petit. (To all this, his illustrious mind reflects the noblest ornament; he places no part of his happiness in ostentation, but refers the whole of it to conscience; and seeks the reward of a virtuous action, not in the applauses of the world, but in the action itself.)

The Pivot to Asia: The Policy Shift That Called Putin’s Attention to Europe’s Unlocked Doors

For the administration of US President Barack Obama, the reset with Russia was a major foreign policy initiative. For three years, a business-like tenor existed in relations, making the administration comfortable enough in 2011 to turn its attention toward Asia under what it called the “pivot to Asia.” Its hopes were dashed when Vladimir Putin returned as Russian Federation president in 2012, seeking to restore Russia’s power and influence. Soon after, there were numerous disagreements between Obama and Putin particularly over Europe. Relations deteriorated, and Europe again faced a threat from Russia.

What is most noticeable about US-Russia relations today is the uncongenial relationship between US President Barack Obama and Russian Federation President Vladimir Putin. While that relationship may seem in perpetual retrograde, there initially was real potential for positive ties and real progress on a variety of issues if the interests of both countries were considered. The Obama administration approached Russia with the idea that the relationship between the two countries could be “reset.” The reset with Russia was one of the administration’s major foreign policy initiatives. Relations with Russian Federation President Dimitry Medvedev were positive. For three years, a relatively smooth and business-like tenor existed in relations with Russia. That contrasted with the contentious relations that followed the Georgian War in 2008 while Putin served as president. It boded well for Obama’s legacy over which White House officials publicly admitted being absorbed. With its Russia policy on track, the administration was comfortable enough to turn toward an even greater priority at the end of 2011 which was referred to as the “pivot to Asia.” Then US Secretary of State Hillary Clinton explained it all in an edifying discourse in the October 11, 2011 edition of Foreign Policy magazine.

In her essay entitled “America’s Pacific Century,” Clinton wrote: “In the next ten years, we need to be smart and systematic about where we invest time and energy, so that we put ourselves in the best position to sustain our leadership, secure our interests, and advance our values. One of most important tasks of American statecraft over the next decade will therefore be to lock in a substantially increased investment—diplomatic, economic, strategic, and otherwise—in the Asia Pacific region.” Bringing to memory the historic US commitment to Europe after World War II, Clinton declared: “At a time when the [Asia-Pacific] region is building a more mature security and economic architecture to promote stability and prosperity, [the] U.S. commitment there is essential. It will help build that architecture and pay dividends for continued American leadership well into this century, just as our post-World War II commitment to building a comprehensive and lasting transatlantic network of institutions and relationships has paid off many times over—and continues to do so. The time has come for the United States to make similar investments as a Pacific power, a strategic course set by President Barack Obama from the outset of his administration and one that is already yielding benefits.” The administration’s plans were ambitious and admirable, but its hopes for a benign pivot to Asia were soon dashed. Europe once again faced a threat from Russia. There were numerous actions and reactions by Obama and Putin particularly concerning Europe. Relations deteriorated. Omnia iam fient quae posse negabam! (Everything which I used to say could not happen, will happen now!)

Candidates in the 2016 US Presidential Campaign, perhaps already considering how to deal with Putin and formulating policy approaches for Russia for their possible administrations, should get beyond us-them simplicities and avoid conceptualizing prospective relations solely on where they are at this moment in time. Rather, the course of the collapse of US-Russia relations and how to repair, and avoid, policy missteps witnessed over the past eight years should be anatomized. Part of that process would entail fully understanding those mistakes. Some of them are reviewed here. Further, it is important to genuinely understand the thinking of Putin and his advisers on Russia’s relations with the US. A truncated analysis, in the abstract, of such thinking inside the Kremlin is also presented here.

Igniting Putin: A New Russian Threat Excites Europe

From 1945 to 1989, US geo-strategists assessed that if a new world war were to occur, the battleground would be Europe. However, in the first term of the Obama administration, it was assessed that Europe had become more tranquil. There was a crisis in the eurozone, but Europe remained the most prosperous and peaceful parts of the world. The threat from China was the new focus of geo-strategists. That threat was ostensibly the underlying rationale for the pivot to Asia. In Europe, the announcement of the pivot to Asia was greeted with ambivalence, even alarm. The Europeans understood the renewed commitment to Asia would come at their expense. Obama administration officials tried to prove that was not the case at the time. However, with planned defense cuts of $500 billion over the next decade and the expressed intent to avoid reducing expenditures in Asia, Europe would be the only place to make cuts. The costs were conceivably higher given the possibility budgetary pressures would increase. Key defense commitments in Europe at the time included a missile defense system being developed with a possible nuclear Iran in mind. The administration had already announced that it intends to withdraw two of the four US Army brigades deployed to Europe—with overall military spending on Europe set to decline by 15 percent. Yet, US Army units stationed in Germany were considered in the context of rotations to the Middle East or Africa, not combat in Europe. There remained the potential threat of a breakdown in relations with Russia which would put Europe’s security at risk, but it was practically considered de minimus, negligible. The Obama administration considered the possibility that if Putin returned to Russia’s presidency, he would seek to exert pressure against the West where and when he felt it would pay dividends. It is unlikely the administration foresaw things would go so badly.

Obama was at ease with Medvedev. He went as far as to declare a new era between the two former Cold War adversaries existed. He seemed to measure all possibilities on relations with Russia on his interactions with him. However, maintaining a constructive relationship with the Russian leader is not a personal matter; it is part of the business of being president. Both the US and Russia possess the unique and mutual capability to annihilate one another, and the world, with their nuclear arsenals. Talks between the leaders of the two countries build confidence, eliminate ambiguities about positions, and prevent guessing over actions, intentions, and motives. Talks allow leaders to “clear the air” regarding any personal concerns they had within their own high-level relationship. A strong personal bond between leaders can develop, but it is not essential. When Putin began his third term as Russia’s president on May 7, 2012, the low yield of the reset and the underestimation of Russia as a potential threat became apparent. Putin returned to the Kremlin on a mission to restore Russia’s global power and influence. He was not interested in anything that might diminish or prevent that effort. Perhaps as a consequence of that, old ills that were part of US-Russian relations began to resurface, and new ones arose with frequency. Among them were: Putin’s decision to allow US National Security Agency whistleblower Edward Snowden to reside in Russia; ongoing espionage efforts between Russia and the US, including the activities of Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR officer Anna Chapman and other Russian “illegals” captured by the Federal Bureau of Investigation in 2010, and the allegations of US spying on Russia revealed by Snowden and Wikileaks; and the US admonishment of Russia on human rights issues. Putin fumed over Operation Unified Protector, during which multinational forces including the US, were placed under NATO command and imposed a no-fly zone and destroyed government forces loyal to then-Libyan President Muammar Gaddafi. Putin felt NATO-led forces went beyond UN Security Council Resolution 1973’s mandate by helping local forces overthrow Gaddafi. Gaddafi, who had been a friend of the Soviet Union and Russia, was killed. The world saw how poor the relationship between Obama and Putin was after observing their body language when they met in Northern Ireland on June 17, 2013.

Chief of Staff of the Presidential Executive Office and Sergei Ivanov (above). Ivanov is an anti-US ideologue. He believes the US has taken a foreign policy course aimed at holding on to US leadership in the world by means of the strategic containment of the growing influence of the Russian Federation and other centers of power.

How Relations with Putin Went Wrong Way

Perhaps the administration did not fully grasp just how poorly things were going with Putin. The Obama administration was confident enough to push agendas for nuclear arms reductions with Russia and EU and NATO expansion in Europe just as the administration of US President George W. Bush, his predecessor had. The administration referred to its effort to attain further nuclear arms cuts before leaving office as a “signature effort.” The reduction of nuclear forces and reductions in conventional forces have been issues US and Russian leaders have dealt with for decades, but Obama was not going to resolve any nuclear issues with Putin. Russia’s strategic nuclear forces are not a mere policy issue or bargaining chip for Putin, but a means of survival for Russia. Putin had no intentions of acceding to proposals for deep cuts in its nuclear arsenal repeatedly sent to Moscow by the administration. It was at this point in 2013 that relations with Putin and Russia truly began to collapse, falling to a very low point when the Obama administration cancelled a September summit meeting between Obama and Putin. The cancellation was in retaliation over Putin’s decision to reject the administration’s nuclear proposals. Administration officials lamented that Putin’s decision ended the president’s “signature effort to transform Russian-American relations and potentially dooming his aspirations for further nuclear arms cuts before leaving office.”

There were other very public affronts. The next year, during preparation for the 2014 Winter Olympic Games in Sochi, there was a constant drum beat of doubt expressed by US security experts on the capability of the Russian security services to protect Sochi from terrorism. A leader’s public declaration of his decision not to attend has practically been a tradition among US and Russian leaders during a period of disagreement in international affairs. In addition to the Olympics, Obama would later decide not to attend the 2015 Moscow Victory Day Parade commemorating the 70th anniversary of Nazi Germany’s surrender to the Allies, ending World War II in Europe. The celebration, hosted by Putin, was a time to recall the legacy of cooperation established during the war and a real example of what US-Russian cooperation could be in a common cause. It offered a chance for Obama to privately address his dispute with Putin. It was the best time for him to say that as with the alliance between their countries in World War II, relations between their countries now were important, bigger than both of them. Attending would have required Obama, as Rudyard Kipling would say, to “bite the bullet,” in terms of personal pride, but not in terms of his role as US president. By being absent, that day became one more reminder of the two leaders differences and their uncongenial relationship. Occasio aegre offertur, facile amittitur. (Opportunity is offered with difficulty, lost with ease.)

Between those years, the US and EU took Putin to task for his annexation of the Crimea. Harsh sanctions were levied and Russia was cast out of the Group of 8 industrialized democracies. Even tougher sanctions against Russian interests were threatened by the US if aggression against Ukraine escalated. Putin responded to it all with sanctions against US and EU products. In a March 18, 2014 speech declaring Russia’s annexation of Crimea, Putin vented his anger at the US and EU, enumerating some Western actions that fostered contempt in Moscow. He mentioned: Russia’s economic collapse, which many Russians recall was worsened by destructive advice and false philanthropy of Western business and economic experts that did more to cripple their country; the expansion of NATO to include members of the Soviet Union’s own alliance, the Warsaw Pact; the erroneous Russian decision to agree to the treaty limiting conventional forces in Europe, which he refers to as the “colonial treaty”; the West’s dismissal of Russia’s interests in Serbia and elsewhere; attempts to bring Georgia and Ukraine into NATO and the EU; and, Western efforts to instruct Russia on how to conduct its affairs domestically and internationally. Incursions of Russian bombers and fighters in NATO airspace and Russian warships in NATO waters were regularized. The only public bright spot in US-Russia relations was diplomacy between US Secretary of State John Kerry and Russian Federation Foreign Minister Sergei Lavrov, mainly on Syria and Iran. Still, that activity was more reflective of their countries’ roles on the UN Security Council, not the tenor of relations between Obama and Putin.

Russian Federation Defense Minister Sergei Shoigu (above). In response to what Russian officials refer to as “NATO’s preparations along our borders,” Shoigu announced on January 12, 2016 that there would be a major military build-up along its border with Ukraine.

Putin’s Pushes Westward

The poor US relationship with Russia, just as much as the Ukraine crisis, affected Europe’s relationship with Russia concerning business, economics, and security. In the summer of 2013, the EU Council sharply condemned Russia’s mounting pressure on members of the EU Eastern Partnership, countries with association agreements with the EU. In 2012, the EU accounted for 52 percent of Russia’s exports, 68 percent of which consisted of fuel and energy. Following the annexation of Crimea in March 2014, the EU suspended virtually all cooperation. Still, Putin’s thinking on the EU was not positive even before the Ukraine crisis. Putin saw the EU as a project of deepening integration based on norms of business, law, and administration at variance from those emerging in Russia. Putin was also concerned that EU enlargement would become a means of excluding Russia from its “zones of traditional influence.” Certain Russian actions indicate Moscow actively seeks to encourage members to withdraw from the EU sphere and discourage countries joining it. Joint projects with European countries have allowed Russia to exploit their differences on political, economic and commercial issues creating a discordant harmony in the EU. As much as making money, a goal of such efforts has been to undermine EU unity on sanctions. The Nord Stream-2 gas pipeline, for example, has provided Putin with the means to disrupt, weaken European unity. A murmur exists in Europe that solidarity ends at the frontiers of some countries. Ad mores natura recurrit damnatos fixa et mutari nescia. (Human nature ever reverts to its depraved courses, fixed and immutable)

Regarding NATO, in an interview published on January 11, 2016 in Bild, Putin provided insight into his thinking then and now. During the interview, Putin quoted West German Parliamentarian Egon Bahr who stated in 1990: “If we do not now undertake clear steps to prevent a division of Europe, this will lead to Russia’s isolation.” Putin then quoted what he considered an edifying suggestion from Bahr on how to avert a future problem in Europe. According to Putin, Bahr proffered: “the USA, the then Soviet Union and the concerned states themselves should redefine a zone in Central Europe that would not be accessible to NATO with its military structure.” Putin claimed that the former NATO Secretary General Manfred Worner had guaranteed NATO would not expand eastwards after the fall of the Berlin Wall. Putin perceives the US and EU as having acquitted themselves of ties to promises to avoid expanding further eastward, and arrogating for themselves the right to divine what would be in the best interest of all countries. He feels historians have ignored the machinations and struggles of people involved. Putin further stated: “NATO and the USA wanted a complete victory over the Soviet Union. They wanted to sit on the throne in Europe alone. But they are sitting there, and we are talking about all these crises we would otherwise not have. You can also see this striving for an absolute triumph in the American missile defense plans.” Felix qui potuit rerum cognoscere causas. (Fortunate is he who understands the causes of things.)

Deputy Chief of Staff of the Presidential Executive Office and Foreign Policy Adviser Yuri Ushakov (above). Ushakov, much as Ivanov, is not a fan of the US. He was present at former US Secretary of State Henry Kissinger’s meeting with Putin. Kissinger seemed to confirm many of the worst notions Putin and his advisers held on US thinking.

In the years after the Soviet Union’s collapse, many European countries cut their defense spending, allowed their military preparedness to drop, and reduced the NATO footprint in their own territories and in countries east to occasional drills and small exercises with former Warsaw Pact members. They stood unprepared to confront Russia. Some allowed fear and resignation to infiltrate their perceptions of the matter. They sought to veil the fact that they were intimidated by Putin, and seemingly tried to mollify him, speaking skeptically about the clear threat Russia posed. Others seemed to fear signaling a military reaction to Putin. Yet, they signaled insecurity by appearing ambivalent about committing to the costly requirements of collective security despite: the “Crimea-grab”; the Russian push in the Donbass; a looming threat to the Baltic States; Moscow’s threats to use nuclear weapons; and, Russian military air and naval incursions from Britain to Estonia. (It would be unconstructive to name specific countries regarding this point.)

Putin did not stand by while the EU and NATO expanded. He decided to pull independent states that were once part of the Soviet Union back into Russia’s orbit. Accomplishing that required Putin to create something that did not preexist in most near abroad countries: ethnic-Russian communities forcefully demanding secession and sovereignty. That process usually begins with contemptuous murmurs against home country’s identity, language, and national symbols and then becomes a “rebel yell” for secession. It was seen in Nagorno-Karabakh in Azerbaijan, South Ossetia and Abkhazia in Georgia, Transnistria in Moldova, and more recently in Crimea, the Luhansk and Donetsk in Ukraine. Each time an ethnic-Russian space is carved out of a country, Putin gains a base from which he can exert his influence in that country.

Secretary of the Russian Federation Security Council Nikolai Patrushev (above). Patrushev is Russia’s most senior intelligence official. He asserts that the US has always sought to have levers of pressure on Russia by making use of NATO on its own terms and using its political and economic pressure to prevent vacillations by allies and partners.

Inside the Kremlin: Putin’s Advisers Speak

Audiatur et altera pars! (Let us hear the opposite side!) In February 2016, a doyen of US foreign policy, archetypal Cold Warrior, and master architect of détente, former US Secretary of State Henry Kissinger, visited Russia in order to speak at the Gorchakov Foundation. While in Moscow, he met at the Kremlin with Putin, the Chief of Staff of the Presidential Executive Office and Sergei Ivanov and the Deputy Chief of Staff of the Presidential Executive Office and Foreign Policy Adviser, Yuri Ushakov. Ivanov and Ushakov are anti-US ideologues. In his Gorchakov Foundation speech and his meeting at the Kremlin, Kissinger, albeit unintentionally, confirmed many of the worst notions Russian officials held on US thinking. Kissinger stated that “Russia should be perceived as an essential element of any new global equilibrium, not primarily a threat to the United States.” Noting that “divisive issues” existed, Kissinger suggested that rather than establish its own sphere of influence near its border, Russia should share influence in its’ periphery with the West to avoid raising alarms around it. For example, he asserted that “Ukraine needs to be embedded in the structure of European and international security architecture in such a way that it serves as a bridge between Russia and the West rather than an outpost of either side.” To Putin and his advisers, Kissinger’s ideas were hardly acceptable. Enough examples of Moscow’s behavior exist to challenge the suggestion that some sea change in thinking at the Kremlin could occur. Consider the beginning of the Ukraine crisis. In a March 6, 2014, BBC.com article entitled, “Ukraine Crisis: Obama Urges Putin to Pursue Diplomacy,” it was reported Obama told Putin in a phone call that there was a solution available that suited all parties, involving talks between Kiev and Moscow, international monitors in Ukraine, and Russian forces returning to their bases. Yet, Putin would never entertain a solution that would “suit all parties.” What suits Russia in the near abroad was, and remains, Putin’s only concern.

When Kissinger went on to state that there must be a willingness “to move beyond the grievances and sense of victimization . . . ,” Putin and his advisers sat unruffled, but were surely irritated. They likely perceived Kissinger was being dismissive of their strong concerns over EU and NATO expansion eastward. His statement likely supported their perceptions that US officials have an instinctive need to assert moral authority over Russia.

Russian Federation Prime Minister Dimitry Medvedev (above). Obama was put at ease when Medvedev was Russia’s president. Obama went as far as declaring a new era existed between the two former Cold War adversaries. Now Medvedev states: “NATO’s policies related to Russia remain unfriendly and opaque—one could go as far as to say we have slid back to a new Cold War.” Medvedev is not a friend of the US. He is Putin’s comrade.

During the final plenary session at the 12th Annual Meeting of the Valdai International Discussion Club in Sochi, Russia on October 22, 2015, Putin mentioned the 1973 comedy, science-fiction film from the Soviet Union, “Ivan Vasilyevich Changes Profession.” Putin quoted one of the film’s characters as saying to another: “How am I supposed to understand what you’re saying if you don’t say anything?” Senior Russian political leaders and foreign and defense policy officials have recently made some unambiguous public statements about US, EU and Russian relations. Clearly, their statements were biased by the view that US holds an unyielding hostility toward Russia which is manifested in its policies and actions. Speaking at the Munich Security Conference on February 13, 2016, Russian Federation Prime Minister Dimitry Medvedev, Putin’s political comrade, accused NATO of restarting the Cold War amid increased military maneuvers and troop deployments to Russia’s neighbors. Medvedev told the meeting of national leaders, senior defense officials, and top diplomats that sanctions imposed after Russia’s 2014 annexation of Crimea and new moves by NATO “only aggravate tensions.” He argued: “NATO’s policies related to Russia remain unfriendly and opaque—one could go as far as to say we have slid back to a new Cold War.” He went on to state: “On an almost daily basis, we’re called one of the most terrible threats either to NATO as a whole, or Europe, or to the United States.” Medvedev called for lifting sanctions imposed on Russia concerning Crimea, saying they are “a road that leads nowhere.” He suggested the West would only harm itself if it did not lift the sanctions soon. He warned: “The longer the sanctions continue, the more chances fade for Europeans to keep their positions in Russian markets as investors and suppliers.”

In his meeting with Putin, Ivanov, and Ushakov, Kissinger stated that Russia should be perceived as an essential element of any new global equilibrium concerning what he dubbed “divisive issues” such as Ukraine. He suggested Russia should share influence in its declared near abroad with the West. He also explained there must be a willingness to move beyond grievances and sense of victimization. Putin and his advisers sat unruffled, but were surely irritated by his statements.

In an interview with the official government newspaper, Rossiskaya Gazeta, the Secretary of the Russian Federation Security Council, one of Putin’s most important advisers and most senior intelligence official, Nikolai Patrushev, proffered: “. . . Washington has always sought to have levers of pressure on Russia. Thus, in 1974 the famous Jackson-Vanik Amendment was adopted, restricting trade relations with our country. It appeared to have completely lost its relevance immediately after the breakup of the USSR, but it was still in force right up to 2012, when the so-called “Magnitsky List” was promptly adopted in its place.” Referring to current US and EU sanctions against Russia, Patrushev explained: “The current sanctions are in the same category. The US administration’s activity in the Ukrainian sphere is taking place within the framework of an updated White House foreign policy course aimed at holding on to American leadership in the world by means of the strategic containment of the growing influence of the Russian Federation and other centers of power. In this context Washington is actively making use, on its own terms, of NATO’s potential, seeking to use political and economic pressure to prevent vacillations on the part of its allies and partners.”

In response to what Russian officials refer to as “NATO’s preparations along our borders,” on January 12, 2016, Russian Federation Defense Minister Sergei Shoigu announced that there would be a major military build-up along its border with Ukraine. Shoigu reportedly stated: “the task of utmost importance for us this year is to form three new military divisions in the western direction.” Shoigu stressed that it was not only a necessity not just to form the bases but also to re-equip locations for permanent deployment, create appropriate training grounds, storage space for equipment and accommodations for personnel. Shoigu further explained that “special attention should be paid to monitoring and analysis of the military-political situation in the world, as well as timely responses to its changes.” One base is being constructed in the town of Boguchar in the Voronezh region, located 45 kilometers from the border of Ukraine’s Luhansk province, now the self-declared, independent Luhansk People’s Republic. The base would accommodate at least 5,000 troops and would be able to house 1,300 pieces of military equipment. A similar base will be constructed near the settlement of Valuiki in the Belgorod region, approximately 20 kilometers from Luhansk.

For the Obama administration, the end is closer than the beginning. Only so much can be done in the amount of time left to halt the trend downward, much less, turn things around with Putin or its Russia policy. The challenge of improving US-Russia relations will likely be left to the next US President. O si sic omnia. (Oh, would that all had been done or said thus.)

The Way Forward

A little more than four years after Clinton provided her 2011 discourse on the pivot to Asia, General Breedlove essentially assessed the path had not been paved for Europe to go without a US presence, US leadership, and significant US support. In the US European Command Posture Statement 2016 presented on February 25, 2016, Breedlove explained: “I cannot emphasize how important European nations, in particular our NATO Allies and Non-NATO Partners, are to ensuring America’s security and safety. Many of our most capable and willing allies and partners are in Europe, playing an essential role in promoting our vital interests and executing a full range of military missions . . . Europe is not the same continent it was when I took command, as new threats and challenges continue to emerge.” The grand notion of pivoting away from Europe to focus more on Asia withered once the clashes between Putin and Obama began. Some may parse out the collision of Obama and Putin as representing the natural balance of things as their worldviews are so divergent. Even if true, some syncretistic existence should have been established for the benefit of their countries and their people. Authentic geopolitical thinking was subsumed by a satisfying substitute for reality concerning long-term US-Russia relations. Indeed, decisions in the Obama administration on Putin and Russia were based on relations with Medvedev early-on and what was best for Obama’s legacy. That got the administration into trouble with Putin from the get-go. Relations languished in misunderstanding.

Discord obtains when things get mixed up. One might speculate, with levity, that Russia experts at the State Department, the Defense Department, and CIA, who understood Putin, were seemingly exiled to isolated garrets on the top floors of their headquarters buildings by the administration to keep their impressions out of the way. Hopefully, there is not an irreversible trend downward for US-Russia relations. Yet, the end is closer than the beginning for the Obama administration. Only so much can be done with time available to halt the slide, much less, turn things around. Improving US-Russia relations will be a challenge left for the next US administration. Kissinger suggested Russia should be perceived as an essential element of any new global equilibrium. However, creating that global equilibrium will be tough as Russia will likely remain intransigent over its interests in what Putin calls the near abroad. Some recognition of Russia’s positions would be required to improve relations (although creating an arrangement in Europe that would satisfy Russia may not be possible at this point). Resetting relations would also require a new administration to recognize the limits of US power projection. How much the US will be able to handle in its sphere of influence in the future must be determined through a hard-headed assessment of possibilities based on capabilities both available and in development.

Russia Tells Iraq It’s “Ready” to Support Fight Against ISIS; But Russia Must Take “Direct Action” in Iraq and Syria for the Sake of Its Own Security

Russian Federation President Vladimir Putin greets members of Directorate “A” of the FSB Special Purpose Center (Alpha Group). Russia has pledged to support Iraq and Syria in the fight against ISIS and other Islamic militant groups. However, the threat to Russian security posed by Russian citizens in those groups makes action by Putin in those countries imperative.

According to a September 26, 2014 NBCNews.com report entitled, “Russia Tells Iraq It’s ‘Ready’ to Support Fight Against ISIS”, Russian Foreign Minister Sergey Lavrov made the pledge to Iraqi Prime Minister Haider al-Abadi on the sidelines of the UN General Assembly in New York that Russia would help support Iraqi in the fight against ISIS. The Russian Foreign Ministry stated through the Itar-Tass state-run news agency that “During the meeting, Lavrov confirmed Russia’s support for Iraq’s independence, territory integrity, and sovereignty.” The Russian Foreign Ministry further stated “Moscow is ready to continue supporting Iraq in its efforts in fighting the terrorist threat, and, first of all, the one from the Islamic State.” On September 19th, Ilya Rogachev, head of the Russian Foreign Ministry’s Department for New Challenges and Threats, told the Interfax news agency that Russia still declines to participate in the US-led effort against Islamic militant groups in Iraq or Syria. However, Russia pledges to continue its aid to Iraq, Syria, and other nations that are fighting terrorists. Indeed, in the form of a sillitude he explained, “The anti-ISIL [Islamic State of Iraq in the Levant used interchangeably with the Islamic State of Iraq and Greater Syria (ISIS)] coalition is not a club party—we do not expect any invitations and we are not going to buy tickets.” Apparently, the Russian government has not amended its position even though the first round of US-led airstrikes on Islamic militant groups that began on September 23rd obviated its contention that the air strikes would be used as a pretext to attack the armed forces or any other elements of Syrian President Bashar al-Assad’s regime. The air strikes actually hit a range of target including leaders, command and control centers, communications facilities, training camps, and supply depots of the Islamic State of Iraq and Greater Syria, the Al-Qaeda linked Khorasan Group, and its parent organization, the Al-Nusra Front. While the US executed the majority of the strikes from bombers, fighters, cruise missiles, and drones, the United Arab Emirates, Saudi Arabia, Jordan, Bahrain, and Qatar in the second and third wave of attacks in the strike formation and through reconnaissance flights. The US began air strikes against ISIS in Iraq on August 8th.

The Khorasan Group, a collection of seasoned Al-Qaeda operatives, that the West feels poses a direct threat to targets in Europe and the US, should be of particular interest to Russia. Its members include several fighters from Chechnya, as well as Pakistan, Afghanistan, and Yemen are included among its members. Khorasan’s leader, Muhsin al-Fadhli, fought against Russian forces in Chechnya and was trained there in the use of firearms, anti-aircraft weapons, and explosive.

Since the initial days of the Syrian conflict, Russian Federation President Vladimir Putin made it clear that he had no plans to intervene on the ground in Syria with Russian forces. At the same time, he made it clear last year that he was following the movement of Russians and Europeans to Syria very closely, and was concerned about their capabilities and possibilities for action against Russia. Surely, the conscience of the Russian people has been struck while watching the Islamic militants move through Syria as well as Iraq. Some may recall the ruthlessness of Nazi forces in the rear areas as they moved through Russia during World War II. Unlike some Western countries, Putin has not been compelled to respond with force to the anguish and outrage of Russian citizens, after witnessing a public execution of a Russian citizen by extremist Islamic militants in Syria or Iraq. Putin wants Russia to look strong, but sitting on the sidelines and relying on the US to manage the entire situation does not allow Russia to look strong. Interestingly, standing aside practically amounts to a conceit that US leadership and support for countries, militarily, financially, or politically can ensure positive things are accomplished internationally, and that the importance of the US is unmatched on the world stage. That is precisely the perspective of the US that Putin has tried so hard to knock down in speeches and published statements. It is also a gamble. ISIS, the Al-Nusra Front, and its off-shoot, Khorasan pose a genuine threat to the Russian homeland. They have declared that. Only force will have a sustained impact and strong educational effect on these groups. Some of Putin’s advisers may counsel that using force in Iraq and Syria would prove ineffective and pointless. Others may reject the idea fearing Western condemnation and retribution over unilateral intervention by Russia. Yet, if a search and destroy operation by Russian military or other security organizations against Russian elements in Islamic militant groups in Iraq and Syria will make Russia more secure, it should be undertaken. Virtus tentamine gaudet! (Strength welcomes the challenge!) 

Russia and Islamic Militant Groups

Putin has been continuously engaged in an effective fight against Islamic militant groups in Russia. Counter-terrorism has been a key aspect of Russia’s national security policy for many years due in great part to longstanding security problems the government has faced from the Islamic insurgency near the Caucasus Mountains. The insurgency, organized into a loose alliance of rebel groups known as Imarat Kavkaz (Caucasus Emirate), has been simmering more than a decade after it drove separatists from power in the North Caucasus province of Chechnya during Putin’s first term. They seek to carve an Islamic state out known as the Chechen Republic of Ichkeria from a swath of southern Russia. That group posed the greatest threat to the Olympic Games in Sochi.

The possibility that Russian fighters from these groups that have fought in Iraq and Syria may return home to engage in terrorist activities remains one of Putin’s greatest concerns. Back in June 21, 2013, at a conference in St. Petersburg, Russia, Putin made the claim that 600 Russians and Europeans were within the Syrian opposition fighters’ ranks. While the US and European intelligence services expressed concern over the viability of vetting Syrian opposition fighters to discover who among them are Islamic militants, the Russian intelligence service apparently already possessed files on the identities of a considerable number of Syrian opposition fighters. The London-based International Centre for the Study of Radicalization estimates that the number of Russian fighters in Islamic militant groups in Iraq and Syria, including those in the field now and those that have returned home, is around 800. Putin has not provided any new estimates publicly. 

In his September 11, 2013 New York Times Op-Ed, Putin discussed the danger posed to international peace and security by Islamic militant groups in Syria. Putin explained, “There are few champions of democracy in Syria. But there are more than enough Qaeda fighters and extremists of all stripes battling the government. The United States State Department has designated Al-Nusra Front and the Islamic State of Iraq and the Levant, fighting with the opposition, as terrorist organizations. This internal conflict, fueled by foreign weapons supplied to the opposition, is one of the bloodiest in the world. Mercenaries from Arab countries fighting there, and hundreds of militants from Western countries and even Russia, are an issue of our deep concern. Might they not return to our countries with experience acquired in Syria? After all, after fighting in Libya, extremists moved on to Mali. This threatens us all.”

Taking Action

Assad and Abadi would most likely give their consent for Russia to conduct operations in their countries and provide Russia valuable support in its efforts. Finding Russian citizens in Iraq and Syria among reportedly over 30,000 fighters of ISIS may be akin to finding a needle in a haystack. Yet again, the potential benefit of thwarting potential attacks in Russia by extremists Islamic militants underscores the efficacy of such an undertaking. Given the degree of difficulty involved, Russia should use special forces units from the Federal’naya sluzhba bezopasnosti Rossiyskoy Federatsi (Federal Security Service) or FSB, Directorate “A” of the FSB Special Purpose Center (Alpha Group) and Directorate V of the FSB Special Purpose Center (Vympel) groups. Russia could also employ Zaslon (Barrier), a special services group of the Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Of the many special service groups established in Russia, Alpha Group and Vympel are the most well-known and respected. Alpha Group, an elite stand alone sub unit of Russia’s special services, is a dedicated counter-terrorism task force of the FSB. It primarily prevents and responds to violent acts in public transportation and buildings. Vympel is officially tasked with protecting Russia’s strategic installations, however it is also available for extended police duties, paramilitary applications, and covert operations in Russia or abroad. The profile and capabilities of both units have increased, and they have taken over and consolidated roles and personnel from other organizations. Over many years, Alpha Group has acquired a reputation for using ruthless methods in response to terrorist acts. Zaslon has not been publicly recognized by the Russian government. Zaslon personnel are said to be former spetsnaz troops and serve under the sole command of Foreign Intelligence Service (SVR) headquarters in Yasenevo, on the outskirts of Moscow. In his book Russian Security and Paramilitary Forces Since 1991 (Osprey, 2013), Mark Galeotti, of NYU’s Center for Global Affairs, explains that Zaslon has been linked with everything from assassinations abroad to gathering up documents and technology that the Russian government did not want the US to seize when Baghdad fell. In Syria, Galeotti suspects Zaslon may be providing additional support for Russian military and diplomatic personnel, and is likely already earmarked to extract people, documents, or technologies Russia would not want to share if Syrian President Bashar al-Assad’s regime began to collapse.

Air strikes should continue to disperse ISIS fighters as they try to avoid certain death from US bombs and cruise missiles. Perhaps operating as mixed “combined special groups” (svodnye spetsialnye gruppy (mixed special groups) or SSGs, Russian special operations forces could go into ISIS and Al-Nusra Front controlled areas and kill Russian elements or when the opportunity presents itself, collect prisoners. If ordered by Putin to present a plan for such an operation, senior Russian special services’ planners will more than likely produce something that displays a high level of acumen and creativity, utilizing advanced technologies in a manner that neither analysts nor the potential opponent could foresee. In Syria, for example, Russia special services’ efforts might entail some of the following steps. Russian special services should exploit all of its intelligence surveillance and reconnaissance capabilities to assist in locating rouge Russian elements on the ground in Syria. FSB and other Russian intelligence and security services apparently already possessed files on the identities of Russians who have traveled to Syria. Support from FSB operating in areas of Russia from which the suspected nationals originate will also support Alpha Group, Vympel, and Zaslon operations. With assistance from the Syrian military intelligence services, Mukhabarat, Russian special services could interact with Syrian citizens to collect granular information on the Islamic militant groups including the size of specific units, the locations of its fighters, the backgrounds of individual fighters and commanders, unit capabilities, and its combat and nonlethal resources. Russian special services may benefit from liasing with elements of the Iranian Revolutionary Guards Corps’ Quds Force. From that work, an effective operational plan can be developed. Russian special reconnaissance and electronic surveillance means would be used to monitor the locations, daily movements, and activities of the hostile Islamic militant groups. Leaders, arms, supply lines and depots, and financial support would be targeted. All entry points of Islamic militants could be identified and placed under special reconnaissance and electronic surveillance. Penetrating the Islamic militant groups, if Russia’s SVR has not already done so, would unlikely be helpful and would place any assets engaged in that effort at risk, especially once direct action is taken against those groups. All of that would be done while trying not to cross paths with US-led air assets.

Eventual strikes against Russian targets in the Islamic militant groups must be executed swiftly and covertly. Retired US General Stanley McChrystal, former commander of the US Joint Special Operations Command, has offered hints on how to exploit situational awareness which were summarized in the January 7, 2014 greatcharlie.com post entitled, “Obama, Putin discuss Olympics Security in Call; Putin Has Got It Covered and He Will Keep His Promise to the Terrorists, Too!” When striking at a terrorist group’s network, the goal is to paralyze its nervous system. Hitting it intermittently, or every other night, allows the opponent to become stronger, having become accustomed to resurrecting itself. However, McChrystal explains that if you strike at enough targets simultaneously, taking down key leaders, the group will be thrown into chaos and confusion and have a difficult time “regenerating.” That will allow for decisive effects.

Units also can be better utilized as a result of excellent situational awareness. As McChrystal explained “Traditionally, if we did a raid and we thought we were going to need 20 commandos, to actually be on the target, we might take 120, because we had to put security around the site to protect it from enemy reinforcements, and we might have to put a support section and a command and control section there because you need all those things to account for the unexpected. But when you have very good situational awareness and good communications, you only send the 20, because your security comes from being able to see, and then you can maneuver forces if you need them. So suddenly, the 120 commandos aren’t doing one raid; their doing six raids, simultaneously, and you start to get the ability to do 300 raids a month.”

To speed the process and achieve a high level of success, the Russians could adapt a form of “find, fix, finish, exploit, and analyze” (F3EA) developed by McChrystal. Under the concept, security forces would understand who or what is a target, locate it, capture or kill it, take what intelligence one can from people and documents, analyze that, then go back out execute the same cycle again. If Russian security services want to act at a speed as fast as US special operators in Iraq under McChrystal ‘s command, decision-making would need to be de-centralized because of the high number of raids. Subordinate elements must be allowed to operate quickly. It is very likely that FSB has been using sophisticated technical means to monitor the movements and activities of individuals and groups, likely to engage in terrorist acts, has been on-going. Such surveillance efforts could also be used to develop leads for the operation.

Assessment

On September 11, 2014, US Secretary of State John Kerry stated on a Voice of America radio broadcast that the administration of US President Barack Obama was disappointed by Russia’s initial reaction to the president’s speech on ISIS, which indicated the group represented a direct threat to Russia itself. Kerry explained in his view Russia must join the international fight against ISIS. Prompting by the Obama administration will unlikely cause Putin change his position and join the multinational effort against Islamic militants groups in Iraq and Syria. Indeed, it would more likely cause him to turn away from it. Yet, clear headed, practical choices must be made on Iraq and Syria in the Kremlin. As a result of US-led air strikes, there are opportunities being created for Russia in Iraq and Syria to enhance its security. Putin, his military commanders, and senior security officials know the capabilities of specific individuals and units in Russia, the effectiveness of their weapons systems, and what the real possibility for success of any given operation would be. They must also recognize the real possibility for success in enhancing Russia’s security if Russian special services acted in Iraq and Syria against Russian targets.

Of course, if Putin targeted Russian members of Islamic militant groups in Iraq and Syria, he would be contributing immensely to the international effort against those groups. Indeed, in addition to the Chechen members of Khorasan, a number of the senior leaders of ISIS are Chechen. An ethnic Chechen named Omar al-Shishani is one of ISIS’ most prominent commanders and at one point was the face of the group. Putin demands that Russia should be recognized as a world power, but Russia also must act in a manner consistent with that title. While he has shown a willingness to intervene in the former Soviet republics bordering Russia, Putin has certainly not had Russian forces gallivanting outside of its region, attempting to secure Russian interests. Taking action in Iraq and Syria as proposed here would be more about establishing Russia’s security than posturing. Yet, as result of the action, Putin would demonstrate not only to the Russian people, but to the world, he is a leader who is able to respond effectively to security issues. Putin would be able to show the Russian people and the world, that Russia is a global power.

“A Plea for Caution” One Year Later; The New York Times Op-Ed That Revealed Much about Putin

In his September 2013 New York Times op-ed, Russian President Vladimir Putin did not suggest any real steps to create opportunities for international cooperation or greater peace and security. He seemingly wanted to stir mistrust worldwide toward US efforts in foreign affairs. It would be disingenuous for US President Barack Obama’s administration to deny its behavior toward Putin likely influenced his decision to write it.

In a September 11, 2013 New York Times op-ed, Russian President Vladimir Putin provided a commentary on US-Russian relations that appeared to be a rebuttal to US President Barack Obama’s August 10, 2013 speech on the possible US military response to the chemical use by the President Bashar al-Assad’s regime in Syria. Putin’s objective with the op-ed was to reach the US public through the back channel of the news media. That was made clear when he stated, “Recent events surrounding Syria have prompted me to speak directly to the American people and their political leaders. It is important to do so at a time of insufficient communication between our societies.” Yet, Putin failed to realize that while he sought to promote Russia’s positions and arguments in the media, attempting to cope with policy analysts and popular pundits, hostile to his statements, on their “home court”, would be a mistake. Global media is still dominated by the West. Moreover, among those people interested in foreign and defense policy in the West and worldwide, very few would ever take the position that Russia was equal imilitarily, economically, or politically to the US and its Western partners. Far more people worldwide might accept negative perspectives of Russia given its human rights and civil rights history, and the authoritarian nature of the Soviet Union from which it had emerged. Changing such perceptions of Russia would be difficult to accomplish with one op-ed.

What made the op-ed even less likely to receive approval was the manner in which Putin presented his facts and arguments. He does not present a discussion based on Russia’s genuine concerns about the impact of military action. Putin displayed more tack than tact in his commentary. There was no romantic fuzziness in his words. There is no soft spot. It is not some lush, soupy appeal.  The op-ed lacks the moral eloquence of Obama’s speeches. Manifested in the text, however, was the fact that Putin is tough and has no time to be a sentimentalist. Putin was well-aware that he was communicating with citizens of an, albeit, adversarial government. Despite his best intentions, his recognition of the fact that he is not the best friend of the US public–and he likely does not care to be–managed to infiltrate his statements.

Putin accomplished very little with the op-ed. Since the time it was published, the atmosphere in international affairs has not improved, mutual trust has not been strengthened, and US-Russian relations have worsened. Putin has made major moves in Ukraine contrary to US wishes, and he has warned the West that Russia still has nuclear arms. If anything, his op-ed serves as a marker, indicating a genuine downturn in US-Russian relations had occurred. A look at events surrounding his decision to publish the commentary sheds light on how US-Russia relations fell to current levels, but also  seems to provide hope that a constructive dialogue between Obama and Putin could still develop.

Background: Putin and the US

Since the fall of the Soviet Union, the authentic face of the Russian government has been Russian President Vladimir Putin. Putin restored order in Russia after the internal chaos of the 1990s, reestablishing the power of the state. Many would note the record shows he accomplished this with little regard for human and political rights. Putin is conscientious about his work, and has become quite experienced in governance and wielding national power. His style of management is undoubtedly shaped by his initial career as an officer in the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) known better as the KGB—the agency responsible for intelligence, counterintelligence, and internal security. He reached the rank of lieutenant colonel before retiring. Putin has been advised and assisted by a small group of men who served alongside him during his KGB career. These men are known as siloviki (power men). Finding siloviki, particularly retirees of the KGB, and the present day security service, Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Federal Security Service) or FSB, in high places in Russia is not unusual. A quarter of Russia’s senior bureaucrats, particularly in the armed forces and the security services, are siloviki. At the pinnacle are men who came from Putin’s hometown of St. Petersburg. The “roots” of the families those men come from go back to the beginnings of the Communist Party and its first political police known as the Cheka. Putin’s Cheka heritage includes both a father and grandfather who served in the security service. Putin attended the schools and auniversity Chekisty (Chekist) progeny typically attended.

The Chekists share a view that the greatest danger to Russia comes from the West. They believe Western governments are driven to weaken their homeland, create disorder, and make it dependent of Western technologies. They feel that under former President Boris Yeltsin, the Russian leadership made the mistake of believing Russia no longer had any enemies. The Chekists are resentful of the West’s success over the Soviet Union in the Cold War. As Putin himself has publicly expressed, the Chekist consider the collapse of the Soviet Union, under Western pressure, as the worst geopolitical catastrophe of the 20th Century. That loss did not mean a loss of dignity or the will to act. Anti-Western sentiment became so strong that it has created a siege mentality among the Chekists. In his March 18, 2014 speech declaring Russia’s annexation of Crimea, Putin spoke not only as the voice of Russia, but the voice of the Chekists. He enumerated some of the actions taken by the West that have fostered contempt in Moscow. He mentioned: Russia’s economic collapse, which many Russians recall was worsened by destructive advice from Western business and economic experts that did more to cripple their country; the expansion of NATO to include members of the Soviet Union’s own alliance, the Warsaw Pact; the erroneous Russian decision to agree to the treaty limiting conventional forces in Europe, which he refers to as the “colonial treaty”; the West’s dismissal of Russia’s interests in Serbia and elsewhere; attempts to bring Georgia and Ukraine into NATO and the EU; and, Western efforts to instruct Russia on how to conduct its affairs domestically and internationally. Putin is determined to save Russia from disintegration, and frustrate those he perceives as enemies that might weaken it. He will not be satisfied until Russia’s global power and influence are restored and the independent states of the former Soviet Union are brought back under Moscow’s political, economic, and military (security) influence.

Even prior to the op-ed’s publishing, the downward spiral of Russia’s relations with the Obama administration was evinced  by: Putin’s decision to allow National Security Agency whistleblower Edward Snowden to reside in Russia; ongoing espionage efforts between Russia and the US, including the activities of Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR officer Anna Chapman and other Russian “illegals” captured by the Federal Bureau of Investigation in 2010; counter allegations of US spying on Russia revealed by Snowden and Wikileaks; and the US admonishment of Russia on human rights issues. Despite these and other negative connections, the White House sent Putin proposals on a variety of issues, some in which he had already expressed disinterest. They insisted that he agree to reductions that would be made in both nations’ nuclear arsenals.

Putin rejected the nuclear arms proposals due mainly to his concerns over the efficacy of taking such an audacious step. To him, the proposals called for staggering reductions. He views nuclear weapons as a means to assure Russia’s survival. It is unlikely that a Chekist would ever reduce Russia’s nuclear arsenal to a level demanded by the White House. Perhaps positive signals from Obama’s discussions on nuclear arms reductions with the erstwhile Russian President Dmitry Medvedev gave administration officials and advisers the idea that Putin would follow-up by accepting proposals on it. Obama felt he had a strong relationship with Medvedev. Obama seemed to measure all possibilities on relations with Russia on his interactions with him. So comfortable was Obama with Medvedev that he went as far as to declare a new era between the two former Cold War adversaries existed. There were more than enough senior Russia analysts in the US government who could have confirmed Putin, who at the time was serving as Russia’s Prime Minister, was the real power in Moscow. However, Obama administration officials and advisers did not appear to give any deep consideration to this matter. Since Medvedev was Russia’s president, Obama saw him as the authority with whom he needed to be concerned. He treated Putin as “the other guy.” Obama did little to build a positive relationship with him. When he returned to the Russian presidency for a third term, what Obama knew about him was mostly in the abstract.

Summit Cancellation 2013: The Catalyst

Obama administration officials and advisers were clearly unprepared to hear or accept Putin’s final rejection of their nuclear arms reduction proposals and reacted poorly to it. They seemed driven to achieve objectives for their president without consideration of the efficacy of their approach. Whether they even thought Putin’s concerns over nuclear arms reduction proposals were genuine is not clear. However, Putin’s decision was viewed within the Obama administration as ending their president’s “signature effort to transform Russian-American relations and potentially dooming his aspirations for further nuclear arms cuts before leaving office.”   With the apparent goal of retaliating against Putin over his refusal to accept its nuclear proposals, on August 7, 2013, Obama cancelled a Moscow summit meeting with Putin set for September. It was an amateurish and dangerous response by the administration to Putin. Yet, the decision meant much more than blocking the meeting. For Putin, the summit with the US president would be an important part of his effort to show that under his leadership, Russia has returned to the world stage as a global power. As an outcome of the actual talks with Obama, Putin likely hoped to demonstrate that he is a strong leader who is able to respond effectively to the US on security issues. During the event in Moscow, Putin would also receive the chance to present his resurgent Russia in the best light possible. Obama administration officials and advisers knew the summit meeting would have been a proud occasion for Putin and the Russian people. However, they were out to prove that it was in control of the situation. They sought to bring to light what they believed was the reliance of Russian leaders on US standing and capabilities to elevate a country that was practically an economic basket case and a shadow of its former self as a military power. Boiled down, they felt Russia needed the US, but the US did not need Russia. So, they scrapped the summit. Publicly, Obama administration’s officials and advisers made things worse by publicly explaining that the meeting was cancelled because was not seen as an effective use of the president’s time. An August 8, 2013 New York Times article quoted US Deputy National Security Adviser Benjamin Rhodes as stating, “We weren’t going to have a summit for the sake of appearance, and there wasn’t an agenda that was ripe.” Officials and advisers tossed in comments about Putin’s rejection of the proposal. An unidentified source for the same August 8th article stated, “We just didn’t get traction with the Russians. They were not prepared to engage seriously or immediately on what we thought was the very important agenda before us.” That source went on to state, “this decision was rooted in a much broader assessment and deeper disappointment.” Yet, despite these thinly veiled excuses, it was generally understood that the cancellation appeared was a consequence of Putin’s refusal to consider the proposals for extreme nuclear reductions. From it, came seasons of disappointment. Memores acti prudentes future! (Mindful of what has been done, aware of what must be!)

The Op-Ed

By cancelling the summit, Obama administration officials and advisers played into the worst anti-Western strain of Chekist thought. Putin saw the US decision as a form of rejection, a personal affront, and an effort to humiliate him. In Moscow, the anger, bitterness, and hostility that grew in Putin over the cancellation, along with a lot of other things, was likely palpable. Putin had his own set of options. As Obama’s approval ratings on foreign policy had dropped precipitously during the year to a bit less than 39.8 percent by the end of August, Putin may have perceived that he had a shot of reaching a disappointed US public with a special message.  The Russian Federation government had a contract with the Ketchum public relations firm that included placing favorable news items about Russia in US newsmedia outlets. Putin used the firm to place his op-ed in the New York Times. In writing his editorial, Putin, in part, seemed to be utilizing a bit of old KGB tradecraft in writing the piece. (Tradecraft refers generally to skills used in clandestine service to include efforts to manipulate opponents.) Much of what he proffered was a distorted view of circumstances.

Putin began by offering a discussion of certain truths about the US-Russian relations as allies during World War II and adversaries during the Cold War. He recounts that the veto power given the Permanent Five Members of the UN Security Council was established to create consensus on issues of peace and war. He explained that if states were to bypass the UN Security Council and take military action without authorization, as the Obama administration indicated it was prepared to do in August 2013, that UN’s relevance would be placed in jeopardy. As a result the UN would suffer the fate of the League of Nations. However, in further discussion of the UN, Putin engages in something akin to introjection, claiming qualities typically identified with, and exemplified by, the US. Having been successful in constructing a peaceful solution on Syria’s chemical weapons issue, Putin portrays Russia as a beacon of light in international affairs, and promoter of transnationalism, multilateral solutions, and the maintenance of international peace and security. Putin explained, “From the outset, Russia has advocated peaceful dialogue enabling Syrians to develop a compromise plan for their own future. We are not protecting the Syrian government, but international law. We need to use the United Nations Security Council and believe that preserving law and order in today’s complex and turbulent world is one of the few ways to keep international relations from sliding into chaos.” While he should be commended for expressing these sentiments, it has actually been the US, particularly the Obama administration, which, for the most part, has shown great reverence for international law. Obama, himself, would undoubtedly prefer to solve problems at the diplomatic table using reason and logic, due process, and rule of law. Putin, on the other hand, has what former US Secretary of Defense Robert Gates called “a zero-sum worldview.” Contrary to Obama’s belief in the importance of win-win relationships among nations, Putin sees all transactions as win-lose; if one party benefits, the other must lose. Gaining and retaining power is Putin’s goal.

Putin goes on to explain, “The law is still the law, and we must follow it whether we like it or not. Under current international law, force is permitted only in self-defense or by the decision of the Security Council. Anything else is unacceptable under the United Nations Charter and would constitute an act of aggression.” Here, Putin provides a veiled reference to the Operation Unified Protector, when multinational forces under NATO command imposed a no-fly zone and destroyed government forces loyal to then-Libyan President Muammar Gaddafi under UN Security Council Resolution 1973. (The military operation to enforce the UN Security Council Resolution was initially led by the US under Operation Odyssey Dawn.) In Putin’s view, Western-led forces went beyond their mandate to aid anti-Gaddafi forces, and their actions led to his overthrow. Gaddafi had been a friend of the Soviet Union and Russia. Despite the fact that the action against him was taken under a UN Security Council resolution, to Putin, it represented one more instance of the West trampling on Russia’s interests. However, looking at Russia’s actions, Putin was not in a position to admonish anyone about international law and the use of force. In 2008, Putin invaded Georgia, and Russian troops still occupy the Abkhazia and South Ossetia regions. He forced Armenia to break off its agreements with the EU, and Moldova is under similar pressure. In November 2013, using economic influence and political power, he drove then-Ukrainian President Viktor Yanukovych to abort an agreement Ukraine had with the EU that would have pulled it toward the West. Once the Ukrainian Parliament removed Yanukovych, Putin grabbed Crimea.

In appraising the use of force by the US, Putin engages in a type of projection, imputing some of the dominant traits of his own handling of foreign policy on the Obama administration. He goes as far as to blame the US for efforts by some nations to acquire nuclear weapons. Putin explains: “It is alarming that military intervention in internal conflicts in foreign countries has become commonplace for the United States. Is it in America’s long-term interest? I doubt it. Millions around the world increasingly see America not as a model of democracy but as relying solely on brute force, cobbling coalitions together under the slogan “you’re either with us or against us.” The truth is that Obama has been averse to taking military action, contrary to former US President George W. Bush who was perceived as having the US take pre-emptive military action at the slightest whiff of aggression. Obama’s policy of restraint matches the public mood. Developing proposals for military action has been very difficult for administration officials and advisers.  In situations where the use of force is almost absolutely necessary, officials and advisers have presented options for action that are lightweight, very small in scale and calibrated precisely. Putin’s discussion of Obama as being interventionist is shear fantasy.   While obama has been involved in situations worldwide as a leader on the internation stage, its ill-advised action in Libya was its only authentic intervention. Note that it is Putin who now appears poised to move further into Ukraine.

Even if a US audience was not receptive to his message, Putin likely assumed the hyperbole in his commentary would serve to impress many people in other countries who are ill-disposed toward the US and its policies. appreciative of his efforts to admonish it. Undoutedly, his words were likely captivating and satisfying enough for those who choose not to look deeply and those who choose simple answers. Many realities are erased and the past is written off. He then writes on the past a new story, a substitute for reality. The op-ed seemed to be “sabotaged” by his comments concerning “American exceptionalism” that was rejected and much derided within all circles in the US; and, by his discouraging words concerning US operations in Iraq and Afghanistan. If someone claiming to be a Chekist were ever to offer encouraging words about the spirit of US public or US operations in Iraq and Afghanistan, he would most likely be an imposter! Creating even more discord, Putin explained that US action could place multilateral efforts on Iran and Israel-Palestine at risk.

The one part of Putin’s op-ed deserving real consideration was his discussion of the danger posed to international peace and security by Islamic militant groups in Syria. Putin succinctly analyzes the emerging threat. He reported, “There are few champions of democracy in Syria. But there are more than enough Qaeda fighters and extremists of all stripes battling the government. The United States State Department has designated Al Nusra Front and the Islamic State of Iraq and the Levant, fighting with the opposition, as terrorist organizations. This internal conflict, fueled by foreign weapons supplied to the opposition, is one of the bloodiest in the world. Mercenaries from Arab countries fighting there, and hundreds of militants from Western countries and even Russia, are an issue of our deep concern. Might they not return to our countries with experience acquired in Syria? After all, after fighting in Libya, extremists moved on to Mali. This threatens us all.” Putin again seemed to be using skills acquired during his KGB days to develop a strong report on the emerging threat of Islamic militant groups such as Islamic State of Iraq and Greater Syria (ISIS). Still, he also seemed to be providing a glimpse of what was being discussed in the Kremlin on developments in Syria, as well as Iraq. His prognostication about the growth of the Islamic militant groups has been on the mark to the extent that the ISIS threat has not reached the shore of the US or Europe. Yet, few in the US focused on Putin’s important comments on Islamic militant groups. His questionable discussion of other issues distracted US readers from anything constructive he had to state.

The Way Forward

In his op-ed, Putin does not suggest any real steps that would help create possibilities for international cooperation or greater peace and security.   Indeed, it was not constructed to improve things. Putin essay better served to stir mistrust worldwide toward US efforts in foreign affairs. It would be disingenuous for the Obama administration to deny that its approach to Putin, prior to the op-ed, played a likely role in his decision to write it. Put basely, the Obama administration officials and advisers treated Putin as if he was “their ball to play with.” They lashed out at Putin in a very public way on many occasions, and Putin saw the op-ed as a means to respond to those incidents “publicly.” Unfortunately, rather than use the op-ed to discuss his dissatisfaction and concerns about US actions, he prevaricated and made a number of remarks the US public would only find offensive. Once those points were highlighted in the US newsmedia by political pundits and policy analysts, few in the US public would read it or give it thought after “hearing” what was in it. Putin will unlikely write an op-ed again in a US newspaper given his experience with the first. However, it is likely, given the current course of US-Russian relations, Putin’s future communications with the US public will be far less “congenial.”

Book Review: Raymond Batvinis, Hoover’s Secret War Against Axis Spies: FBI Counterespionage During World War II (University Press of Kansas, 2014)

In 2010, US counterintelligence and counterespionage efforts resulted in the take down of 10 Russian “sleeper agents” from the “S” Department of the Russian Foreign Intelligence Service (SVR). As Raymond Batvinis discusses in Hoover’s Secret War Against Axis Spies, the foundation of present US counterintelligence capabilities was laid 70 years before.

Outstanding spy novels tell exciting tales of spy rings, secret and double agents, surveillance, codes and ciphers, wiretaps, microdots, deception, disinformation, and even use of invisible ink!  That is what a reader would expect from the works of John le Carré, Frederick Forsyth, Robert Ludlum, or Tom Clancy.  In Hoover’s Secret War Against the Axis: FBI Counterespionage During World War II (University Press of Kansas, 2014), Raymond Batvinis recounts equally thrilling stories of international intrigue as the Federal Bureau of Investigation (FBI), working alongside other US government elements and allies, sought to overcome Germany’s efforts to disrupt and defeat its war effort in the US before and during the war.  They will transfix the reader to the book’s pages much as the writings of the great spy novelists.  However, unlike the novelists’ works, Batvinis’ accounts are not amusements, but discussions of real cases of a struggle between adversaries filled with lessons on counter-intelligence (spycatching) as well as counterespionage (turning enemy agents against their spymasters).  The stories present the thought provoking, sometimes absurd, and often horrifying realities of spycatching and turning spies into double-agents. The history is not presented as nostalgia, but as a text on a unique aspect of the intelligence war against Germany, and to a lesser extent, Japan, from which valuable lessons can be drawn.  It is not by chance Batvinis’ book would be presented in this fashion.  The work is a product of painstaking, detail oriented research, and the benefit of his experience as a former FBI special agent.

Indeed, during his 25 years as an FBI special agent, Batvinis focused on counterintelligence and counterespionage cases.  His assignments included work out of the Washington Field Office and the FBI Intelligence Division’s Training Unit at FBI Headquaters.  As a Supervisory Special Agent, in the Baltimore Division, Batvinis managed the espionage investigations of Ronald Pelton (a spy for the Soviet Union), John Walker and Michael Walker (spies for the Soviet Union), Thomas Dolce (a spy for South Africa), and Daniel Richardson (caught attempting to spy for the Soviet Union).  After the al-Qaeda attacks of September 11, 2001, Batvinis came out of retirement and returned to the FBI for three years in order to manage a team of former FBI special agents and Central Intelligence Agency (CIA) case officers who taught the Basic Counterintelligence Course at the FBI Academy.  With a continued desire to contribute to US national security efforts, Batvinis went on to teach a “Lessons Learned” course for counterintelligence personnel at FBI field offices throughout the US for two years.  Exploiting his doctoral studies in American History, Batvinis has lectured at George Washington University and has written several articles on counterintelligence.  Prior to writing Hoover’s Secret War Against Axis Spies, he published The Origins of FBI Counterintelligence (University Press of Kansas, 2007).

Hoover’s Secret War Against Axis Spies was designed to pick up where The Origins of FBI Counterintelligence finished.  Origins was an in-depth look at the FBI’s development in the 1930s from a small law enforcement organization to a counterespionage service.  The need for change was made stark in 1938 with the bungled handling of the long-running investigation of the Guenther Rumrich espionage ring.  A series of missteps allowed dozens of German agents from Abwehr (German military intelligence) to step out of the US and reach Europe safely.  The Interdepartmental Information Conference in 1939 brought all elements of the burgeoning US intelligence community together for the first time, to discuss creating a structure to handle the espionage threat to the US.  Rather than fight like a sack of wildcats, new linkages were created between the FBI and the US military, and partnerships were established with foreign services such as the Royal Canadian Mounted Police as well as Mexican and British intelligence officials.  The FBI’s General Intelligence Division was established to manage foreign counterintelligence and other intelligence investigations.  In 1940, US President Franklin Roosevelt signed a Presidential order allowing FBI director, J. Edgar Hoover, to begin wiretapping embassies and consulates.  The Rumrich failure, the new initiatives, and FBI’s education in managing the intricate details of counterespionage matters resulted in the surprise arrest of 33 German agents in 1941, effectively breaking the back of German military intelligence in the US.

Although the Special Intelligence Service (SIS) of the FBI (whose evolution and expansion into Europe, Latin America and Africa Batvinis discusses), was already engaged in foreign intelligence in the prewar years, in 1941 Roosevelt created a new foreign intelligence office under a Coordinator of Information (COI).  By the end of the year, COI’s director, William Donovan, managed 600 personnel.  Hoover and Donovan had a mutual dislike of each other that was over nearly 20 years old.  Hoover sensed the COI as an effort by Donovan to supplant SIS, and as both viewed the Oval Office as their turf.  Their poor relationship hampered coordination between their services. In 1942, the COI transformed from a civilian agency to a military intelligence service known as the Office of Strategic Services (OSS), the precursor of the Central Intelligence Agency

In extending his discussion beyond The Origins of FBI Counterintelligence , Batvinis relates the story of how William Stephenson of British Security Coordination (BSC), the center of MI6 (British Secret Intelligence Service) operations in the US, ran afoul of Hoover. Hoover railed on Stephenson for what he viewed as BSC’s rumor mongering and mischief.  Without spoiling this amazing segment of the book, it is enough to say MI6 personnel and MI5 (British Security Service) personnel also had a shaky relationship. Hoover skillfully managed to bypass MI6 and its BSC in the US to reach MI5 in London.  As result, the FBI gained access to Ultra, the British code name for its capability to intercept and decipher encoded German communications from the Enigma system.

Batvinis is at his best in Hoover’s Secret War Against Axis Spies in his discussion of the Double Cross System.  Although known historically as a British success during the war, Batvinis explains that achievements through Double Cross were the result of joint Allied efforts.  That includes the handling of the double-agent, Spanish pacifist Juan Pujol—codenamed “Garbo”—who deceived the Germans into believing the Normandy invasion would not occur, and then convinced them that the June 6, 1944 D-Day landings were a mere diversion for a larger invasion soon to come.  Double Cross began to make use of US based turned German agents after the British, with some difficulty, convinced the US there was great value in counterespionage work.  The very persuasive Ewen Montagu, from Bletchley Park, home of the Ultra secret, was brought into the fray to bring Hoover. Hoover and the FBI hoped through counterespionage, further control could be gained over German intelligence activities.

Among the several Double Cross counterespionage cases Batvinis discusses are that of: a flamboyant playboy who was also a central figure in the dispute between Hoover and Stephenson; a world renown French flyer, who had orders to infiltrate the US aircraft industry; and a lecherous Dutchman, who was deemed useless as an agent and whose activities in the US were fabricated for his spymasters while he remained bottled up in London.  Batvinis takes the reader to school, brilliantly teaching about the fundamental nature and “nuts and bolts” of counterintelligence and counterespionage in a manner understandable for both the intelligence and law enforcement professional and the laity right in the midst of his exhilarating storytelling.  To help readers understand the type of enemy the FBI faced, Batvinis explains how Germany acquired the often involuntary service from German expatriates as agents and their very capable and somewhat ingenious handling of them.  In Chapter 11 entitled “The Count from New York,” Batvinis discusses the case of Wilhelm Rautter, a scion of German aristocracy, who was recruited into the German military intelligence without choice, and tacit threat to his well-being and that of his family and property.  As Batvinis magnificently recounts, Rautter, searching for employment, was invited to interview at Remy and Company, by its owner Hans Blum. After a month at the company, during which he established a very cordial relationship with the owner, Rautter was abruptly interrupted in the midst of perfunctory business chatter when Blum said, “German military intelligence had investigated him, found him acceptable, and wished to use him for collecting information in the United States.”  Blum downplayed the request in a friendly, soft-spoken and reassuring, but subtly betraying a sinister, threatening tone indicating that he would not accept “no” for an answer.

Almost immediately, Rautter began training at Blum’s company’s in secret writing, radio construction, transmitting, receiving, coding, and decoding cabled messages using a standard work of fiction.  He was directed to recruit an experienced operator to handle transmissions once he reached New York City.  Rautter was given the address of a mail drop on Manhattan’s Upper Westside, and rented an apartment in Brooklyn near the famous Brooklyn Navy Yard. He was provided a contact, Heinrich Stuhl, whose home, also in Brooklyn, offered easy observation of Brooklyn and Manhattan piers where merchant ships routinely lined up to load cargo bound for Great Britain.  Rautter was given a catalogue of requirements to monitor shipping bound for Europe by riding the Brooklyn-Staten Island ferry.  He would use Blum’s business contacts to travel throughout the East coast of the US, to observe factory facilities of US Steel, Remington Arms Corporation, and twelve leading aircraft companies such as the Douglas and Boeing companies.  He also was directed to pick up intelligence in local bars and restaurants about troop strength, unit designations, military equipment, and specifics on armament production.  To evade capture, Rautter would vary the means of communication with Germany.  The unexpected collapse of the FBI’s capability to intercept radio transmissions also managed to temporarily thwart its counterintelligence effort.  Nevertheless, in 1944, Rautter was identified and waylaid by the US government as the outcome of some incredible investigative work by the FBI, along with the US Customs Service, comparing German handwriting samples with tens of thousands of baggage declarations of travelers going to Europe and British censors on Bermuda, sifting through mail to Europe.

To understand how the FBI handlers engaged in counterespionage operations against Germany, Batvinis illustrated how they concerned themselves with things that the average person might very well assume was minutiae or too esoteric, to matter.  Among the tactics, techniques, and procedures used, the FBI would first closely watch a German agent to determine his susceptibility for neutralization and recruitment before intercepting him.  Particular attention would be placed on his movements and behavior patterns.  The target’s mail and cable traffic would be copied and read, his contacts were identified, and his accommodations would be searched.  Once the turned agent was activated by the FBI, his reports to Germany were designed to match his trained capabilities and the degree of the agent’s access to information.  For example, if stationed in New York City, an agent from the marine branch of German intelligence would be expected to easily identify all types of Allied ships from specific combat vessels to cargo ships and tankers entering and departing the port.  Allowing a turned agent to remain positioned near a port or shipyard might require the FBI to sacrifice too much vital information about US activities, to legitimize his efforts, in exchange for a tentative counterintelligence reward. Moreover, the US Navy would never clear information on the departure of such convoys, and it would be difficult for a double-agent to explain the failure to collect such information to his intelligence principals in Germany.  The counterespionage agent would need to be placed in a plausible new post, such as Washington, which would allow for a mixture of valuable information, rumors, and other pieces of information picked up from soldiers and sailors in local bars and from senior military and military officials on the Washington cocktail party circuit.  A persona had to be established for counterespionage agents that would typically present them as being fiercely loyal and well-placed, making the most of access to important military secrets, but greatly concerned about being discovered by the FBI.  In one case, a counterespionage agent’s persona was spiced up with emphasis on his struggle with communications equipment and transmission problems, coupled with encoding and decoding errors.  When transmitting messages for a turned German agent, a painstaking effort would be put into mimicking his distinctive transmission style through the study of recordings.

In Chapter 13, entitled, “Peasant,” Batvinis explains that one case, to copy the style of a very inexperienced radio operator, his FBI substitute filled his messages with errors common to amateurs.  Further, by using his left hand, with the radio key placed on the edge of a table so that the hand and arm had no support, the technician found that he could easily produce scores of unintentional and intentional errors.  The FBI categorized messages from counterespionage agents to Germany as “A” or “B.” “A” messages held a blend of accurate and fabricated information, created by Joint Security Control (JSC) of the Military Intelligence Division, established in 1941.  JSC had a central deception staff to its portfolio of both the Army and the Navy to plan measures for disguising or concealing an operation against the enemy that would encourage enemy action on a belief that something true was actually false. “B” messages, developed by FBI special agents of the Washington Field Office from open sources were sent in the form of suggested messages with the actual source of information actually identified.  All “A” and “B” messages were first discussed with translators of the FBI’s Cryptanalytic Section, which helped assure that German intelligence service radio operators made no mistake in deciphering the information.  The reader will find many more comparable lessons in Batvinis’ book.

There is some discussion of FBI efforts against Japan.  One segment concerns German efforts to gather and transmit important information on B-29 bomber manufacturing, other war production relevant to the Pacific Theater of Operations, the increase in conscription in the US in 1945, and war plans.  The extent to which the FBI tried put Double Cross measures in play against the Japanese is discussed in Chapter 12 entitled “Japs, Aspirin, and Pep.”  Although Batvinis relays how the FBI had little success in positioning double agents among Japanese targets, he also uses this aspect of the history of US counterintelligence and counterespionage in World War II to explain how best to manage an effort when “That dog don’t hunt.”

Organizing the US counterintelligence effort was not based on a vain desire by the FBI to take on a new capability on top of its well-known criminal investigation work.  There was no other service fully engaged in counterintelligence work, and as the war drew close to the US, it became an absolute necessity.  There was no guarantee of success. The German intelligence service, and the various departments of German military intelligence were up and running full speed with well-trained and very capable agents spreading out worldwide.  Nevertheless, it was anticipated that through the right organization, appropriate preparation, and diligent work, as well as engagement with allies, the effort would be effective and possibilities for success would increase.  The FBI learned quickly that the fight against Germany was not taking place in some “war over yonder” but already underway in US.  Despite the difficulties the FBI had with the OSS, and its counterparts in Britain, those obstacles were overcome, and it was able to protect the US public and US interests from harm.

There is a breath-taking amount of amazing information on counterintelligence and counterespionage to learn from Hoover’s Secret War Against Axis Spies.  There is also much to that can be learned from the history it provides on US relations with Great Britain and other nations on national security issues. Batvinis’ book is also a real page turner, and one that will be difficult to pull away from.  Without reservations, greatcharlie.com provides its highest recommendation to Hoover’s Secret War Against Axis Spies to its readers. They are guaranteed to read at it over and over again.  Given the timeless value of its information, for some practicioners, it may even serve as a reference.  It is a book everyone will appreciate.

By Mark Edmond Clark

Obama, Putin Discuss Olympics Security in Call; Putin Has Got It Covered and He Will Keep His Promise to the Terrorists, Too!

Putin is determined to host a “safe and secure” Olympic Games in Sochi.  Russian security officials are using every tool at their disposal, leaving nothing to chance.

According to a January 21, 2014, Reuters article entitled, “Obama, Putin Discuss Olympics Security in Call,” US President Barack Obama and Russian President Vladimir Putin talked over the telephone about how best to have a “safe and secure” 2014 Winter Olympic Games in Sochi, as well as efforts to contain the Iranian nuclear program and the situation in Syria.  The article was based on a White House statement that gave few details about the telephone call.  However, in presenting the state of mind in Washington regarding  the Games, the Reuters article emphasized how US military and intelligence officials were spending a lot of time considering how the US could evacuate US citizens from the Sochi in case of a crisis.  It mentioned that the US State Department has issued a warning to US citizens planning to attend the Games, insisting that they remain vigilant about their security due to potential terrorist attacks.  Ostensibly, due to the threat of terrorism, Us officials are clearly view Sochi more in terms as a potential tragedy than as a premier sporting event. 

The threat to the Games that has caused US officials to express considerable concern in the media is an Islamic insurgency just over the Caucasus Mountains.  The insurgency, organized into a loose alliance of rebel groups known as Imarat Kavkaz (Caucasus Emirate), has been simmering more than a decade after it drove separatists from power in the North Caucasus province of Chechnya during Putin’s first term.  They seek to carve an Islamic state out known as the Chechen Republic of Ichkeria from a swath of southern Russia that includes Sochi.  In a video posted online in July, their Chechen-born leader, Doku Umarov, called for “maximum force” to prevent Russia from staging the Sochi Games.  The Associated Press reported in a January 19, 2014 article that the Islamic militant group Vilayat Dagestan claimed responsibility for two terrorist attacks in Volgograd in December 2013.  The attacks in Volgograd came on top of a number of other terrorist enumerated by the Russian law enforcement officials in the North Caucasus Federal District and the Southern Federal District.  Volgograd was also targeted in October 2013 when a suspected female suicide bomber killed six people on a bus.  Fearing a similar martyrdom operation, police in Sochi very recently have handed out fliers at area hotels warning of another woman they believe could be a terrorist and who may currently be in the city.  The flier asks workers to be on the lookout for Ruzanna “Salima” Ibragimova, described as the widow of a member of a militant group from the Caucasus region.  The woman, according to the flier, may be involved in organizing “a terrorist act within the 2014 Olympic region.”   Photos of Ibragimova have flooded television and social media reports from Sochi. She is being called a “black widow,” which are female terrorists from Chechen separatist groups.  Many are wives of insurgents killed by Russian government forces.  The black widows have reportedly carried out a number of high profile suicide bombings.

US officials have been critical of the reaction of Russian authorities to the recent violence.  They claim that measures being taken may not be sufficient.  On ABCNews “This Week” in January 19, 2013, Congressman Michael McCaul, Republican of Texas and the chairman of the House Homeland Security Committee, expressed concern about the preparations in Sochi, though he said he believed that “President Putin is taking this very seriously” and “taking all the precautions.”  In light of the recent deadly bombings by regional terrorist groups and the threats of additional attacks, McCaul said he thought that it was likely that attacks would occur somewhere in Russia during the Games.  McCaul stated that he would travel to Sochi to confer with security officials, in part to study their plans for evacuations in the event of an attack.  Congressman Mike Rogers, the chairman of the House Intelligence Committee, said on the same Sunday program that US officials working with the Russians ahead of the Games had “found a departure of cooperation that is very concerning.”  Rogers, in a rebuff to Putin, stated with an estimated 15,000 US citizens planning to travel to Sochi for the Games, Russian security services should provide their “full cooperation.” 

As efforts to complete construction in Sochi before the Opening Ceremony on February 7th      continue, comments by US officials have built-up concern globally on whether the Olympic Games will be safe enough to participate in and visit.  Putin and Russian security officials likely have their own views on why US officials are adamant that attack will occur and Russia is not prepared, but they do not appear distracted by US criticism.  Russia is implementing a security plan formulated months before the Games and integrated into the overall approach to Russia’s security.  Russia has not been simply reacting to events.  Coordination with other nations may not be ideal, but circumstances beyond Sochi perhaps best account for that.  The threat of terrorism has become a concern in the planning of every major sporting event.  In the US, the 1996 Summer Olympics in Atlanta were disrupted when two visitors were killed by a bomb set by a domestic terrorist.  Counter-terrorism has been a key aspect of Russia’s national security policy for many years.  Russian counter-terrorism and anti-terrorism efforts to defeat any terrorist threats directed at Sochi appear very sound; nothing appears to have been left to chance.  In a January 19, 2014 press conference, Putin explained: “The job of the Olympics host is to ensure security of the participants in the Olympics and visitors.  We will do whatever it takes.”  Through it all, Putin also intends to keep the promise made to Russia in his New Year address in which he stated: “We will strongly and decisively continue the battle against terrorists until their total annihilation.”  After the Olympics, it may be demonstrated that his considerable investment of resources to Sochi’s security greatly enhanced his ability to achieve that goal.

Defeating the Islamic Militant Threat to the Games

To guarantee for the Russian people that the Games will be a proud occasion, Putin has had his government put in place what officials and experts described as the most intensive security apparatus in the history of the event.  Russian law enforcement and other security services have promised to surround Sochi with a “ring of steel.”  According to Mark Galeotti of NYU’s Center for Global Affairs, an expert on Russian security services, the security presence in Sochi was twice as large as that used during the 2012 Summer Olympics in London, even though London’s population is more than 20 times that of Sochi.   As of this month, there have been reports that among the measures being taken for the Games, more than 5,500 video cameras will be in operation as part of the “Safe Sochi” policy. Of those, 309 will be manned by the Russian Federal Security Service (FSB).  The FSB has also had an outlay for their Plastun scout robots.  The devices are heavy with surveillance equipment: thermal imaging, cameras and devices that can detect a sniper’s scope.  Drones will be deployed, including the FSB’s Gorisont-Air S100, which can be easily weaponized.   The MVD has 421 Zala drones available.  The System of Operative Investigative Measures system (SORM) will be used to monitor spectators and athletes alike.  SORM-1 captures telephone and mobile phone telecommunications; SORM-2 intercepts Internet traffic; SORM-3 gathers information from all forms of communication and has a storage facility. FSB has control centers connected directly to operators’ computer servers.  To monitor particular phone conversations or Internet communications, an FSB agent only has to enter a command into the control center located  in the local FSB headquarters.  This system is allegedly duplicated across Russia.  In every Russian town, protected underground cables exist that connect the local FSB bureau with all Internet Service Providers and telecom providers in the region.  Electronic systems with far greater capabilities, concealed from the public, may also have been deployed to protect Sochi.  

Those technical capabilities are only part of preparations.  More than 50,000 security men will be on duty.  Most likely some of them will be in plain clothes, mingling with visitors.  There will likely be a greater security presence around certain teams and venues.  The regular forces have been augmented by a large deployment of Cossacks, the traditional horseback warriors who once patrolled Russia’s frontier, serving more recently in a public safety role in southern Russia. Several hundred have moved into the Olympic Village, joining the police on foot patrols and at checkpoints in their traditional uniforms.  Zones for population control will be established where bags, personal belongings, movements and credentials will be checked.  All visitors will need a Spectator Pass which they will acquire upon registering in Sochi. 

The response to the Volgograd attacks was part of the overall effort at securing the games. Immediately after those attacks, 4,000 policemen were dispatched to Volgograd, placing over 5,200 on the ground for what Russian authorities called an “Anti-Terrorism Whirlwind, ”  It was a display of what resources could be called upon and methods that could be used.  Russian MVD and FSB troops surround the homes of suspected militants and pull them out for arrest.  Further, security services have taken the step of striking with special service units swiftly and covertly against suspected terrorist groups, “likely being monitored,” before the opening ceremonies or during Sochi.  Strikes by special service units of the MVD and FSB, and perhaps the Foreign Intelligence Service (SVR), appear to be creating confusion and chaos within the leadership of the Islamic militant groups, leaving the groups rudderless and unable to resurrect themselves enough to direct any operations during the Olympic Games.  Raids against the leadership of Imarat Kavkaz reportedly resulted in the killing of Doku Umarov, the leader of the so-called Caucasus Emirate, who called for “maximum force” to prevent Russia from staging the Sochi Games.  Ramzan Kadyrov, the top Russian official in the Chechen Republic reported the information about Umarov’s death came from intercepted communications between other rebel leaders who were concentrated on finding his replacement.  The Interfax news agency quoted an unidentified source in Russian security agencies as saying they “can’t confirm Umarov’s death.”  However, additional messages posted on Chechen militant blog sites also suggested Umarov was killed in an operation by Russian special services troops.  (See greatcharlie.com on January 8, 2014 post entitled “Putin Vows to Annihilate the Terrorists, But Until the Winter Olympics Are Over, Other Steps Must Suffice.”)

Regarding Concerns About Cooperation

Security officials of the US, EU, and other countries may want to assist the Russians beyond liaising with officials, to include providing personnel and technical resources.  A contingent of Federal Bureau of Investigation (FBI) special agents and State Department security officials will be in Sochi to attend to the security of the American contingent.  Yet, there was never real hope or that there would be significant cooperation between Russia and other countries on Sochi .  The Russian security services have never been known for their transparency.  Nearly everything they do is kept confidential and compartmentalized within the services as well.  In an unusual move, in 2013, the FSB announced it was monitoring the movements of Russian nationals traveling to Syria.  Other monitoring activities of the Russian security services were evinced when it was revealed by the Boston Globe that the Russians had warned the FBI about Tamerlan Tsarnaev, the older of the two ethnic Chechen brothers responsible for the terror bombing of the 2013 Boston Marathon, two years before the attack.  In the interview presented on the ABCNews Sunday morning program, “This Week” on January 19th, Putin, responding in part to concerns made by US officials over security preparations, explained if foreign athletes wanted to provide their own additional security, “there is nothing wrong with that,” as long as they coordinated with the Russian authorities. 

Yet, it is somewhat disingenuous for US officials to discuss coordination between the US and Russian intelligence and law enforcement services, even for the Olympic Games, without recognizing the problems that exist in the relationship.  There have been public displays of coordination on the Syrian chemical weapons removal, Geneva II talks between the regime of Syrian President Bashar al-Assad and the Syrian opposition coalition, the Iran nuclear talks.  However, the relationship is best marked by: disagreement on the reduction of nuclear force levels; Putin’s decision to allow National Securty Agency whistleblower Edward Snowden to reside in Russia; Putin’s “thought provoking” letter to the US public, published in the New York Times Op-Ed section; ongoing espionage efforts between Russia and the US, including the activities of SVR officer Anna Chapman and other Russian “illegals” captured by the FBI in 2010, and the allegations of US spying on Russia revealed by Snowden and Wikileaks; and, most of all, the uncongenial personal relationship between Putin and Obama, resulting in the cancellation of last summer’s summit.  Further, there has always been a certain degree of mutual distrust between the US and Russian intelligence services, stemming from their Cold War rivalry and balanced through a modus vivendi in the field.  Sharing between organizations took a turn for the better after the terrorist attacks on September 11, 2001, but then fell back into difficulty.

Threats to the US homeland were the cause for coordination between Russia and US services after September 11, 2001, but the security for the Sochi Games involves the protection of the Russian homeland.  For the Russians, it is a matter of national interest and national pride.  The Russians feel they have the best handle on the situation in the South Caucasus. Their understanding comes from years of hands on experience with the Islamic militant groups, uncovering complex networks of associated groups. They have created their own networks across their entire country, The Russians likely feel the understanding US or other nations’ security officials have on the security situation there is based on the abstract, gleaned from reports and studies.  Bringing US security officials to an situational awareness equal to that of Russian officials, who understand Islamic militant groups in the region from the inside, would require the use of more resources and precious time.  Efforts to support the Russians using technical means may exist, but it is likely some it duplicates Russian efforts already ongoing with the use of their own tools.   

More importantly, MVD and FSB authorities are very likely concerned that with so many, if not all, of their premium security assets being employed to protect the Games, US specal agents and case officers would be provided a unique opportunity to observe and collect data on the capabilities and effectiveness of the Russian security services.  Defeating that possibility would mean covering the US security presence in or around any secure facilities with counterintelligence resources that are needed for the Sochi anti-terrorism effort. 

Russian authorities may sense that US officials expressing their concerns over security for the Games may be projecting the fears and anxieties raised during their own efforts to protect the US homeland from attacks in the post-September 11th environment.  While Russian officials may not know or be able to intimate if or when an attack might be attempted at Sochi, they are neither uncertain, nor insecure about their ability to defeat anything that falls within their radar.  That is the best they can hope for.  From a more cynical Russian perspective, US concerns over security for the Games, especially among political officials, is that 2014 is an election year for the US Congress, and expressing concern over the Games servs to demonstrate a candidate’s willingness to protect US citizens and interests overseas.  Additionally, the Russians security officials may feel the attempt is being made to goad them into exposing their security tactics, techniques, and procedures as a result of comments by US officials or pundits regarding Russian capabilities.

“Annihilating the Terrorists”

Perhaps Putin could have attempted to eliminate the problem of terrorism from Islamic militant groups altogether by committing his security forces to large-scale operations a year or more before the Games.  Contrary to statements made by US officials, all along, the Russians have been very sensitive to the fact that any large-scale, federal district wide, counter-terrorism operations weeks before the Games could have possibly spoil the spirit of the Olympics, and create the impression that Sochi is not safe to visit. 

At the end of the Games, however, it is very likely that elevated use of sophisticated technical means to monitor the movements and activities of individuals and groups will leave the Russian government with the best understanding ever of regional Islamic terrorist groups.  It is possible that so much quality information will have been gathered and the security services situational awareness will be so enhanced that new, more effective operations against terrorist groups could be conducted by MVD, FSB, and possibly SVR special service groups.  (Note: These units and their capabilities are discussed in the January 8, 2014 greatcharlie.com post.)  Those operations might result in a decisive victory over the terrorist.  The operations of the`special sevice groups could be augmented by the use of regular military ground and air assets.  Their firepower could be directed to have a multiplier effect in the field.

Retired US General Stanley McChrystal, former commander of the US Joint Special Operations Command, has offered hints on how to exploit situational awareness at a level which the Russians may have acquired while securing the Games.  When striking at a terrorist group’s network, the goal is to paralyze its nervous system.  Hitting it intermittently, or every other night, allow the opponent to become stronger, having become accustomed to resurrecting itself.  However, McChrystal indicated that if you strike at enough targets simultaneously, taking down key leaders, the group will be thrown into chaos and confusion and have a difficult time “regenerating.”  That will allow for decisive effects. 

Units also can be better utilized as a result of excellent situational awareness.  McChrystal explained: “Traditionally, if we did a raid and we thought we were going to need 20 commandos, to actually be on the target, we might take 120, because we had to put security around the site to protect it from enemy reinforcements, and we might have to put a support section and a command and control section there because you need all those things to account for the unexpected.  But when you have very good situational awareness and good communications, you only send the 20, because your security comes from being able to see, and then you can maneuver forces if you need them.  So suddenly, the 120 commandos aren’t doing one raid; their doing six raids, simultaneously, and you start to get the ability to do 300 raids a month.”

To speed the process and achieve a high level of success, the Russians could adapt a form of “find, fix, finish, exploit, and analyze” (F3EA) developed by McChrystal.  Under the concept, security forces would understand who or what is a target, locate it, capture or kill it, take what intelligence one can from people and documents, analyze that, then go back out execute the same cycle again.  If Russian security forces would be able to act at a speed as fast as US special operators in Iraq under McChrystal ‘s command, decision-making would need to be de-centralized because of the high number of raids.  Subordinate elements must be allowed to operate quickly.  (See much more on McChrystal’s concepts in General Stanley McChrystal, My Share of the Task A Memoir Portfolio, 2013)

Not to advise Imarat Kavkaz or Islamic militant groups in the Caucasus, but if they have a goal to create an Islamic state in Russia, nothing would do more to ensure that hope will never be realized than attacking the Games.  An attack would be an international tragedy, a violation of the Russian people, and a personal affront to Putin.  Along with international outrage and condemnation, Russian authorities would most likely implement the most ferocious plans formulated as a response.  Assuredly, there would be endless capture and kill raids, and decisive military attacks against any strongholds established.  It is somewhat likely that Putin, outraged, would also consider the physical displacement of specific parts of the community from which the militant groups emanate and situating them in a various secure areas in different parts of Russia until such time the threat of terrorism posed to the Russian people could be sorted out.  Other nations and human rights groups might complain, but there would be little they could do to stop it.

Assessment

There is the possibility that concerns over security for the Olympic Games will be quelled only after it closes on February 27th without any incidents of violence.  Interestingly, Islamic militant groups posed a threat to the Russian government long before the Games were scheduled.  There may be legitimate concern behind much of the criticism.  However, there may very well be a political purpose behind the timing of some of it.    Perhaps the benefit of the generous investment of security resources on Sochi might be the creation of opportunities for Russian security officials to establish enduring security in the Caucasus.  Those groups that may seek to disrupt or halt the Games through terrorism might want to consider that the Games reach a level of national and historical importance and psychic benefit for the Russian people that Putin’s response would be unprecedented.  The purpose of any militant group cannot be served by eliciting Putin’s wrath.  Sochi is the wrong place and the wrong time for the militant groups to act.  Hopefully, from February 7th to February 23rd, peace, unity, and good sportsmanship will be the only things concerning the world at the Games.

Putin Vows to Annihilate Terrorists, But Until the Winter Olympics Are Over, Other Steps Must Suffice

For Russian President Vladimir Putin, the 2014 Winter Olympics Games in Sochi will provide an excellent opportunity to showcase his resurgent Russia in the best light possible.  However, much has happened to prevent that goal from being achieved. Within Russia, concerns have mounted over the cost for hosting the Olympic Games, with some estimates stating it has surpassed $50 billion.  Outside of Russia, there has been a significant, negative reaction to Putin signing a law in June 2013, banning “propaganda of nontraditional sexual relations” and imposing fines on those holding gay pride rallies.   Several world leaders have responded by declining to attend the Games, including US President Barack Obama, whose relationship with Putin remains less than congenial.  However, both in Russia and worldwide, all with interest in the Games, are concerned with security at the event given the most recent terrorist attacks in Volgograd, some 690 km northeast of the Sochi Olympic Park.  Of all of the issues that have arose, Putin has been most responsive to the attacks.  In his televised New Year address, Putin stated, “We will confidently, fiercely and consistently continue the fight against terrorists until their complete annihilation.”  For the Russian people, any statement less forceful than that from Putin would have been unexpected and unacceptable.  There is an issue, however, over the degree to which Putin will actually retaliate for the attacks.  Moreover, it is uncertain that any action against the terrorist group allegedly responsible will prevent new attacks before or during the Games.  Perhaps a key factor in the organization of a significant response by the Russian government is timing.

There were two terrorist attacks in Volgograd in December 2013.  On December 29th, a suicide bomber detonated explosives inside a crowded railway station, killing at least 17 and wounding many others.  On December 30th, another bomber detonated explosives on an electric trolleybus, killing 14 and critically wounding several more.  An Investigative Committee spokesperson stated identical explosives were used in both bombings, establishing a link between them.  The attacks in Volgograd came on top of a number of other terrorist enumerated by the Russian law enforcement officials in the North Caucasus Federal District and the Southern Federal District.  Volgograd was also targeted in October 2013 when a suspected female suicide bomber killed six people on a bus.  While nobody claimed responsibility for the December attacks either through a message or manifesto to authorities, the violence underscored Russia’s vulnerability to insurgents more than a decade after it drove separatists from power in the North Caucasus province of Chechnya during Putin’s first term.  The insurgents suspected, from the group Imarat Kavkaz (Caucasus Emirate), say they are fighting to carve an Islamic state out known as the Chechen Republic of Ichkeria from a swath of southern Russia that includes Sochi.  In a video posted online in July, the group’s Chechen-born leader, Doku Umarov, called for “maximum force” to prevent Russia from staging the Games.

While the Games will go on as planned and nations will send their teams to compete, the Volgograd attacks have still had a strong effect on the psyche of the Russian people and on Putin himself.  Given the increased sense of patriotism and nationalism found among the Russian people, most are proud of the fact the Games are being held in Russia and are hoping for a successful event.  However, those hopes have been moderated by fears that more attacks will occur before the Games start.  They are relying on Putin’s reputation for being a strong leader and very capable of responding firmly on security issues.  They are relying upon him to guarantee the Games will be a glorious occasion for them.  Putin, himself, is certainly unintimidated by terrorists from Russia or anywhere else.  However, having dedicated a great amount of government resources, especially from the security services, to the Games, and being fully aware of his reputation as a strong leader, for Putin, the attacks were a personal affront.  The attacks appear to discredit his effort to prove Russia is on the rise again and suffering the fate of lesser states.  For that, he will be unforgiving.  With the leaders of other world powers absent, at Sochi, Putin would have the spotlight to himself on the world stage.   What a tragic figure Putin would be, if he had to stand alone at the Olympic Park, explaining a devastating terrorist attack.

Under the circumstances, Putin must thoroughly respond to the attacks.  To some degree, the security services have acted.  When cars, stores, homes, and marketplaces are bombed, Russian Interior Ministry (MVD) and Federal Security Service (FSB) troops surround the homes of suspected militants and pull them out for arrest.  It has been said that those troops have bombed homes when relatives have refused to turn suspects over.  After the Volgograd attacks, 4000 policemen were dispatched to Volgograd, placing over 5,200 on the ground for what Russian authorities called an “Anti-Terrorism Whirlwind.”  Over 1,500 buildings were searched and more than 1,000 people were searched.  Several dozen have been detained for resisting arrests for not having documents allowing them to carry weapons.  The internal troops (VV) of the Ministry of Interior have already been heavily engaged in operations in North Caucasus.  Those VV units that genuinely conduct operations are from the ten Independent Special Designation Brigades (OBrON).  These specialized forces fight local rebels and control protests.  The short-term, specific operations OBrON carry out differentiate the VV forces from the regular army, which is trained and equipped to fight long-term conflicts.  Such services provided by the VV are not without cost.  Whenever people have been arrested and interrogated, policemen are often killed in retaliation.

Putin is dedicated to preventing any further terrorist attacks.  It is uncertain that any response against the group allegedly responsible will prevent future attacks before or during the Games.  The raids undertaken, although significant, were not as robust as might have been expected given the likely desperation and paranoia felt among security service officials over a possible Sochi attack.  However, federal district wide, large scale operations weeks before the Games will mar them, and erase any impression that Sochi is safe to visit.  Putin’s entire investment of Russia’s resources would be wasted.  Moreover, a full-scale attack upon terrorist groups now may lead to a full-scale nihilistic response from them.  That type of conflict, regardless of whether Russian authorities might destroy the terrorist groups in the process, could lead to a drastic decision by the International Olympic Committee to cancel, postpone, or relocate the Games.

It is very likely sophisticated technical means to monitor the movements and activities of individuals and groups, likely to engage in terrorist acts, has been on-going.  Hitting those groups may disrupt those monitoring efforts, by destroying leads before they yield their potential. That would be counter-intuitive.  Losing lines into to those groups now would create major security problems.  (If the attackers in Volgograd were completely off the radar, that likely created a conundrum for Russian security officials.  The attackers operations would have been pre-planned.  They would have been set up to move independently on specific dates, times, and locations without the communication of orders.  To defeat such attacks, anti-terrorism efforts must peak just before the Games begin and remain heightened until they end to defeat lone operatives.)

A better time for the security services to strike against suspected terrorist groups would be just days before the opening ceremonies or during Sochi.  Communications must be destroyed or disrupted.  There must be confusion and chaos within the leadership.  The groups must stand rudderless.  The strikes must be of sufficent strength to prevent the groups from resurrecting themselves enough to conduct any operations during the Games.  Strikes of this nature would likely be executed swiftly and covertly against terrorist elements being monitored.  Very capable special service troops would most likely be called upon to carry out such a task.  Of the many special service groups established in Russia, the most well-known and respected are Directorate “A” of the FSB Special Purpose Center (Alpha Group) and Directorate V of the FSB Special Purpose Center (Vympel).  Alpha Group, an elite stand alone sub unit of Russia’s special services, is a dedicated counter-terrorism task force of the FSB.  It primarily prevents and responds to violent acts in public transportation and buildings.  Vympel is officially tasked with protecting Russia’s strategic installations, however it is also available for extended police duties, paramilitary applications, and covert operations in Russia or abroad.  The profile and capabilities of both units have increased, and they have taken over and consolidated roles and personnel from other organizations.  During the Soviet era, Alpha Group acquired a reputation for using ruthless methods in response to terrorist acts.  In Hezbollah: The Global Footprint of Lebanon’s Party of God (Georgetown University Press, 2013),  Matthew Levitt recounts different versions of how Soviet authorities used Alpha Group in response to the 1985 kidnappings of four Soviet diplomats in Beirut, Lebanon.  After one of the Soviet hostages was shot and dumped near a stadium in West Beirut, Alpha Group sought the help of Druze informants to identify the kidnappers, their clans, and their families. One account has Alpha Group kidnapping a relative of the hostage taking organization, cutting off his ear, and sending it to his family.  In another account, Alpha Group abducted one of the kidnapper’s brothers and sent two of his fingers home to his family in separate envelopes.  A third version has Alpha Group kidnapping a dozen individuals tied to the kidnapping group, one of them being a relative of its leader. The relative was castrated, shot in head, had his testicles stuffed in his mouth, and shipped to the group with a letter promising a similar fate for the eleven other captives if the Soviet hostages were not released.  That same evening, the three diplomats, in bad condition, appeared at the gates of the Soviet embassy.

There is also the possibility that Russian authorities may utilize their most capable assets in response to the terrorist attacks.  In his book Russian Security and Paramilitary Forces Since 1991 (Osprey, 2013), Mark Galeotti of NYU’s Center for Global Affairs discusses Zaslon (Barrier), a special services group not officially recognized by the Russian government.  Zaslon personnel are said to be former spetsnaz troops and serve under the sole command of Foreign Intelligence Service (SVR) headquarters in Yasenevo, on the outskirts of Moscow.  Galeotti explains that Zaslon has been linked with everything from assassinations abroad to gathering up documents and technology that the Russian government did not want the US to seize when Baghdad fell.  In Syria, Galeotti suspects Zaslon may be providing additional support for Russian military and diplomatic personnel, and would likely be ordered to extract people, documents, or technologies Russia would not want to share if Syrian President Bashar al-Assad’s regime began to collapse.  As part of Putin’s full court press on security for Sochi, Zaslon has likely already been included among those special services units called in to provide both anti-terrorism and counter-terrorism capabilities.  An outstanding scholar at the University of Utrecht, Ralph Ladestein, shared a picture with greatcharlie.com in November 2013 that, as he explained, showed Russian special service troops in Syria.  The picture is below.

Are these Zaslon troops operating in Syria? The message written on the wall of the structure in the background (translated by Ladestein) reads, “Syria for Assad!”

By the end of the Games, it is possible that so much information will have been gathered as a result of the concentration of security resources to the anti-terrorism effort that new, more effective operations against terrorist groups could simply be conducted by MVD and FSB.  Necessity could lead to the consideration of innovative approaches toward blunting the capabilities of the terrorists perhaps by using precision strikes with military firepower and directed attacks by special service troops.  Some new ideas may come as a result of Russian security officials working closely with foreign security officials from participating states.  After examining the situation in the North Caucasus, those foreign security officials may likely offer suggestions on how lessons from their own experiences in counter-terrorism to could be applied to reduce or defeat any security threats.  Additionally, with the Games over, Putin will have the flexibility to respond to the terrorists on a far larger scale if he chooses

If after the closing ceremonies, Sochi is known for being the Black Sea resort on the edge of the Caucasus Mountain range where the 2014 Winter Olympic Games were superbly organized, the Russian people will be very satisfied.  If after the Games, an impressed world audience has a sense that Russia is a world power on the rise again, with great capabilities and possibilities, Putin would be elated.  However, if a terrorist attack is attempted or successfully carried out in Sochi, for Russia, it will be a disaster.  Russia will be viewed as a questionable choice by the International Olympic Committee for the Games and the country’s reputation for being stifled by authoritarianism, insecurity and uncertainty will endure.

Despite personal or political views of Putin and his decisions regarding the Winter Olympic Games, no one should have any interest in seeing Sochi struck by a terrorist attack.  Anti-terrorism and counter-terrorism by the Russian security services should be supported by all states, including the US.  While security officials of the US, EU, and other countries may liaise and provide some assistance, everything possible should be done to prevent an attack, including the supply of personnel and technical resources.  A secure and successful event would not only be in Russia’s interest, but also the transnational interest.