Commentary: There Is still the Need to Debunk the Yarn of Trump as “Russian Federation Spy”

The current director of the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Sergey Naryshkin (above). US President Donald Trump’s adversaries have tried endlessly to uncloak some nefarious purpose in his legitimate effort to perform his duties, which has been akin to seeking long shadows at high noon. Some in the opposition Democratic Party have gone as far as to offer dangerous fantasies that Trump and officials in his administration are operatives of the Russian Federation. The notion that Russian Federation foreign intelligence officers would not only approach, but even more, attempt to recruit Trump, is daylight madness. No one knows that better than Naryshkin and the directors of the other Russian Federation intelligence services. It is more than likely that in the 2020 US Presidential Election, the outcome will go Trump’s way. Unfortunately, many of the ludicrous allegations, having been propagated for so long and with prodigious intensity by his adversaries, will likely stick to some degree for some time.

From what has been observed, critics and detractors, actual adversaries of US President Donald Trump, within the US news media and among scholars, policy analysts, political opponents, and leaders of the Democratic Party, have exhibited a practically collective mindset, determined to find wrong in him as President and as a person. His presidency was figuratively born in the captivity of such attitudes and behavior and they remain present among those same circles, four years later. Trump’s adversaries have tried endlessly to uncloak some nefarious purpose in his legitimate effort to perform his duties, which has been akin to seeking long shadows at high noon. Many of those engaged in such conduct have garnered considerable notoriety. Specific individuals will not be named here. When all is considered, however, those notables, in reality, have only left a record littered with moments of absolute absurdity. That record might break their own hearts, if they ever took a look over their shoulders. In developing their attacks on Trump, his adversaries have built whimsy upon whimsy, fantasy upon fantasy. One stunt that became quite popular was to make an angry insinuation of Trump’s guilt in one thing or another, and attach the pretense of knowing a lot more about the matter which they would reveal later, in an childlike effort to puff themselves up. Ita durus eras ut neque amore neque precibus molliri posses. (You were so unfeeling that you could be softened neither by love nor by prayers.)

Of the many accusations, the worst was the claim, proffered with superfluity, that Trump and his 2016 US Presidential Campaign were somehow under the control of the Russian Federation and that he was the Kremlin’s spy. The entire conception, which developed into much more than a nasty rumor, a federal investigation to be exact, was daylight madness. (It is curious that anyone would be incautious enough to cavalierly prevaricate on hypothetical activities of the very dangerous and most ubiquitous Russian Federation foreign intelligence services in the first place.) Before the matter is possibly billowed up by Trump’s adversaries again in a desperate effort to negatively shape impressions about him, greatcharlie has made the humble effort to present a few insights on the matter that might help readers better appreciate the absolute fallaciousness of the spy allegation.

With regard to the yarn of Trump as Russian Federation spy, his adversaries sought to convince all that they were comfortable about accusing Trump of being such because they had the benefit of understanding all that was necessary about the tactics, techniques, procedures, and methods of the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU, and, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB. However, it was frightfully obvious that the whole subject was well outside the province of those self-declared experts. Whenever they made statements concerning how Russian Federation foreign intelligence services operated, no doubt was left that they did not have a clue as to what they were talking about. It actually appeared that everything they knew about it all was gleaned from James Bond and Jason Bourne films, as well as streaming television programs about spying. That fact was made more surprising by the fact that Members of both chambers of the US Congress who were among Trump’s political adversaries actually can get facts about how everything works through briefings from the US Intelligence Community. They even have the ability to get questions answered about any related issue by holding committee hearings. Those on the House and Senate Intelligence Committees, in particular, can get themselves read-in on a good amount of available intelligence on an issue. The words and actions of many political leaders leaves open the real possibility that they were intentionally telling mistruths about Trump with the goal of deceiving the US public. That would simply be depraved and indefensible. As one should reasonably expect, there are stark differences between the banal amusements of Hollywood and the truths about spying.

Imaginably as part of their grand delusion, Trump’s adversaries would claim the reason why Russian Federation foreign intelligence would want to recruit him would be to establish an extraordinary, unprecedented level of access to, and influence upon, US policymaking, decisionmaking, and top secret information. In considering how Russian Federation foreign intelligence senior executives and managers would likely assess Trump as a recruitment prospect, purely out of academic interest, one of the first steps would be a genuine examination of his traits. Among the traits very likely to be ascribed to Trump that would obviate him as an intelligence recruitment target would include: his extroverted personality; his gregarious, talkative nature; his high energy; his desire to lead and be in command at all times; his oft reported combustible reactions to threats or moves against him, his family, or their interests; his strong intellect; his creativity; his curious, oftentimes accurate intuition; his devotion to the US; and his enormous sense of patriotism. To advance this point furthrr, if Russian Federation foreign intelligence senior executives and managers were to theoretically ruminate on just these traits while trying to reach a decision on recruiting him, they would surely conclude that an effort to get him to betray his country would fail miserably. Indeed, they would very likely believe that an attempted recruitment would more than likely anger Trump. They would also have good reason to fear that he would immediately contact federal law enforcement and have the intelligence officers, who approached him, picked up posthaste. If any of the lurid negative information that his adversaries originally alleged was in the possession of the Russian Federation intelligence services–all which has since been totally debunked–were used by Russian Federation intelligence officers to coerce him, Trump might have been angered to the point of acting violently against them. (This is certainly not to state that Trump is ill-tempered. Rather, he has displayed calmness and authority in the most challenging situations in the past 4 years.) Whimsically, one could visualize Russian Federation intelligence officers hypothetically trying to coerce Trump, being immediately reported by him and picked up by services of the US Intelligence Community or federal law enfiecement, and then some unstable senior executives and managers in Yasenevo would go on to publicize any supposed embarassing information on him. That would surely place the hypothetical intercepted Russian Federation intelligence officers in far greater jeopardy with the US Department of Justice. They could surrender all hope of being sent home persona non grataCorna cervum a periculis defendunt. (Horns protect the stag from dangers.)

Perhaps academically, one might imagine the whole recruitment idea being greenlit by senior executives and managers of the Russian Federation foreign intelligence services despite its obvious deficiencies. Even if they could so recklessly throw caution to the wind, it would be beyond reason to believe that any experienced Russian Federation foreign intelligence officer would want to take on an assuredly career-ending, kamikaze mission of recruiting Trump and “running” him as part of some magical operation to control the US election and control the tools of US national power. As a practical matter, based on the traits mentioned here, no Russian Federation intelligence officer would have any cause to think that Trump could be put under his or her control. Not likely having a truly capable or experienced officer step forward to take on the case would make the inane plot Trump’s adversaries have speculated upon even less practicable. Hypothetically assigning some overzealous daredevil to the task who might not fully grasp the intricacies involved and the nuance required would be akin to programming his or her mission and the operation for failure. (Some of Trump’s adversaries declare loudly and repeat as orbiter dictum the ludicrous suggestion that Russian Federation President Vladimir Putin was his intelligence “handler.” No one in the Russian Federation foreign intelligence mens sana in corpore sano, and as an existential matter, would ever suggest that Putin should involve himself in such an enterprise. The main reason for that being because he is Putin, and that means far more in the Russian Federation than outsiders might be able to comprehend.) One could go even a step further by pointing out that in order to make his adversaries’ notional plot work, Russian Federation foreign intelligence senior executives and managers conceivably involved would need to determine how to provide Trump with plenty tutoring along the way given that Trump had no experience whatsoever with the work involved in the sort complicated conspiracy as his adversaries have envisioned. Such notional work would require the impossible, Trump’s “obedience,” and even more, plenty of covert contact, thereby greatly increasing the chance that any Russian Federation foreign intelligence officers involved would be noticed and caught.

Politically, for Russian Federation foreign intelligence service senior executives and managers, there will always be a reluctance to make new problems for the Kremlin. If proper Russian Federation foreign intelligence officers under this scenario were actually caught attempting to recruit Trump, US-Russian relations would be put in a far worse place than where they were before the theoretical operation was executed. If the matter of recruiting Trump were ever actually brought up at either SVR or GRU headquarters, it would imaginably be uttered only as an inappropriate witticism at a cocktail reception filled with jolly chatter or during some jovial late night bull session with plenty of good vodka on hand. Even under those circumstances, experienced professionals would surely quiet any talk about it right off. Unquestionably, few on Earth could be more certain that Trump was not a Russian Federation operative than the Russian Federation foreign intelligence services, themselves. For the Russians, watching shadowy elements of the US Intelligence Community work hard to destroy an innocent man, the President of the US nevertheless, must have been breathtaking.

Information that may appear to be evidence for those with preconceptions of a subject’s guilt very often turns out to be arbitrary. One would not be going out on shaky ground to suggest that a far higher threshold and a more finely graded measure should have been used by the US Intelligence Community to judge the actions of the President of the US before making the grave allegation that the country’s chief executive was functioning as a creature of a hostile foreign intelligence service. Initiating an impertinent federal investigation into whether the US President was a Russian Federation intelligence based primarily on a negative emotional response to the individual, and based attendantly on vacuous surmisals on what could be possible, was completely unwarranted, could reasonably be called unlawful, and perhaps even be called criminal. Evidence required would imaginably include some indicia, a bona fide trail of Russian Federation foreign intelligence tradecraft leading to Trump. The hypothetical case against him would have been fattened up a bit by figuratively scratching through the dust to track down certain snags, hitches, loose ends, and other tell-tale signs of both a Russian Federation foreign intelligence operation and presence around or linked to him.

To enlarge on that, it could be expected that an approach toward Trump by Russian Federation foreign intelligence officers under the scenario proffered by his adversaries most likely would have been tested before any actual move was made and authentic evidence of that initial effort would exist. Certain inducements that presumably would have been used to lure Trump would have already been identified and confirmed without a scintilla of doubt by US counterintelligence services and law enforcement as such. To suggest that one inducement might have been promising him an election victory, as his adversaries have generally done, is farcical. No reasonable or rational Republican or Democrat political operative in the US would ever be so imprudent as to offer the guarantee of an election victory to any candidate for any local, state, or national office. Recall how the good minds of so many US experts failed to bring victory to their 2016 Presidential candidates, to their 2018 midterm Congressional candidates, and to their 2020 Democratic Presidential candidates. Anyone who would believe that the Russian Federation Intelligence Community would be more certain and better able, to put a candidate into national office in the US than professional political operatives of the main political parties would surely be in the cradle intellectually. Martin Heidegger, the 20th century German philosopher in What Is Called Thinking? (1952), wrote: “Das Bedenklichste in unserer bedenklichen Zeit ist, dass wir noch nicht denken.” (The most thought-provoking thing in our thought-provoking time is that we are still not thinking.)

Trump came to the Oval Office somewhat contemptuous of orthodox ways of doing things in Washington. He referred to those elements of the system in Washington that were shackled to traditional, politically motivated ways of doing things as “the swamp.”  Trump said he would do things his way and “drain the swamp.” To an extent, as US President, that was his prerogative. Trump was new to not just politics in general, but specifically national politics, new to government, new to foreign policy and national security making, and new to government diplomacy. (This is certainly no longer the case with Trump for he has grown into the job fittingly.) For that reason, and as their patriotic duty, directors and senior managers in the US Intelligence Community should have better spent their time early on in Trump’s first term, developing effective ways of briefing the newly minted US President with digestible slices of information on the inherent problems and pitfalls of approaching matters in ways that might be too unorthodox. More effective paths to doing what he wanted could have been presented to him in a helpful way. With enormous budgets appropriated to their organizations by the US Congress, every now and then, some directors and senior managers in the US Intelligence Community will succumb to the temptation of engaging in what becomes a misadventure. If money had been short, it is doubtful that the idea of second guessing Trump’s allegiance would have even glimmered in their heads. Starting a questionable investigation would most likely have been judged as being not worth the candle.

Sir Arthur Conan Doyle’s superlative sleuth, Sherlock Holmes, had occasion to state: “To a great mind, nothing is too little.” It should be noted that Russian Federation foreign intelligence and counterintelligence services almost certainly have kept their ears perked hoping to collect everything reported about the painstaking work of elements of the US Intelligence Community first to prevent, then to bring down, Trump’s Presidency. Indeed, they have doubtlessly taken maximum advantage of the opportunity to mine through a mass of open source information from investigative journalists, various investigations by the US Intelligence Community, the US Justice Department, and varied US Congressional committees, in order to learn more about how US counterintelligence services, in particular, operate. Strands of hard facts could be added to the existing heap of what Russian Federation foreign intelligence and counterintelligence services had already collected about the deplorable enterprise. Previous analyses prepared in the abstract on other matters were also very likely enhanced considerably by new facts. Indeed, Russian Federation foreign intelligence and counterintelligence services very likely have been able to extrapolate, make inferences about, and more confidently conceptualize what was revealed to better their understanding of the activities of the US Intelligence Community in their own country, both past and present. Sadly, that may have helped to pose greater challenges and dangers for US intelligence officers, operatives, and informants.

The illustrious John Milton’s quip, “Where more is meant than meets the ear, “ from “Il Penseroso” published in his Poems (1645), aptly befits the manner in which words and statements are often analyzed in the intelligence industry. When those senior executives and managers formerly of the US Intelligence Community who were involved in the plot against Trump and are now commentators for broadcast news networks, offer their versions of the whole ugly matter on air, there is always something for Yasenevo to gain. Despite the best efforts of those former officials to be discreet during their multiple on air appearances, there have doubtlessly been one or more unguarded moments for each when a furtive tidbit that they wanted to keep concealed was revealed as they upbraided Trump. Moreover, their appearances on air have surely provided excellent opportunities to study those former officials and to better understand them and their sensibilities. Such information and observations doubtlessly have allowed Russian Federation foreign intelligence and counterintelligence services to flesh out psychological profiles constructed on them over the years. (Although it seems unlikely, some could potentially return to government in the future. It has been said that “Anything can happen in cricket and politics.”) Moreover, Russian Federation foreign intelligence and counterintelligence services have also likely been allowed to use that information and observations, to put it in the bland language of espionage, as a means to better understand specific US intelligence and counterintelligence activities that took place during the years in which those errant US senior executives and managers involved in the plot against Trump were in their former positions.

To journey just a bit further on this point, Russian Federation foreign intelligence and counterintelligence additionally had a chance to better examine specific mistakes that they respectively made in their operations versus the US, using revelations from investigations into the plot against the Trump administration. That information would have most likely inspired audits in Yasenevo to better assess how closely its foreign intelligence officers, operatives, and informants have been monitored and how US counterintelligence has managed to see many Russian Federation efforts straight. Whether these and other lessons learned have shaped present, or will shape future, Russian Federation foreign intelligence operations in the US is unknown to greatcharlie. Suffice it to say that there were most likely some adjustments made.

Trump has absolutely no need to vindicate himself concerning the “hoax” that insisted he was in any way linked to the Russia Federation for it is just too barmy. Trump has the truth on his side. Nothing needs to be dressed-up. He has been forthright. Regarding the Russian Federation, Trump has stood against, pushed back on, and even defeated its efforts to advance an agenda against the US and its interests. Those who have tried to suggest otherwise are lying. The normative hope would be that Trump’s adversaries actually know the truth and for their own reasons are acting against it. In Lord Jim, Joseph Conrad wrote: “No man ever understands quite his own artful dodges to escape the grim shadow of self-knowledge.” It seems, however, that Trump’s adversaries, refusing to accept reality, have replaced it with a satisfying substitute reality by which they may never find the need to compromise their wrongful beliefs. In the US, one is presumed innocent until proven guilty, has a right to due process, and upholding the rights of the citizen is paramount. For the most part, US citizens understand these ideas and are willing to defend those rights. As such, there has actually been a very poor reaction among US citizens toward the aggressive posture Trump adversaries have taken toward him. It is more than likely that in the 2020 US Presidential Election, the outcome will go Trump’s way. Unfortunately, the many abominable, false stories of his wrongdoing will likely stick to him to some degree for some time. Opinionem quidem et famam eo loco habeamus, tamquam non ducere sed sequi debeat. (As for rumor and reputation let us consider them as matters that must follow not guide our actions.)

China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2)

The Headquarters of the Ministry of State Security (above). The primary civilian intelligence service engaged in the political warfare struggle against the US is the Ministry of State Security (MSS). Yet, while fully involved in that work, MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. It has also robustly enhanced another mission of grabbing intellectual property and an array of advanced technologies from the US. This essay’s focus is not the political warfare effort by MSS. Rather, it provides a few insights on this topic from outside the box on MSS tactics, techniques, procedures, and methods used to keep its ears to the ground and to collect what it needs to improve China’s capabilities and capacity to compete and struggle with the US.

This post should be considered a direct continuation of the preceding one. The complete essay focuses on what the Ministry of State Security (MSS) is and what it does, day-to-day, for China. It is presented in two sections. “Part 1,” published on July 31, 2020, provides greatcharlie’s insights from outside the box on the MSS and the tactics, techniques, procedures, and methods it believes both help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US. That discussion is buttressed by a few celebrated and trusted sources. This section, “Part 2,” completes discussion begun in “Part 1,” and then it calls attention to how, over recent years, a number of less-familiar, self-inflicted wounds have hindered the prosecution of a successful campaign by US counterintelligence services against the MSS as well as other Chinese intelligence services. The extent to which those same issues concerning US counterintelligence services have impacted the Trump administration is also touched upon. Without pretension, greatcharlie states that there is no reason for it to believe policymakers and decisionmakers in the White House and among US foreign affairs, defense, and intelligence organizations, would have a professional interest in its meditations on MSS intelligence operations in the US. However, it is greatcharlie’s hope that if given some attention, perhaps in some small way it might assist those who work on matters of gravity in this province improve their approach to defeating and displacing the MSS networks and operations as well as those of its sister organizations in the US. Bonus adiuvate, conservate popular Romanum. (Help the good (men) save (metaphorically in this case) the Roman people.)

People’s Republic of China President Xi Jinping (above). President Xi Jinping is the man in charge, the top decisionmaker in China, therefore he has ultimate responsibility for what China has done, is doing, and will do. How China has responded to the crisis turned pandemic so far has been a source of curiosity and absolute outrage globally. The Communist Party of China and the National Party Congress were unapologetic and frightfully defensive concerning all discussion of China’s role in what was happening. They became particularly warm toward US President Donald Trump. It seems as if China’s leadership will continue to assail the global media with waves of distortions. In the meantime, around the world, the number of people infected by the coronavirus continues to increase, the death toll rises, and the financial loss is being calculated in the trillions. Hopefully, Chinese President Xi Jinping is genuinely aware of what is transpiring and has set some type of guidance on just how far this whole cabaret should go.

MSS Counterintelligence

A primary mission of the MSS counterintelligence service is the infiltration of all the foreign special service operations: intelligence, counter-intelligence, police forces all over the world. Its primary targets assuredly are its chief competitor, the US, the bordering Russian Federation, and Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes although China has not achieved prominence in their space. Second would come Taiwan, India, Pakistan, Nepal, Mongolia, and Iran which it trusts up to a point.  China must also measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. China has also stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

Certainly, counterintelligence would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning, Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations. The surveillance effort may not always be easy going. A foreign intelligence officer’s trade craft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some.

Chinese intelligence services are capable of constructing a sophisticated profile of the online activities of individuals. It does not appear, however, that the MSS and supporting agencies have established the capability to identify espionage in the offing. Every now and then, though, they are lucky enough to identify espionage underfoot with hum shoe detective work, online. In an excellent essay published May 7, 2014 on Jamestown, Mattis relays that in May 2014, Guangdong State Security Department (GSSD) of the MSS revealed brief details of an espionage case in which the chief suspect received a ten-year prison sentence. An unnamed foreign intelligence service reportedly recruited the suspect, dubbed “Mr. Li,” in an online chat room. Electronic prowling led him to documents of immense value, a variety of classified military documents and publications. Recognizing that a long price could be had for what he might acquire, “Mr. Li” turned to an online contact “Feige.” GSSD counterintelligence discovered that “Feige” had more than 40 other contacts—12 in Guangdong—spread over 20 provinces and provincial-level cities. Additionally, “Feige” had been an active online persona since 2007, collecting information off of military enthusiast (junmi) discussion boards and using services such as QQ to meet others like “Mr Li.” Those who “Feige” recruited collected military information through friends and contacts, subscribed to sensitive and internal military publications, and even took pictures of local military installations. Although a long price could surely have been had for what he had collected and provided the foreign intelligence service, “Mr. Li” was paid only a few hundred renminbi per month. Chinese authorities did not identify the foreign intelligence service behind the theft of the military secrets. Nevertheless, the case compounded an apparent sense of siege in Beijing over what then called US Internet hegemony, and the prevalence of foreign-made communications technology in sensitive Chinese systems. There were also allegations that the US had managed to exploit Huawei’s equipment, a concern that has since flipped the other way. For a state known to be as controlling of information as China, the reality is that an incredible amount of sensitive information was publicly accessible. It was all overwhelming for China which was well-aware of that its counterintelligence services could not stem figurative waves of attempts to penetrate its systems. The MSS will always want Chinese citizens to believe its elements such as the GSSD are as present as “air and water” with “information on everyone.” However, contradicting that, Chinese security officials were also reported at the time that more than 70 percent of state secrets cases involve information being leaked or passed to a foreign intelligence service online It led to changes.

It goes without saying that Chinese military and civilian intelligence services have immensely improved their cyber capabilities. Efforts by the, have tormented advanced industrialized countries. However, lessons learned in the past decade by MSS counterintelligence concerning foreign intelligence services’ cyber operations against China apparently stuck. Perhaps, the main lesson was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. One might venture to say that a move to hard documents was evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

Staff burning massive bundles of documents within the compound of the People’s Republic of China Consulate in Houston, Texas (above). Lessons learned in the past decade by MSS counterintelligence concerning foreign intelligence services’ cyber operations against China apparently stuck. Perhaps, the main lesson was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. The transition back to paper would be the best answer. One might say that a move to hard documents was evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

Once MSS foreign intelligence officers are lucky enough to recruit operatives and informants in the US, federal indictments and criminal complaints against those caught indicate that they task them as intelligence collection requirements demand. However, in almost all of those taskings, certain counterintelligence aspects can also be discerned. Those aspects appear aimed at providing ways to assist MSS counterintelligence in identifying and locating foreign intelligence officers, operatives, and informants, particularly in China, or assist in devising ways to intercept, neutralize, and recruit them. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In August 2016, Kun Shan “Joey” Chun, a Chinese-born naturalized US citizen, pleaded guilty to illegally acting as an agent of the Chinese government. Chun, an electronics technician and veteran FBI employee who had a top-secret security clearance, reportedly passed sensitive information to China concerning, among other things, surveillance technologies used by the FBI. Prosecutors said that while working for the agency in New York he sent his Chinese handler, “at minimum, information regarding the FBI’s personnel, structure, technological capabilities, general information regarding the FBI’s surveillance strategies, and certain categories of surveillance targets.” Chun’s Chinese intelligence contacts provided him with financial payments and partially paid for a trip to Italy and France, during which he met with a Chinese intelligence officer.

In order to develop ways to counter FBI efforts against MSS foreign intelligence officers, operatives, and informants, MSS counterintelligence would want to know how the organization is set up to confront adversarial networks of spies, who is who, where they are situated, and what exactly are they doing. Understanding FBI surveillance strategies, would inform MSS counterintelligence of what layers of surveillance are usually being pressed on MSS foreign intelligence officers, operatives, and informants in the US and how to devise better ways to defeat them. Technological capabilities would inform MSS counterintelligence whether all along the FBI has had the capability to monitor its activities or whether they have the capacity and have simply failed to use it effectively. The collection of information on what MSS foreign intelligence has been doing ineffectively in the face of US counterintelligence surveillance strategies and technological capabilities would undoubtedly inspire audits to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight.

Kun Shan “Joey” Chun, (above). Once MSS foreign intelligence officers are lucky enough to recruit operatives and informants in the US, federal indictments and criminal complaints indicate that they task them as intelligence collection requirements demand. However, in almost all of those taskings, certain counterintelligence aspects can also be discerned. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In August 2016, Kun Shan “Joey” Chun pleaded guilty to illegally acting as an agent of the Chinese government. Chun, an electronics technician and veteran FBI employee who had a top-secret security clearance, reportedly passed sensitive information to China concerning, among other things, surveillance technologies used by the FBI. Prosecutors said that while working for the agency in New York he sent his Chinese handler, “at minimum, information regarding the FBI’s personnel, structure, technological capabilities, general information regarding the FBI’s surveillance strategies, and certain categories of surveillance targets.”

In the case of former CIA case officer, Jerry Chun Shing Lee, who, in November 2019, was sentenced to 19 years in prison last year after pleading guilty to conspiring with MSS intelligence officers after he left the agency in 2010. According to the US Department of Justice, Lee had created a document including “certain locations to which the CIA would assign officers with certain identified experience, as well as the particular location and timeframe of a sensitive CIA operation.” Lee also possessed an address book that “contained handwritten notes” related to his work as a CIA case officer prior to 2004. These notes included “intelligence provided by CIA assets, true names of assets, operational meeting locations and phone numbers, and information about covert facilities.” Allegedly, Chun’s espionage activities led to the deaths of a number of the CIA’s Chinese informants.

The damage done to CIA networks and at least one ongoing operation in China, accompanied by the tragic loss of any operatives or informants as suggested by news media reports would create a sense of immeasurable anger and betrayal within CIA. However, the Agency has been through similar situations before with notables such as Edward Howard, Aldrich Ames, and Harold Nicholson. MSS counterintelligence would capitalize on Lee’s efforts by creating an active template based on how its case officers operated, the types of operatives and informants targeted and methods of their recruitment. Further, typical locations for meetings could be plotted and ways and means to surveil new operations and collection efforts could be developed. Most importantly, the information could allow for the conceptualization of the potential moves that CIA might make to resurrect lost networks and activities against China. Countermeasures would put in place to potentially thwart new recruitments and stymie new technologies that could support operations in the field and run alongside human intelligence collection.

Much ado was made in the US Intelligence Community about the espionage case of Ron Hansen. In a May 2019 guilty plea and plea agreement, Ron Hansen acknowledged attempting to communicate, deliver, or transmit to MSS intelligence officers, information concerning US national defense with intent or reason to believe that information would be used to harm the US and provide advantages to China. Hansen was a retired US Army Warrant Officer with experience in signals intelligence and human intelligence and former Defense Intelligence Agency civilian intelligence case officer, fluent in Mandarin as well as Russian, with top secret security clearance, In early 2014, the MSS targeted Hansen for recruitment and he began meeting with them regularly in China. During those meetings, the MSS intelligence officers described the type of information that would interest them. One of the most important taskings Hansen received was collecting  forensic software and sending it to the operatives in Beijing without first obtaining the license from the US Department of Commerce which constituted a crime. As Hansen described events, he partnered with two Chinese nationals, to whom he identified “Amy” and “Robert,” via an office he maintained for his company, H-11 in Beijing. Amy and Robert operated Beijing Hua Heng (Infosec) which partnered with H-11 to sell computer forensic products in their company. Robert informed Hansen that he maintained close connections to several contacts in Chinese intelligence. In November 2016, Amy instructed Hansen to purchase and send to her in China, Recon software from Sumuri LLC, a Delaware based firm. She specifically requested the Recon Mac OS X Forensics with Paladin 6 software, which contained cryptographic capability. Despite being aware of US laws forbidding the export, Hansen did so despite being aware of US laws forbidding the export. In December 2016, Arny instructed Hansen to purchase the Intella 100 software from Vound LLC, a US company that provided products related to forensic search, e-discovery, and information governance. He obediently bought it and had it shipped it to her in China in January 2017. Again, he did so, despite being aware of US laws forbidding the export.

Tasking Hansen to grab forensic software could surely have served a counterintelligence requirement. Software forensics is the science of analyzing software source code or binary code to determine whether intellectual property infringement or theft occurred. Advanced forensic software could allow MSS counterintelligence officers to conduct in depth analysis of user files to collect evidence such as documents, pictures, internet history and more. MSS counterintelligence could use the software to monitor communications and collect information on dissidents, ethnic groups, suspected foreign intelligence operatives and informants, even foreign intelligence officers of some countries, visiting foreign officials, businessmen, and tourists alike. It could support the theft of intellectual property and trade secrets.

Counterintelligence may very well be the greatest manifestation of the paranoia business, but it, as all other elements of the intelligence industry, requires wisdom, reason, and logic to be performed well. A MSS counterintelligence officer was not supposed to be the same as his internal security service or law enforcement counterpart. Unlike such, displeasure and frustration over denials of intercepted foreign intelligence officers and agents in interrogations generally should not manifest in violence.

There is no reason for frustration over denials of intercepted intelligence officers, operatives, or informants to result in violence. If progress through interviews indicates that an investigator is on the right track, there will be an attempt to find another door inside to open and pass through in order to get deeper on matters. Such technique is honed and polished over the years. When MSS managers have determined the situation demands rough treatment, typically some sort of exigent circumstance, and when the decision will align with the thinking and plans of the Communist Party of China leadership, coercive measures are employed to include forms of torture. Expectedly, “good managers” will be ill at ease with that. Much to the grief of foreign intelligence officers, foreign agents, and Chinese citizens, it is that style of pursuit which has been honed and polished over the years by MSS counterintelligence officers.

Sensation seekers might believe that being involved in authentic espionage would be thrilling. However, there is plenty of real danger involved. Once the MSS officer is in the ground working in a foreign land, there is always the chance of arrest while carrying out one’s duties or expulsion of the officer persona non grata. From what has been observed, when US counterintelligence and law enforcement ensure that such interceptions of Chinese intelligence officers, operatives, and informants receive high profile reporting, to include conducting press conferences and widely disseminating press releases, it is akin to hanging out MSS’ dirty laundry for all to see.

MSS counterintelligence officers surely caution their counterparts in MSS foreign intelligence to keep their eyes and ears open. The MSS foreign intelligence officer in the field must be able to intuit when a situation is right and when it is wrong. Experienced hands will take counsel not from their fears, but from their intimations. They know when to seize up and walk away. Still, there would be a natural concern among counterintelligence officers everywhere that as a human habit, sometimes what is obvious is often immediately accepted as true. The result can be catastrophic. MSS took a big hit in October 2018, when Yan Jun Xu, a Chinese citizen and Deputy Division Director, Sixth Bureau of Jiangsu Province of the MSS, was arrested and charged with conspiring and attempting to commit economic espionage and steal trade secrets from multiple US aviation and aerospace companies. US counterintelligence officers were able to lure Xu, a successful MSS intelligence officer, to Belgium in April 2018 where he was arrested pursuant to a federal complaint, and then indicted by a federal grand jury in the Southern District of Ohio. Belgian authorities provided significant assistance with the arrest and extradition of Xu to the US. Among Xu’s tasks as a MSS foreign intelligence officer in the US was to obtain technical information, including trade secrets, from aviation and aerospace companies not only in the US but throughout Europe. Xu often cloaked the true nature of his employment, by representing that he was associated with Jiangsu Science & Technology Promotion Association. From December 2013 to October 2018, Xu worked, traveled, and communicated with individuals associated with or employed by MSS and a number of Chinese universities and institutions, particularly Nanjing University of Aeronautics and Astronautics. Xu also actively targeted specific companies in the US and overseas that were acknowledged to be leaders in the field of aviation and aerospace technology, design, and manufacturing. Within these aviation companies, Xu and other individuals, some of whom were already known to law enforcement, would spot individuals who they deemed to be “experts” in those aviation companies, and who could potentially be targeted and recruited to travel to China, manipulated under the belief that they were traveling to China merely for “an exchange” of ideas and to give a presentation at a university. Xu and others would pay the “experts” stipends and would arrange for and pay expenses associated with their travel to China. To achieve their objective of collecting specific aviation technology documents and information, Xu and others exchanged messages concerning the types of information that they desired, and actively discussed methods for obtaining the desired information. That effort would include the use of codes and series of letters in place of the technology being discussed and the name of the company targeted. The arrest of Xu, who handled both Ji Chaoqun and Weiyun Huang, (whose circumstances were discussed in “Part 1” of this essay) preceded their arrests.

Xudong Yao, also known as Yan Jun Xu ( above). MSS counterintelligence officers surely caution their MSS foreign intelligence counterparts to keep their eyes and ears open. The MSS foreign intelligence officer in the field must be able to intuit when a situation is right and when it is wrong. They must know when to seize up and when to walk away. Still, there would be a natural concern among counterintelligence officers everywhere that as a human habit, sometimes what is obvious is often immediately accepted as true. The result can be catastrophic. MSS took a big hit in October 2018, when Yan Jun Xu, a Chinese citizen and Deputy Division Director, Sixth Bureau of Jiangsu Province of the MSS, was arrested and charged with conspiring and attempting to commit economic espionage and steal trade secrets from multiple US aviation and aerospace companies. US counterintelligence officers were able to lure Xu, a successful MSS intelligence officer, to Belgium in April 2018 where he was arrested pursuant to a federal complaint, and then indicted by a federal grand jury in the Southern District of Ohio.

Doubtlessly, if MSS officers are caught they will be told what they can say if “pressure” is severe enough. The information would likely be designed as an active measure to help distort a foreign counterintelligence services understanding of MSS tactics, techniques, procedures, and methods. Given estimates by experts on the potential volume of their intelligence activities in the US, a casual observer might expect the impact of a loss here and there would likely be viewed as nominal with respect to the overall picture. However, intercepted MSS officers, who stumble due to poor tradecraft, a simple misstep, or for reasons unknown to MSS counterintelligence, may not recover beautifully if returned to China. To start, the MSS would not at all like having its officers identified in China, identified in the US, or even worse, see them apprehended by US counterintelligence services or law enforcement. Further, it would not appreciate having an entire operation or network in the US detected and effectively neutralized

For the MSS officer, Commandment 11, “Thou shall not get caught!”, applies. Being caught while on the beat will never be chalked up as a sword scratch or a badge of courage. Yet, the greatest problem would be the embarrassment that it would cause the MSS as an organization, the Chinese government, and the Communist Party of China. The intercepted officer would have to face the reality that he failed at his task. Facetious managers and colleagues would likely say he or she was not up to the job. If there was  some error in judgment, failure to do things by the book, or wilful dereliction for failing to attain proper authorization before acting, the size of the failure would grow exponentially. Doubtlessly, the officer would be held out as an example of how an MSS officer should not operate. Concerning the situation of the hypothetical errant MSS officer, Il a foutu la merde dans sa vie.

The manner in which the Communist Party of China might come down on the officer for the failure would likely depend upon the political temperature at the time in Beijing. One could use the Party’s response to the bad news of the coronavirus outbreak as a yardstick. There would be no way to conceal the matter from the Communist Party of China. Even if the attempt was made to do so, informants inside the organization would likely report the matter up to Party leaders, making them familiar with the case before the matter even moved through MSS channels and managers and senior executives there were read-in on everything. The Communist Party of China would be especially interested if it concerns the US. One could only imagine the reaction of Party leaders if they were to find out about the arrest or PNG of a MSS officer via the US news media before hearing from its own government.

Putting aside the reality that a vital MSS intelligence operation may have been disrupted or destroyed and putting aside the potential negative reaction by the Communist Party of China, one might consider that for MSS senior executives and managers at headquarters, the saving grace would be that if the US counterintelligence were doing so, it meant attempts recruit the officer and compel him or her to play the double-game against their former colleagues and bosses as a counterespionage operative for the US failed. To advance a step further on this point, MSS managers would also recognize that burning the MSS offficer would be a palliative step and the only “constructive” option left for US counterintelligence. Holding a captured MSS officer in prison instead of putting them out of the US, PNG, would almost ensure some type of retaliation against an US intelligence officer or merely a suspected officer would be taken in China. In effect, a de facto modus vivendi exists. As for the future of the MSS officer caught, by burning him or her with heavy news media coverage of his or her identification or arrest could possibly destroy the officer’s prospects for receiving another overseas posting or participating in future intelligence operations leaving them in a solitary despair. MSS can always hire and train another.

A considerable concern for any counterintelligence service regarding foreign intelligence officers and their operatives and informants functioning in foreign territory is the threat of betrayal. Indeed, intelligence organizations in general spend much time and energy hunting among their own ranks for foreign spies. Of course, concerns are always raised among Chinese citizens when anyone with whom they may have just met or were in contact for other reasons, suddenly showed what could be considered under the circumstances as an eccentric interest in them. They could imagine that such inquires could be a trick perpetrated by the security services to test their loyalty. That surely causes the most fear. Defections from the MSS do happen, but as aforementioned, they are somewhat rare. Nevertheless, it is guarded against as surely not all MSS officers are gun barrel straight. At least, this would be the most likely presumption of Chinese counterintelligence officers. Certainly, all intelligence services have their share of problems with errant officers. Some, such as MSS, likely have less problems than most. However, even the clean, loyal, and obedient will occasionally look over their shoulders because of that. Bent intelligence can serve any preconceptions, and it often does in many intelligence services; sometimes purposefully and wrongfully to destroy an innocent officer’s career.

MSS counterintelligence managers with practiced hands know the first step of a breakdown in a officer’s sense of duty to China and the Communist Revolution can take place as far back as when an individual is hired who might manifest reactions such as jealousy and envy over the success of others faithfully operating in the field and achieving many victories. The second step of that breakdown usually happens when those less-than qualified hires are placed in a position to monitor, audit, and evaluate the work of those in the field. Those inner rumblings are often more than just a matter of maturity or being uptight. They are character issues that should have been resolved long before those particular individuals met their MSS recruiters. Their varied emotional disorders subsequently became most apparent after they began working.

A satellite image of the imposing MSS Headquarters in Beijing (above). In the abstract, one might conceptualize that a foreign technology analysis office with specialized units likely exists within one of its analytical departments to perform that task. One might consider further how tasks are divided within it and how it logically manages the mass collection of information and data collected. The overall aim of the hypothetical advanced foreign technology assessment unit would be to enhance the analytic capability of the MSS to enable it to more effectively provide to the Communist Party of China, ministers, and MSS senior executives the highest quality intelligence on advanced technological developments in the US and in other advanced industrialized countries. For the obvious security reasons, the workplace of these supposed technology analysts would likely be situated In some prohibited place, if not within the depths of the massive Beijing Headquarters of the MSS, itself.

MSS Large Data Processing of Technologies Stolen from US Conceptualized

Facilius per partes in cognitionem todus adducimur. (We are more easily led part by part to an understanding of the whole.) With dozens of operatives moving about the US with their eyes wide open and ears pinned back attempting to obey instructions from MSS officers either back in China or on the ground in the US, a backlog of information collected would be expected. The volume might be seen as problematic by experts in the US. However, MSS senior executives and managers, much as the MPS and all the parallel PLA and Communist Party of China intelligence services and units and all of the iterations of Chinese intelligence services that came before them, would apply reason to find a way to handle bundles of reports from intelligence operatives and informants. It stands to reason that a division exists which is engaged in piecing together information and data stolen from the US to advance its own technologies. China would hardly vouchsafe such.

In the abstract, one might conceptualize that a foreign technology analysis office with specialized units likely exists within one of its analytical departments to perform that task. One might consider further how tasks are divided within it and how it logically manages the mass collection of information and data collected. The overall aim of the prospective advanced foreign technology assessment unit would be to enhance the analytic capability of the MSS to enable it to more effectively provide to the Communist Party of China, its minister and deputy ministers, and senior executives, the highest quality intelligence on advanced technological developments in the US and in other advanced industrialized countries. For the obvious security reasons, the workplace of these supposed technology analysts would likely be situated In some prohibited place, if not some inner sanctum of the massive Headquarters of the MSS in Beijing, itself. Visualize, in some edifice in China, several MSS analysts, all of whom are experts on US and other advanced industrialized countries’ military, scientific, medical or artificial intelligence technologies, engaged daily in an intelligence practice of uncovering the latest, most advanced, and most desired information of foreign technologies from collected intelligence. In an intelligence tradition from the earliest days of CDSA, they can be imagined mining through foreign sources in a time consuming process akin to sifting through dust, yet enjoying the hunt so to speak.

One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II in the United Kingdom, yet they are isolated from the conditions of the past. That art, as with many aspects of intelligence collection, has become electronic. The label analyst should be interpreted widely to include researchers who regularly use secret intelligence. Individuals drawn to and hired for such work would have an acumen for being able to work on what are essentially puzzles. Solving puzzles is actually a science dubbed enigmatology. The analysts turned “enigmatologists,” or visa-versa, would most likely be elated to keep their brains on edge. They would have little difficulty remaining occupied forever long it takes to put together pieces of information to create the picture of a new technology or new research and development project. When such a figurative puzzle is cracked, new ones would very likely be immediately placed before analysts.

Bletchley Park, a country house in Buckinghamshire, was bought by the Secret Intelligence Service (MI6) in 1938 as a site to which the Government Code & Cypher School and MI6 could be evacuated when war came. However, Bletchley Park’s great success was as a result of the mechanization of the decryption process keeping pace with the mechanization of encryption. Although the decryption of Enigma is the best known of Bletchley Park’s exploits, other successes, such as the decryption of Luftwaffe hand ciphers, and the development of Colossus, the world’s first computer which solved the enciphered German teleprinter, made a significant contribution to the Allied victory. One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II, yet they are isolated from the conditions of the past as that art, as with many aspects of intelligence collection, has become electronic.

While the supposition may sound a bit ordinary, perchance there would be some sort of analytical triage by the most experienced analyst, perhaps senior leaders and best experts from the analytical team might gather weekly or daily to perform that task. It would also give the supervisors a good sense of what might be coming down the pike for examination. The participating supervisors, themselves, would reflect countries from which the technologies would be stolen and would be proficient in the respective languages of the industrialized countries from which the reports, plans, schematics, charts, and other data would originate. The final sorting would be done by supervisors intimately familiar with at least one area of the technologies stolen. There may be information gathered on a new US technology or ongoing research and development project that is already in sufficient quality and quality to send up to higher levels of management to create additional collection requirements for MSS officers and operatives in the field to help complete the picture. Even if there is a relative paucity of information on a foreign technology, if it is a technology discovered that is so advanced that it would have the potential to be a game changer in terms of the development of Chinese technologies or might be of the utmost importance regarding China’s defense and national security, it would very likely be brought up to senior executives who would decide how to pursue it. Counterintelligence would also likely be involved to make certain that any miracles are not simply sophisticated material dangled as bait for some elaborate trap. The supervisors speculated upon here would also be the ones to deliver information in formal reports or as presentations and desk-level briefings to customers in government.

After they receive a batch of information, the emphasis of the analysts’ search through it will be to identify and consider new discoveries, as well as determine whether the information is simply interesting or can be given higher meaning. Much as case officers may run more than operative in the field, each analyst or team would likely work on, not many, but very likely more than one puzzle at a time. The foundation of the puzzle would most likely be formed by a pattern of information. Each bit of new information may be a possible missing piece. Each new piece gives one an idea of what the next piece might look like. In a mosaic, stone fragments are cut to for a particular image the artist has in mind, a preconception. With a puzzle, the image is created  with each new piece. There is something to learn every time the image is developed. Eventually the image figuratively begins looking back at the one working on the puzzle telling its story. Priority is likely given to those puzzles closest to solution or those that begin releasing information about some new exquisite US technology that MSS senior executives, and thereby the Communist Party of China wants to get its hands on. As a next logical step, the collection of pieces for the remaining parts of the puzzle by operations departments from Beijing or the provinces can be directed through collection requirements. Perhaps the same analyst or analytical team or a group of troubleshooting technological experts would take over the case at that point.

One exercise would be to find commonalities among reports on a US research and development project. The likely thinking in each unit would be that there is always something in what has been collected, it just needs to be fully twinkled out. Imaginably, instead of having too few clues, in some cases there would be too many. To pull out a particular strand from a mass of information requires a very clear sense of priority. Doing that would also serve a counterintelligence purpose. The analysts would likely be trained to know there are patterns in reporting. A new technology will rarely simply emanate from  a single source, with no other references to it and no communication about it.

When pieces of information might be missing, there would always be the possibility that the next batch of reports from the US might help to do that. If that telling piece of information is not in the next batch, it may be in the batch after that. There are no blind alleys. If a report says something is there then it is there. The analysts would be fully cognizant that a considerable effort is being made within the US to conceal secret projects. Success at their work is likely invigorating, and likely impel more strenuous efforts. No matter how slowly any puzzle would develop, there would unlikely be any case regulated to something akin to a cold case file. If any information exists on a technological project, MSS managers know that there is metaphorically something cooking in the US. With several civilian informants working inside and around technological development centers, the day might come at any time when pieces of puzzle take on greater meaning and the puzzle starts telling the analysts something considerable.

While the image that the puzzle presents may not yet be completely in focus, the most experienced, knowledgeable, and resourceful eyes, masters in the business of sorting these puzzles out will be put on the matter. Such a case would likely become a collaborative focus. After a while of that, the newly discovered technology would very likely come into focus and resources of operations would be directed to the effort to hunt down the remaining elements and get them to China. In some cases, the few stray pieces of the puzzle could be conceptualized and reproduced by technology experts in China. What one can invent, another can surely reproduce.

Students of Nanjing University of Aeronautics and Astronautics studying in the library (above). One might say the work of such prospective foreign technology assessment analysts would be something similar to that of codebreakers of World War II, yet they are isolated from the conditions of the past as that art, as with many aspects of intelligence collection, have become electronic. Chinese colleges and universities graduate a near endless list of qualified candidates for every year. The Nanjing University of Aeronautics and Astronautics in particular is a happy hunting ground for MSS recruiters. Given in part to the availability of a highly qualified pool of potentials, Chinese intelligence services surely have the personnel capacity to handle the loads of stolen information coming in from the US and other advanced industrialized countries. The two female students at the bottom right of the photo are apparently taking a short break from all of their serious academic work with a little diversion.

There must be a balance in all of their analyses without a smidge of bias. In their analytical product, they would need to guard against apophenia, seeing patterns in unrelated things. Engaging in informal speculation would be appreciated, some US technologies would possibly seem so advanced as to be called exotic. However, assessing any to have a potential bordering on science fiction would face disapproval. No one would be allowed to attach importance to anything purely arbitrary. Latching on to something definitively trivial will be proven when nothing ever follows to assist in solving the matter.

Reports that the analysts received would unlikely solely focus on technologies although that information would have primacy. Reports that identify government agencies, offices, supporting specific cutting-edge research and development of technologies. Where those government agencies are, that is where the MSS will very likely be prowling. Names of experts from US government departments and agencies or from private organization experts that came up related to a particular technology may among other things help to understand the project’s importance. Reports on how information is kept secure would certainly be useful. Information on security officers associated with protecting a project may be important for operational purposes. It may become necessary to know who they are, what they are doing, what they are saying, and what their routines, interests, habits and health are, particularly if it is determined that the door should be left open to possibly conducting a covert collection effort against the office or facility for which he or she might be responsible.

Assumably, morale would be high in such a foreign technology assessment office given its victories. In terms of supervising performance and ensuring a quality work product, there would very likely be a nose to the grindstone, deadly serious, scholarly approach demanded of analysts in their work. One would unlikely hear much jolly chatter in the workplace. Imaginably, there would unlikely be any of the peculiar infernal squabbling in morning meetings and weekly reviews that has been dubbed part of a creative process within certain Western intelligence and counterintelligence services. It is unlikely that competitive urges, ego and ambition impell the work of the MSS enigmatologist. Again, as they are only human, there may be some elements of each that pushes each to be their best. While there is an urgency to the work, getting things right would be most important and to that extent accuracy would equate to speed. There would surely be one-to-one mentoring, with more experienced team colleagues who offer support, in addition to that offered by line managers. Nearly everyone appreciates acknowledgement for a job well-done and pat on the back from colleagues and managers, coaches and mentors. Respectful, motivated, and dedicated, younger members of teams usually want to make a good impression upon older, more experienced ones, and typically thrive on recognition, attention, guidance, approval, and praise from them. (Supervisors must reinforce good work, extinguish bad habits and that sort of thing.) If Beijing would even discuss the existence of such an analytical group, it undoubtedly has the world believing that the desire to do a good job for China and the Communist Revolution provides all of the impetus needed.

Unlike other analysts who might rotate between operational, analytical and managerial duties, analysts would essentially work in a professional closed shop. Successful analytical work of this kind would require unbroken contact with information on new technologies as it arrives to avoid gaps in specific knowledge and assessment capabilities that would naturally occur if the analysts most familiar with the technology were moved out and replaced with analysts from some other area such as foreign military operational analysis, counternarcotics, or organized crime. Technology assessment would be a high priority specialization and any advancement would take place within it.

Provincial and local departments and bureaus of the MSS often use cover names inside China such as “Shanghai Municipal Government Office number seven.” It could be the case for Shanghai State Security Bureau (SSSB) that Municipal Government Office number seven is actually the Shanghai State Municipal building (above). Two satellite dishes are often found on office building roofs of MSS departments and bureaus. (See the satellite dishes on the left and right sides of the municipal building roof. In a photo in Part 1 of this essay, notice two similar model satellite dishes atop the roof of the Wuhan Hubei National Security Office which is the home of the Ministry of State Security Bureau.) Going out on a rather slender thread, greatcharlie ventures to say the fact that two “MSS-style” satellite dishes sit atop Shanghai State Municipal building, makes it a candidate for being where SSSB resides or at least some shop of the active spy organization resides.

An Ugly Truth the MSS Surely Knows About the US Counterintelligence Services

MSS senior executives and managers have much with which they can be satisfied regarding their organization’s performance against the US. Certainly, their enthusiasm over the performance of their personnel has been ineffectual within the organization. MSS foreign intelligence officers, operatives and informants have amassed a record of considerable success in the US and continue to plow ahead. Some analysts of Chinese intelligence might say the extraordinary success of MSS was partly founded on luck. The organization was smart enough to ratchet up its operations at a time when US concerns over the capabilities and capacity of Chinese intelligence were astonishingly lax especially in person contacts. Employees at lower levels, drivers, housekeepers, managed to insinuate themselves into the offices and homes of US Senators, US Representatives, hotels, resorts, military bases, government departments and agencies, and important offices of major US industries. Needless to say, that is the kind of luck that tends to follow those who usually become pre-eminent in their field. However, MSS managers are comfortable enough to operate so boldly in the US not because they feel their officers, operatives, and informants are so superb. Its managers feel less threatened because, as aforementioned, it recognizes US counterintelligence services have allowed themselves to deteriorate to some degree in nearly all areas, but especially concerning personnel, over recent years.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.) US intelligence, counterintelligence, and law enforcement have all but admitted that they are somewhat baffled by what the MSS and its sister Chinese intelligence services are doing. They literally advertise their limitations. Surely, US counterintelligence knows all of this is a part of the reason why it is somewhat in the woods regarding Chinese intelligence operations in the US. They are happy that very few are aware as to why, too! There has been a never-ending rosy US news media narrative about US intelligence and counterintelligence services and law enforcement which has influenced the US public’s understanding of how well the counterintelligence job is being done. That new media narrative intensified immediately after the September 11, 2001 terrorist attack on the US. The US public’s impression of US counterintelligence work has also been shaped for decades by Hollywood via bedazzling images of near supermen and superwoman catching wretched enemy intelligence agents, terrorists, and international organized crime figures. Even greatcharlie must accept some responsibility for creating a certain image of US intelligence and counterintelligence services and law enforcement by typically referring to the “somber and astute” professionals among them.

True, the majority of officers within the civilian US counterintelligence services, energetically and earnestly do all they can to thwart and defeat the activities of foreign intelligence services operating in the US. Those proper US counterintelligence officers indeed have their eyes on the MSS and other Chinese intelligence services. Expectantly, the presence of such professionals in US counterintelligence should have been enough to cause concern and caution for the MSS as they ventured into the US. MSS officers should literally tremble as they approach, and as they begin to move about on the beat, they should be constantly and carefully looking over their shoulders. Unfortunately, in the larger world of US intelligence and counterintelligence there are other officers who could hardly be characterized as such.

Fate would have it that there are a number of US counterintelligence officers who do not perform in such a praise worthy way.  While the type of errant officer identified here may not be present in every office of a US counterintelligence organization. The errant officers described do not move around much as gremlins doing wrong at every turn, breaking every rule. Their numbers are still sufficient enough that they are noticeable to their adversaries as much as they are to their colleagues. What the MSS doubtlessly picks up about the errant officers that arguably presents much hope and perhaps even joy when MSS senior executives and managers in charge of US operations. MSS managers have very likely observed the errant officers thinking and behavior either rising to insanity or sinking to imbecility. They have likely heard all of their tales of woe. Most are distraught by the denial of overtime, reductions in allowances for expenses, and relatively modest salary. Some feel benefits such as medical and dental insurance are insufficient. Others are angered not only by those factors, but also by having to distribute significant payments to informants and multiple operatives greatly in excess of their salaries. Trouble really begins when a case or cases allow the errant officers access to funds for the payments to operatives and informants. As it is done under the honor system, the door is opened wide for embezzlement. (The details of the varied devilish artifices used to embezzle are too hefty to detail here. The decision to allow case officers of US intelligence and counterintelligence services access to such considerable amounts of taxpayer dollars in this day and age without the strictest forms of oversight is of questionable judgment.)

MSS managers surely have noticed that when engaged in investigations against their intelligence officers, operatives, and informants, such errant US counterintelligence officers are satisfied in performing poorly and being incompetent. Indeed, when it comes down to identifying, intercepting, neutralizing, and recruiting foreign intelligence officers and operatives, the errant officers are hardly game for the trudge. Typically, a history of rarely being able to get anything started in a recruitment will fill the performance records of their sort. Even when given an opportunity to bring in a foreign intelligence officer or operative, the whole case is usually muffed. It is the practice of most US counterintelligence services to give officers full control of their cases, with supervision from other special agents or case officers on a management track–often with less experience on the field than themselves. Having been given the authority from managers and those novice supervisors, the have no reservations about chasing down a false lead regardless of the fact that they have been read-in on all that indicates there is nothing at all to follow. Interestingly, money somehow never seems to be short for their cases. Bringing a case to resolution would not allow for the use of varied tricks to enrich themselves as the continued reconnaissance and surveillance of a target and use of informants without having any real counterintelligence goals. The operatives or informants in contact with the adversary are kept active enough and encouraged enough to hold their interest and to compel them to stay involved. In some cases, everything might abruptly stop if some change in the office, some feeling–call it intuition–causes the errant officers to be concerned. Most of the time, however, the errant officers become so comforted by the ease with which they managed to collect their ill-gotten gains, they become slow to notice any nuanced changes that may happen around them. Supervisors may push for results but they typically become accustomed to getting nothing from the errant officers. At best, they will push to shut down the case, but the damage will already have been done to the effort against the foreign intelligence service. In some rare exception, the errant officers will collect enough on an innocent citizen to secure an indictment. An offhand remark or joke made to a clandestine contact or false statements signed by the errant officers’ operatives tied to arbitrary evidence wrongfully cooked to take on higher meaning may be enough to prompt eager prosecutors to move against the innocent.

Bewildering to MSS managers but perhaps the most noticeable of the errant officers behaviors that immediately benefits not just the MSS, but all foreign intelligence services operating in the US, is the employment contractors who will bizarrely hire untutored surveillance operatives right off the street even for an intended clandestine operation that is supposed to be finely calibrated. In most foreign intelligence services, great care is placed in the selection of operatives for a task as important as surveillance. Due to the heavy reliance on the competence of observers, reports they produce, and even their immediate impressions. All of that information will impact data extrapolated and inferences made. Nevertheless, money hungry contractors to whom those services often outsource such work could apparently careless about such matters. If one were to put a good spin on the practice, the grand thought behind the practice would ostensibly be that placing more eyes, even nonprofessional, untrained eyes, on the target allows for better coverage of the targets activities, better. Yet, the real result is simply the accumulation of several observations, varied in accuracy and quality. False observation can often be provided by nonprofessionals in an ordinary case seeking to puff themselves up, as if to say: “Hey, look at me! I am a real spy!” Indeed, this lesser form of “spying” may bestow a certain dignity to the mixed bag engaged in it. However, the real magic behind the practice is the potential for dishonor that it creates. Since the hires are essentially transient, not all names on a list of impromptu operatives may be genuine. Errant officers can benefit themselves by collecting the recompense of  nonexistent operatives added to the list. Experienced counterintelligence hands are well-aware that repeated, considerable hiring for surveillance, especially in massive bundles for any case could be a beckoning initial indicia of someone trying “to give themselves a pension.” When that surveillance and investigation results in nothing, it is a red flag.

How MSS has likely benefited from this is obvious. MSS operatives would only need to put themselves in a position to be hired in any more formal process of becoming a surveillance operative for a contractor for US intelligence and counterintelligence services and law enforcement. As some will tend to seek a diverse pool of operatives, they will usually consider all applications with scant vetting in part to accelerate the hiring process but mostly to avoid the expense. After making certain they have presented themselves as qualified candidates, the MSS operative is very likely hired. If they can situate themselves in the vicinity of a diplomatic installation of the Chinese government or the proximity of a site in which MSS or another Chinese intelligence service might be operating, like a canary in a coal mine, a call or text from a US counterintelligence contractor request the operative participate in a surveillance nearby will notify the MSS that their people may be under observation. In addition, the MSS operatives can make a few extra dollars courtesy of the US taxpayer. (While it may strike one as daylight madness, one can rest assured that it is actually happening daily!)

What may be shocking and surprising to MSS managers are those occasions when errant officers, in an effort to manufacture a case, will submit knowingly false information to the Foreign Intelligence Surveillance Court (FISA Court) to secure warrants and authorizations for warrantless searches and surveillance against a wrongly targeted citizen. It happens more than the average US citizen could imagine. The bigger the lie that they tell about the innocent citizen, the more significant the case will be. That means greater resources will be alloted for it. In the process of obtaining FISA Court warrants and. authorizations, administrative personnel in the errant officers’ counterintelligence organization, particularly attorneys, who have the responsibility to oversee the correctness of applications to the court, have been known to simply rubber-stamp them. As for FISA Court judges, they tend to simply accept whatever is in the applications as valid.

A counterintelligence focus on the innocent US citizen will always be at the errant officers instigation. On one end of the chain are errant officers focused on enriching themselves with taxpayers dollars on the other end is some poor chap, knowing by God that he is innocent, who is nevertheless having his life turned upside down wrongfully. The errant officers will not hesitate to manufacture false information to submit to include tutoring so-called informants in preparing false statements for them. Sadly enough, as mentioned earlier, the errant officers can pick out informants who would be willing to prepare such statements and they will be handsomely paid. To paraphrase a recent remark by US Senator Charles Schumer of New York on the tactics, techniques, procedures, and methods of the US Intelligence Community, they can come at you six ways to Sunday. Indeed, under the incredible weight of the US intelligence and counterintelligence services and federal law enforcement, some of the innocent are unable to survive without being harmed psychologically and physically. To enlarge on the point of damage done by errant US counterintelligence officers who misused and abused power and the tools provided them to protect the US, there are more than a few cases that are well-known to those who have worked in the intelligence industry. Rest assured, MSS managers have kept track of US news media reporting and collected information about those cases. Among the high-profile cases is that of Wen Ho Lee.

Wen Ho Lee leaving a Washington, DC courthouse in 2000 (above). In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. Reportedly, the US Intelligence Community received information from an intelligence source revealing that China had obtained details of the W88, a US nuclear warhead. The FBI investigation into the case erroneously pointed them to Lee. Lee was arrested in December 1999 and held without bail for 278 days. The FBI later eventually determined that Lee could not plausibly have been the source of information on the W88 to China. Still, the FBI moved forward with its investigation of Lee. Lee was charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Lee would file and win a lawsuit against the US government and five news organizations for leaking information that violated his privacy.

Circumstances concerning Wen Ho Lee were complicated, but not so much as to evolve into an episode so tragic and regrettable. Boiled down, his life, liberty, his ability to go one quietly pursuing what made him happy as a US citizen was torn to shreds based on a rush to judgment and the wrongful use of the awesome powers provided to the US intelligence and counterintelligence services and law enforcement to protect the US public. In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. Reportedly, the US Intelligence Community received information from an intelligence source revealing that China had obtained details of the W88, a US nuclear warhead. Allegedly due to certain pieces of evidence, the FBI investigation into the case, Operation Kindred Spirit, pointed them to Lee. Lee was arrested in December 1999 and held without bail for 278 days. The FBI was made aware that Lee, a US citizen and University of California at Los Angeles (UCLA) scientist at the Los Alamos National Laboratory, travelled twice to China in the 1980s to meet with scientists. During a interview with the FBI, Lee admitted that he had been asked by them to supply information that would assist China in developing a nuclear missile force. On a polygraph test administered by the FBI, it was indicated that Lee was not always being truthful in his responses. An examination of his computer revealed that he had transferred classified documents to an unsecured network and in the process deleted the security classification in the material. Reportedly, the information was accessed 40 times on a computer at the UCLA student union by an unknown user.

As the investigation into his alleged espionage began, Lee was fired from his job at Los Alamos by UCLA on March 8, 1990, under pressure from the US Department of Energy, which oversees the laboratory. The news media was informed of his dismissal by an unknown source and the stories were widely reported. While his alleged espionage was being reported, the FBI had determined that Lee could not plausibly have been the source of information on the W88 to China. The normative hope, yet perhaps a bit optimistic one given the players involved, would be that once exculpatory information existed that should prove one’s innocence, a FBI investigation would be halted. Nevertheless, the FBI moved forward with its investigation of Lee. Although the original espionage charge was dropped by the FBI, Lee was still charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Later, Lee filed a lawsuit against the US government and five news organizations–the Washington Post, New York Times, Los Angeles Times, ABC NEWS, and the Associated Press–for leaking information that violated his privacy. In August 2004, a US District Court judge in held reporters from four of the news organizations in contempt for not revealing the source that identified Lee as a spy. The government would pay over $895,000 to cover Lee’s legal fees and taxes. The news organizations paid Lee $750,000.

From the ostensible professional side to what occurred, one might say FBI investigators may have measured the impact of what they were doing in terms how they looked before managers and whether their case at least had the appearance of being viable. individual, Lee. They did not measure their impact in terms of the population of which he was part, Chinese-American professionals working in national security areas, many of whom were left fearful of being looked at or pursued whenever an espionage case had a China nexus. Indeed, Lee and his supporters have argued that he was unfairly singled out for investigation because he was Chinese-American. Wen Ho Lee was not the enemy but has been called a victim of the blind, unfettered power of a few men hiding behind the shadows who possessed a little brief authority. That bit of humanity that should exist in each human heart was in such insufficient quantity in the counterintelligence special agents handling his case. In his book Securing the State, David Omand, former United Kingdom intelligence and security coordinator, wrote security intelligence operations—such as counterterrorism and counterintelligence—require cooperation between security officials and civilian populations among whom threats wish to hide. In the case of Chinese intelligence, this includes ethnic Chinese émigré communities, which, at least in the US, are now suspicious of the FBI. The botched investigation of Wen Ho Lee, in Ormand’s view, appeared to be politically (or racially) motivated witch hints rather than the serious security investigations they were. To Chinese-Americans, these suspicions and resulting investigations are the natural result of an unwillingness to analyze Chinese intelligence more rigorously on the basis of evidence.

For the MSS, the Wen Ho Lee case undoubtedly provided considerable lessons and the possible makings for a countermeasure to thwart efforts by US counterintelligence against its foreign intelligence operations inside and outside of the US. MSS managers would know better than anyone that Wen Ho Lee was not functioning as an intelligence operative for their organization or any other Chinese intelligence service. Given that Lee’s visits to China, professional discussions with scientists, and conversations with MSS, which its officers furtively initiated and to which he did not respond to positively, apparently served as indicia that he was a Chinese operative, US counterintelligence services, in this case the FBI, made the decision to act aggressively toward him. Doubtlessly, repeated authorizations for searches and surveillance were secured from the FISA Court and the pressure placed on Lee was intense. MSS managers surely from a distance, and at times likely up close, monitored how US counterintelligence resources were poured into Lee’s case. Meanwhile, they would smile as MSS officers, operatives, and informants, on the ground in the US, perhaps in the very locations in which US counterintelligence officers were surveiling and investigating Lee, were functioning with seeming impunity. What shrewd MSS managers likely reasoned from the episode was that calling more Chinese-American scientists, engineers, academics, and other scholars to China for conversations with their counterparts, would allow for the creation of dozens of potential decoys, or, to use the parlance of the intelligence industry, unwitting “dangles” out of those visiting experts which US counterintelligence services perchance would chase around whenever true MSS officers, operatives, or informants stole highly-prized information and data from the US. The tactic would be relatively low cost, low risk, and US counterintelligence services would really do all the work to make the effort successful. There would likely also be the hope among MSS managers that US counterintelligence would even chase Chinese-Americans that the MSS had no contact with whatsoever. What is presented here is by no means an unwarranted extrapolation. The question that should really pique interest is whether the MSS had such a countermeasure in place long before Lee first visited China to speak with scientist counterparts. While one might expect they have been interviewed regarding such a possibility, defectors, whose own foreign intelligence activities were likely compartmentalized, would unlikely know about a secret Chinese counterintelligence program such as the one hypothesized.

Robert Mueller (above). Perhaps one of most disturbing abuses of power by US counterintelligence elements was the continued clandestine use of powers and tools designed to deal with terrorists and actual foreign intelligence operatives against candidate Donald Trump to prove that he and his campaign colluded with the Russian Federation. In what was hands down a sham investigation, there was a total breakdown of the rule of law. Facts were manipulated. There were deliberate efforts to defraud the FISA Court to secure warrants, authrizations for warrantless searches and surveillance, and near unlimited powers to use against US citizens. A host of other nefarious acts were committed system wide. One can hardly imagine that one morning a group of civilian US counterintelligence officers from the very top to the rank and file decided to take on the US President and give some new tactics a try. Every step taken against Trump’s campaign and administration was undoubtedly well-rehearsed in prior cases. A significant advancement of their cause occurred when former FBI Director, Robert Mueller was appointed Special Counsel to Investigate Russian Interference with the 2016 Presidential Election and Related Matters on May 17, 2017.

Perhaps one of most disturbing abuses of power by US counterintelligence elements was the continued clandestine use of powers and tools designed to deal with terrorists and actual foreign intelligence operatives against candidate Donald Trump for collusion with the Russian Federation and the subsequent investigation of the administration of US President Donald Trump. Investigative journalists and concerned Members of the US Congress have informed that the wrongful, ghastly spying was conducted under the name, “Operation Crossfire Hurricane.” In what was hands down a sham investigation, there was a total breakdown of the rule of law. Facts were manipulated. There were deliberate efforts to defraud the FISA Court to secure warrants, authorizations for warrantless searches and surveillance, and near unlimited powers to use against US citizens. A host of other nefarious acts were committed system wide. Incontrovertibly, the activities of US counterintelligence officers, themselves, ironically could have impacted the outcome of the 2016 US Presidential Election. One can hardly imagine that one morning a group of civilian US counterintelligence officers from the very top to the rank and file decide to take on the US President and give these tactics a try. Every step they took against Trump’s campaign and administration was undoubtedly well-rehearsed in a great number of prior counterintelligence cases. The conspirators were seemingly absolutely confident in the prospects for their success. A significant advancement of their cause occurred when former FBI Director, Robert Mueller was appointed Special Counsel to Investigate Russian Interference with the 2016 Presidential Election and Related Matters on May 17, 2017. Mueller’s office has issued more than 100 criminal counts against 32 people. Among those ensnared in the investigation was Michael Flynn, Trump’s former national security adviser. Flynn was coerced into a plea agreement requiring him to admit gulit to lying to the FBI about his contacts with the Russian Federation ambassador to the US.

As of this writing, much attention is being given to senior executives and managers involved in the illegal activity against both President-Elect Trump and then President Trump. However, the willingness of a number of line officers in US counterintelligence to commit wrongful acts, and failing to report malfeasance and illegal actions of their superiors leaves no doubt about the complicity of more line officers than at least publicly acknowledged on the matter. They operated against a trusting presidential candidate, and that candidate became president, and members of his administration. Hands down, the evidence points to an overarching culture within the US counterintelligence service that it’s members were above the law. It is always far easier for one to betray those who give one their trust. It was the impressive intuition and intimations of Trump over what was happening around him which provided the initial faint signal, largely dismissed by friend and foe alike, that something wrong was going on.

Tragically, concern over the harm caused to the innocent is a feeling senior executives, managers, and supervisors notoriously lack. Typically, when private citizens have been put in such dreadful situations as to be falsely accused or mistakenly identified, one would get the impression that in the minds of senior executives and managers of those organizations that only person who really has a problem is the one to whom all of the wrongful actions are being perpetrated against. Too often senior executives and managers seem in greater fear for the reputation of their organizations if real corruption is unmasked than fear failing their duty to support and defend the US Constitution, to uphold the rule of law, and protect the well-being of US citizens. Further, as long as their organization is considered a trusted, reliable government source, and few would accept the word of an innocent US citizen accused of espionage or worse over their organizations, they tend to behave as if the problem will take care of itself. Much damage has been done to US counterintelligence capabilities today as a result of their delinquency. (Given some of the publicly known facts of the counterintelligence operation against Trump, senior executives and managers of counterintelligence organizations involved actually pushed the case forward despite lacking an authentic legal cause for doing so. That lack of obedience to the law and procedure could lead one to believe they knew that the opportunity would be created for all types of wrongdoing as described to transpire in the field, but senior executives and managers showed little concern over that. The whole enterprise was scandalous. Nemo repente fuit turpissimus. (No one suddenly becomes bad.))

Michael Flynn (above). Among those ensnared in the investigation was Michael Flynn, Trump’s former national security adviser. Flynn was coerced into a plea agreement requiring him to admit guilt to lying to the FBI about his contacts with the Russian Federation ambassador to the US. Tragically, concern over the harm caused to the innocent is a feeling senior executives, managers, and supervisors notoriously lack. Typically, when private citizens have been put in such dreadful situations as to be falsely accused or mistakenly identified, one would get the impression that in the minds of senior executives and managers of those organizations that only person who really has a problem is the one to whom all of the wrongful actions are being perpetrated against. Too often senior executives and managers seem in greater fear for the reputation of their organizations if real corruption is unmasked than fear failing their duty to support and defend the US Constitution, to uphold the rule of law, and protect the well-being of US citizens.

MSS intelligence and counterintelligence officers have had ample opportunities over the years to get an even closer look at personnel and performance of US counterintelligence organizations. Certainly, in planning meetings, strategy and operational reviews, as well as in debriefings of MSS officers upon their return home, much time is spent collecting information that will allow for the construction of an outline of the psychological foundation of adversarial counterintelligence services and law enforcement organizations. However, one could imagine that information most prized is that acquired through passive collection by operatives and agents quietly placed where the counterintelligence officer could easily make the mistake of dismissing them. Surely, that elucidating information, most likely sent directly to Beijing from the US, from an intelligence perspective, would be among the most important collected. It could be counted among the bread and butter operations in the US, having undoubtedly been going on for years. Interestingly, few to none of the fellow case officers or special agents in the errant officers respective offices or organizations ever report them to superiors. MSS managers undoubtedly view that as supportive of the Communist Party of China line about the moral and ethical weaknesses of the US system, and evidence of the figurative cracks that will lead to its eventual collapse.

When MSS managers consider what makes these errant officers tick, collected information would undoubtedly support possible answers as varied as their behaviors. The mindset that makes engaging in corruption so comfortable that may perchance be the result of being exposed to the mindset of senior officers in their organizations who came of age the free-wielding era of War on Terror and wars in Iraq and Afghanistan in which the manual was often tossed aside by members of the US Intelligence Community. There was a go get ’em mentality in place in which procedures were ignored, wrongful short-cuts were taken, and countless rules were broken. Billions in taxpayer dollars remain unaccounted for. Authority that many legal experts still insist went far beyond what any Member of Congress would normally countenance under the US Constitution were granted under the USA Patriot Act. One might suppose that the exposure of recent generations of counterintelligence officers to such thinking has allowed such negative behavior to become inculcated among those in the field. The thirst to control the lives of others negatively becomes unquenchable. Perhaps the uneven thinking, and aberrant attitudes and behavior of these misplaced errant officers is stimulated by the unique responsibilities, authority, activities, and stressors of intelligence work. Stoicus noster, “Vitium,” inquit, “non est in rebus sed in animo.” (Our Stoic philosopher said, “Vice is not merely in one’s actions but in the mind itself.”)

The misfortune of having such misanthropes as the errant officers in what should be an elite organization is something with which MSS officers are somewhat familiar. Indeed, the corruption of those sworn to protect their nation, and in China’s particular case, those sworn to uphold the values and ideals of the Communist Movement, and obey the edicts of the Communist Party of China, is a deficiency that has been dealt with in China on occasion. by MSS, sometimes at the very top of the organization. In April 2015, Zhou Yongkang, a former member of the 17th Politburo Standing Committee and Secretary of the Central Political and Legal Affairs Commission (Zhengfawei) between 2007 and 2012, was formally charged in April with taking bribes, abuse of power and intentionally leaking state secrets. As Secretary of the Central Political and Legal Affairs Commission, Zhou oversaw China’s security apparatus and law enforcement institutions, with power stretching into courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs, to include the MSS. At the end of a closed door trial that began on May 2015 in the Tianjin No.1 Intermediate People’s Court, it was ruled that Zhou and his family had taken bribes totaling 129.7 million yuan (approximately $18,835, 317) from his close allies. The court declared that Zhou abused his power by requesting Jiang Jiemin, the former head of the State-owned Assets Supervision and Administration Commission and former chairman of the state-run China National Petroleum Corporation (CNPC), where Zhou was a top official for 10 years. Li Chuncheng, former Sichuan deputy party chief, directed more than 2.13 billion yuan of illegal gains to his son and other businessmen, causing a loss of 1.48 billion yuan to the Chinese economy. Zhou also provided Cao Yongzheng, who is a “qigong (ancient Chinese exercise and healing technique) master,” six classified documents, of which five were top secret. Since some evidence of his crimes involved state secrets, the trial was not open to the public. The maximum punishment for bribery is death; both the abuse of power and the state-secret charges each carry up to seven years in prison. However, the court stated that although Zhou had accepted a “huge” amount of bribes, but given the mitigating circumstances that he had confessed his crimes, pleaded guilty, and most of the bribes had been taken by his relatives, he had asked them to hand back the money, and all the money had been confiscated, he was given a “lenient” punishment. On the charge of abuse of power, he received seven years’ imprisonment. For the charge of leaking state secrets, he received four years’ imprisonment. Zhou, 74 at the time, was essentially sentenced to life imprisonment by the court. Further, Zhou was stripped of all political rights for life and all his personal assets were confiscated.

Former Secretary of the Central Political and Legal Affairs Commission, Zhou Yongkang, in court (above). The misfortune of having such misanthropes as the errant US counterintelligence officers in one ranks is something with which MSS officers are familiar. In April 2015, Zhou Yongkang, a former member of the 17th Politburo Standing Committee and Secretary of the Central Political and Legal Affairs Commission between 2007 and 2012, was formally charged in April with taking bribes, abuse of power and intentionally leaking state secrets. As Secretary of the Central Political and Legal Affairs Commission, Zhou oversaw China’s security apparatus and law enforcement institutions, with power stretching into courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs.

Returning to the matter of errant officers in US counterintelligence, make no mistake, however, the errant officers’ disregard of the counterintelligence mission are characteristics doubtlessly most favored among MSS senior executives, managers, and officers in the field. MSS would surely try to collect concrete information on them such as their education and employment experience, financial reports, family relations, friends, personal habits, tastes, and dislikes. MSS would very likely possess some of the most thorough studies prepared on the capabilities and capacity of US intelligence, counterintelligence, and law enforcement, and put enough faith in what they have amassed and know, given it has committed such enormous numbers of officers to the great intelligence game being played inside the US.

MSS managers, while still cautious, may have deduced that due to the presence of so many bad apples in the US counterintelligence services, they cannot pose any real threat to their operations. Any portion of the figurative noose US counterintelligence organizations might try to put around the neck of MSS officers, operatives, informants, or overall operations would surely be frayed because of the errant officers presence. To go an adage further, a chain is only as strong as its weakest link. Certainly, in planning meetings, strategy and operational reviews, as well as debriefings of MSS officers when they return home, time is spent attempting to outline the psychological foundation for US counterintelligence officers that opposed them and the nuance of tradecraft they observed being used against them. MSS would likely make assessments of the extent to which any of the errant officers encountered might allow for small gaps or gaping holes in the US defense and how they deplete morale. Perhaps they are even familiar with their names and postings. Assumably, they would want to be familiar with those among that sort of errant officer who have actually moved up to become managers.

MSS managers may determine that the errant officers display all the telltale signs of being misanthropes. There is a palpable bitterness of spirit in their hearts. They loathe their organizations. Everyday, they condescend in order to even sit with the other officers in their organization. They likely feel an aberrant sense of sacrifice. Professionalism, collegiality, gentleness seen in supervisors is viewed as a weakness. They look upon their adversaries with disdain, too! That sensibility would not be expressed with gymnasium locker room joviality, but rather a red hot mean spirit. They typically are unwilling to respect their adversaries capabilities. They do not try to understand their adversaries. They certainly never attempt to learn from their adversaries. In their offices, a MSS operative or informant might also passively hear them speak poorly of operatives and informants. One might ponder when seeking to insult, ridicule, humiliate, and bully, ever become required aspects of counterintelligence work. Officers of such stripes will typically speak far worse of subjects of investigations. Perhaps they spend so much effort doing down their adversaries, operatives, and informants in order to make up for their own lack of self-esteem.

Ralph Waldo Emerson has been misquoted as stating: “What lies behind us and what lies before us are tiny matters compared to what lies within us.” The correct provenance is Henry S. Haskins in his book, Meditations in Wall Street (William Morrow & Company, 1940). Nonetheless, the adage holds true. Since the errant counterintelligence officers have already proven themselves willing to go so far in the wrong direction for such things, imaginably the affections of a few could still change. Uncovering the nucleus of the wrongful behavior is not the goal, or should not be. The chief feature to be found is some aspect or aspects of the errant officers’ character that can be capitalized upon for MSS purposes. On this particular point, it could be imagined that MSS counterintelligence officers will never cease keeping their eyes open and ears perked up for opportunities. It would be a dereliction of their duty not to do so. From one perspective, it might be assumed that although they have recruited US counterintelligence officers, albeit paltry numbers, they would not bank on catching such breaks on some regular basis. They understand that a usual part of the errant officer’s line of thinking is to have more and to have something better, not to have something different somewhere else. On the other hand, the temptation of easily acquired wealth could be too difficult for some errant officers to resist. Semper avarus eget. (A greedy man is always in need.)

While there is no public evidence that would allow one to allege either engaged in the behavior ascribed to errant officers discussed here while they worked in their respective US intelligence services, the cases of both Kevin Mallory and Rob Hansen provide further support to the idea that US traitors will generally place their own financial gain over their country’s national security and well-being. Mallory’s case was outlined in “Part 1” of this essay. However, adding to what was already relayed from the US Department of Justice criminal complaint stating on May 5, 2017 is the fact that Mallory used a special phone that he received from his MSS handler. With it, he sent the message: “Your object is to gain information, and my object is to be paid for.” In the case of Ron Hansen, mentioned earlier here, prosecutors claim he was paid as much as $800,000 over several years.

Former MSS operative Ron Hansen (above). There is no public evidence that would allow one to allege he engaged in the behavior ascribed to errant officers discussed here when he worked in the Defense Intelligence Agency. However, the case of Rob Hansen, mentioned earlier here, provides further support for the idea that US traitors will generally place their own financial gain over their country’s national security and well-being. Prosecutors claim Hansen was paid as much as $800,000 over several years.

In the case of errant officers, MSS managers may deduce that the pursuit of money would certainly be a weakness to exploit, considering how secure most of them likely feel after being allowed for so long to pursue cunning schemes to acquire personal gain through the system wrongfully. A clever MSS manager could potentially devise a scheme to make them anxiously grab for more. MSS may even apply patience, and decide to approach the errant officer after retirement. In retirement, the money and gifts might have greater meaning for them. For MSS counterintelligence, recruitment of US intelligence and counterintelligence officers, active or retired, with access is always the matter at hand when specifically conducting research on a US counterintelligence officer. Bringing in a US counterintelligence officer is always a huge victory for the MSS and for China. Note that MSS would hardly be the only foreign intelligence service aware of problems in the US apparatus.  However, circumstances may be worse than leaders, senior executives, and managers in some US counterintelligence services might imagine or care about. Again, the caveat must be expressed that the ugly characteristics discussed cannot be attributed to all US counterintelligence officers in the field. However, the point is being made that they have likely been observed enough to convince decision makers in the MSS that officers deployed in the US may act boldly, ubiquitously, voraciously, and with greater intensity everyday in their efforts to collect all technologies China lacks as well as any other information demanded by their masters in Beijing.

The Desultory Pursuit of the MSS by US Counterintelligence

Quidquid dicendum est, libere dicem. (Whatever must be said, I shall say freely.) As noted earlier, the trickle of successes publicly announced are perhaps soothing to an unknowing public, creating the appearance that the US is pushing back on Chinese intelligence operations. However, everything that has been announced has hardly been enough to put the US on track to defeat, disrupt, the networks of the Chinese Intelligence services relative their size and strength in the US.  It would seem that senior executives in the US intelligence, counterintelligence services and law enforcement have not expended much time on pondering the unanswered question of why MSS has proceeded with such confidence in the US. When leaders of civilian US counterintelligence services and law enforcement go as far as to publicly admit lacking a knowledge of how severe an adversaries efforts and successful penetration has been, it almost seems as if they try to convince all that their adversaries were using some sort of witchcraft to accomplish all that they have. However, they are really only discussing symptoms of an illness that is making their organizations sickly and may eventually incapacitate them.

The preceding discussion on errant US counterintelligence officers does not depend upon any detailed inside story. While there will doubtlessly be endless knee-jerk reactions rebuking the expression of this reality, it is nevertheless a reality sufficiently known in the intelligence industry inside and outside the US. The US might have a better chance defeating MSS operations with Chaldean Numerology as long as enough errant counterintelligence officers are discussed here within the system. What has been happening so far concerning leaders, senior executives, and managers of US counterintelligence services is that they usually satisfy themselves by striking a happy medium between stellar work by those officers who are determined to do their jobs right and bring down adversaries’ intelligence operations in the US and the poor performance of others for reasons unknown. Indeed, while problems as those emphasized here concern day-to-day performance in the ranks, leaders, senior executives, and managers will more often look at the overall performance of officers in the organization statistically, by which everything likely evens out nicely.

Where there is some indication of problems being caused by errant officers, supervisors and managers will often compound the wrongdoing of errant officers not only by sitting on their hands on the matter, but by denying and covering it up. Such responses have had their impact. One might imagine colleagues, officers working the same shop, or close, at a workstation neighboring that of the errant officers, passively acquiring information about what they are doing, observing attitudes and behavior might become aware that unseemly and illegitimate activities are afoot in their cases. However, it is also hard to imagine them coming to supervisors or over their managers’ heads knowing how little is actually done to deal with such situations. There is also the potential threat of finding themselves being investigated for being too interested in the work of a fellow officer or in retaliation for trying to make the supervisors, the managers, the office and perhaps even the counterintelligence organization look bad. One might imagine that officers of other counterintelligence services, working the same area of operation, against the same target country, might occasionally get wind of something foul going on in a sister service in activities against an US adversary. However, if not an inquisitive officer’s supervisor, perchance managers would become dismissive or even angered at the news, and express the view that it is neither their organization’s job to point out deficiencies in, nor to investigate, sister organizations. With regard to innocent US citizens being targeted by errant officers, few to none of the fellow case officers or special agents in their respective offices or organizations, upon discovering what is transpiring, will make even the slightest effort to establish the wrongfully targeted citizen’s innocence. The climate is never really right in US counterintelligence organizations to report any wrongdoing. The miracle of the citizen’s rescue will need to come from an external source if that rescue comes at all.

One might imagine that local police departments in large cities in which counterintelligence activity may be taking place might come across some stories of aberrant federal activities given their ears are closer to ground listening to everything than anyone else. It may actually be the case that an innocent US citizen may go into the local police department to complain about odd surveillance activities or the harm of “dirty tricks” being played on them as part of the errant officers false counterintelligence effort. Typically, the local police officers, much as officers of sister counterintelligence organizations, will not desire to get involved, pointing to fact that it is not the responsibility of the local police department to point out deficiencies in, or investigate, federal counterintelligence organizations. In fact, those officers in local police departments, not so worldly wise that they would know to keep their distance from such wrongful activities, might find themselves sucked into them after some convincing by the errant officers. They would perhaps unwittingly make themselves co-conspirators and place their own careers in local law enforcement in jeopardy. Sed quis custodiet ipsos custodes? (But who will guard the guards?)

Each one of these typical and expected responses will with some certainty aid adversaries operating in the US more than one might imagine. The type of counterintelligence officer described here will be stopped by higher authority only if somehow someone shines a great light on their activity that might be seen by the news media or the US Congress. However, no one should count on that as a means to curb such wrongful, wasteful behavior.

The French Emperor Napoleon Bonaparte explained, “In war, three-quarters turns on personal character and relations; the balance of manpower and materials counts only for the remaining quarter.” One must recognize that in any organization, when elements such as good oversight, employee satisfaction, dedication, and motivation, comradeship, an overarching esprit de corps, and mentoring and encouragement from senior leaders who are present on the line, just to name a few, some employees may begin to fall out of step, not in the form of lateness and absenteeism, but drift away from rules and regulations, practices and procedures. Very often, that reality about employee performance can remain unknown to managers and senior executives of the organization. They may only know what is reported on paper and what little they may see. The choice of what to believe is often limited to the most convenient answer. Performance reports, even if read, may contain anything glaring depending on the nature of relationships between line employees and the supervisors; levels of performance may likely be evaluated as nominal generally. In some cases, levels of performance might even exceed expectations. (That was the case with a number of prominent US pharmaceutical companies recently.) After enough time passes, the organization’s policies on how employees are to perform their tasks, that have been crafted with due consideration of how to respond to a variety of seen and unforeseen contingencies, may be matter-of-factly ignored, supplanted by a collection of employee-styled practices that hardly reflect what managers and senior executives originally put in place, want, or should expect. When the organization’s situation looks good enough, and work is certainly getting done to some acceptable degree, a complacency can set in at the top and performance problems can continue to persist for an unimaginably long time until there is some sort of breakdown, perhaps catastrophic. The employee-styled approach, based on what looks good rather than what is good, may offer no answers, no solutions when a crisis ensues at that organization.

The honor system does not work so well in today’s world. Ambition and the need for immediate gratification turn one’s mind to taking short-cuts, bending the rules, to get what is desired quickly. In today’s intelligence industry, which exists in today’s world, too, the threat to the system is not simply disloyalty and defection, founded on corrupted thinking and moral ambiguity similar to that lately found in civilian businesses. There will be those case officers and special agents who, after a time in service, may not want to accept what they are given but take what they believe they deserve. Certainly, not all embody maturity and secure, friendly, unflappable authority as one might expect. Even if those few errant case officers and special agents are able feign the possession of such qualities by emulating their betters. Given enough time, they will find the way back down to their true “Animal House”-level, and disappoint to the fullest. If you take away their gas allowance, stipend for use of privately owned vehicles and other property they may take something else. If you cut reimbursement levels for meals with informants and operatives, they may take something else. If they are not allowed overtime for late night work as meetings with informants and operatives, they may skim off payments to informants and operatives for services rendered. (This particular wrongful practice, embezzlement, has been called “making a extra pension for oneself!”) Certainly, the human mind tends to struggle with the incomprehensible.  However, that should not be the case. Again as mentioned not all civilian US counterintelligence are the same. Others are in cracking form, and work diligently and professionally.

As it directly concerns relations between rank and file with senior executives and managers, much as a virus, those on the beat who begin to act on contemptuous feelings may soon find others to take down the same destructive path. The “us-them” mentality that can develop among those in the field toward managers and bureaucrats in the upper echelons makes the decision of errant, dishonorable officers and special agents to engage in and conceal malfeasance easier, more comfortable. Not to offer an excuse, but such insouciance toward right and wrong at the lower levels may actually be learned by errant officers in their respective organizations. It very likely became inculcated in their organizations perhaps because managers as a practice for years may have turned a blind eye to wrongdoings.

As witnessed during the years of the repugnant US counterintelligence attacks against Presidential Candidate and President-Elect Trump as well as during the attack against Wen Ho Lee, both aforementioned, a private citizen is typically falsely accused and made a subject for investigation with little real evidence except surmisal, animus, or worse bigotry. Management must keep an eye out for that sort of thing. Admonishment from managers and supervisors in both cases expectedly should have been to stick with the primary problem instead of rooting around at extraneous matters. Nothing was done. Apparently, nothing out of the ordinary was happening. Attendant to having a counterintelligence investigation levelled against them, the innocent citizen can become a target for dirty tricks by US counterintelligence organizations and their contractors as well. Further added to the citizen’s problems is the willingness of federal, state, and local counterparts working as a task force on other matters as counterterrorism will usually make their manpower and other resources available to support the efforts of the counterintelligence organization. Regarding the federal case against Carter Page, which was directly linked to the inarguably fraudulent investigation of Trump, it was revealed by investigative journalists and Members of the US Congress that US counterintelligence officers engaged in what is apparently a regular practice of dragging friendly foreign intelligence services and counterintelligence services into their wrongful investigations. Under cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and  inside the US. (Many foreign intelligence services of other countries, particularly medium to small sized organizations actually love being brought into US intelligence operations of any kind. It gives them the opportunity to have a place at the table with the US, there will usually be important lessons learned, supposedly good relationships with US counterparts will be enhanced or created, and most of all, there will be financial benefits courtesy of the US taxpayer.) Once a single individual’s freedom is trodden on, everyone’s freedom is lost! When all of this wrongdoing occurs, every employee’s work in a US counterintelligence organization has less value, meaning, purpose. The organization ceases being a force for good and simply becomes a pit of evil.

Carter Page (above). In the federal case against Carter Page that was directly linked to the inarguably fraudulent investigation of Trump, it was revealed by investigative journalists and Members of the US Congress that US counterintelligence officers engaged in what is apparently a regular practice of dragging friendly foreign intelligence services and counterintelligence services into their wrongful investigations. Under cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and inside the US!

When leaders are delinquent in cracking down on such “malfeasance,” or actual criminality, the dishonorable act as if dishonor is sanctioned. The errant officers engaged in odious behavior would only feel protected by the belief that no one wants to find out whether they are doing their jobs right, and no one will know as long as they keep their activities concealed. When a Procrustean bed of standards and practices exists, deviation from the correct path is essentially assured. Sadly, much damage has been done to US counterintelligence capabilities today as a result of the delinquency of many senior executives and managers over the years. As a result of these ugly situations, counterintelligence organizations have suffered, too, albeit not remotely to the degree of the innocent citizen.

Virtus est vitium fugere, et sapienta prima stultitia caruisse. (To flee vice is the beginning of virtue, and the beginning of wisdom is to have gotten rid of folly.) It is essential that senior executives and managers ensure that all of their line officers are performing their duties correctly at all times and the system is working optimally. They must travel to field offices of their organizations and find out what is really going on. That does not mean going to the offices of the organization to skylark, taking a cursory glance at everything, asking prosaic questions, merely accepting glowing reports of how great every is and being satisfied. That sort of desultory examination would serve no purpose. Instead, with whatever powers they may possess, they must engage in gumshoe detective work to see what they can see. Usually, where there is smoke, there is fire. Embers can serve as evidence of some activity hastily halted or What leaders and senior executives cannot see or confirm with their own eyes during such tours of their respective organization’s field offices, they must use all concrete indicia to conceptualize what may be happening. When everything is right, everything will be gun barrel straight. To be successful in an intelligence or counterintelligence service, a leader must know a lot about humanity. The leader must especially know a lot about human relationships. The leaders have got to know “how people tick.” There are said to be certain secrets and knowledge of human existence, human circumstance. Whatever knowledge a leader of such an organization might possess, full use of it must be made, too, along the lines of excellence. Visits “downstairs” by leaders should not be allowed to devolve into self-serving investigations into their own popularity among line officers and administrative personnel.

As a suggestion, leaders might look through files of officers in search of exorbitant numbers of payouts, massive distributions of gifts, and relatively excessive expenditures on contractors surveillance activities for cases that ended up being marked failed and closed. The errant officers often provide a cloak of legitimacy for unsuspecting eyes is the establishment of cooperative arrangements between their organization and counterintelligence elements of sister organizations to pursue their cases. The fact that money would be coming in from an additional source and that there were managers of other organizations who saw value in the case, would usually be enough to confirm for errant officers’ managers that the decisions, activities, and expenditures by them were viable. Another place for auditors to look in the errant officers files would be code names for both the subjects of investigations as well as informants and surveillance operatives. With the intent of being discreet and not providing a tutorial, suffice it to say that often there will be multiple code names used for one informant or operative. Payments secured for the multiple code names from finance offices may be deposited in multiple personal bank accounts.

Ad mores natura damnatas fixa et mutori nescia. (Human nature ever reverts to its depraved courses, fixed and immutable.) During the Cold War, it was the case in the US Intelligence Community that a highly suspicious senior CIA official, James Jesus Angleton, reigned as the figurative high priest of counterintelligence. He conducted vigorous and plentiful internal investigations against case officers, defectors, and informants, creating a frightful degree of apprehension and insecurity within the rank and file of intelligence and counterintelligence services. This is certainly not a call for a return to those days.

Many members of US intelligence and counterintelligence services and law enforcement would very likely be touchy if they came across the meditations of greatcharlie presented here. However, far more than anything else, those feelings would be due to an emotional response. A manifestation of the thinking that has prevented those organizations from finding what is wrong and being satisfied with the 1870 attitude similar to that of the Supreme Command of the French Imperial Army on the eve of the Franco-Prussian War of debrouillez-vous (“We’ll muddle through somehow”). Those leaders of those organizations are too comfortable living a superficial existence, underestimating their own destiny, dignity, and nature. Ideally, they would be able to put their pride in their pockets and properly see it all as an opportunity to make use of an examination from outside the box as presented by this essay to make real, positive change to greatly improve their capabilities.

Taking simple steps as those mentioned here will do more than anything else to help close the distance between US counterintelligence and the MSS to allow for the leveling of more successful and decisive blows against their networks and operations. Given half the chance, US counterintelligence would perform far better. Given the unforgivable, illegal treatment and great harm civilian US intelligence and counterintelligence services have caused Trump, one would reasonably think that they would attempt to do as much as possible, perform well beyond expectations in the right way, to make amends for their sins. One should not be able to presume comfortably that such thinking is a degree of humanity that may be lacking within the heads and hearts of leaders of the respective organizations. Plus novisti quid faciendum sit. (You have learned more what has to be done.)

The Way Forward

Rapiamus, amici, occasionem de die. (Friends, let us seize the opportunity from (of) the day.) As stated earlier, the fact that the Chinese government initiated all of the ongoing difficulties cannot be credibly argued against. However, very sadly, Beijing so far has not demonstrated any interest in acting voraciously concerning the present matter of the coronavirus. Surely, the two countries are not at a point yet when the dark waters of despair have overwhelmed their leaders. When diplomats from both sides meet, they must approach each other with a certain buoyancy and hope. In the face of that the US, as the true dominant power in the world must maintain its poise. There remains a plethora of bilateral and some multilateral issues of great importance between the US and China that are seemingly distanced enough from all that is happening in the forefront and are in the process of being resolved. There are the issues of: trade, intermediate nuclear weapons, North Korea denuclearization, the border dispute with India, Hong Kong, Taiwan, international terrorism, transnational organized crime, counternarcotics policy, and space. Of course, there are adverse matters that may arise related to the coronavirus that cannot be ignored. The US must not react to them. It must always act in a measured way using effective means, at a time and place of its choosing. For the US Intelligence Community, the political warfare effort tied to the coronavirus being pressed on the US from the Chinese intelligence services may hold primacy on the agenda given the diplomatic and political importance given to it. However, for it, defeating and displacing the networks and operations of Chinese intelligence services in the US, as permanently as possible, is job one.

When unexpected and unfamiliar things are explained the romantic sense of mystery stirred in readers about their nature can be smothered. The world is not always as one would have it. What is required is seeing beyond appearances to what is truth. No one is making a mountain out of a molehill here. Leaders, senior executives of US counterintelligence services might really want to take a deeper look, perform their own empirical studies of the actions of their respective organizations, to discover how other organizations with which they should be cooperating, such as military ones, and how adversaries of the US, likely see their organization. Perhaps the combined sense of sadness, anguish, betrayal, and anger might coalesce to prompt questions about what is really going on in the rank and file.

Reading federal indictments, criminal complaints, and judgments of those caught engaging in espionage for MSS over the past decade, one develops a picture of US counterintelligence having some success intercepting those who had already delivered a considerable amount of classified information concerning US national security equities, projects, strategies, operations, and policies, US tactics, techniques, procedures, and methods and US defenses against foreign intelligence penetration, and of course, cutting-edge technologies had been put in MSS officers’ hands. One can discern US counterintelligence has had great difficulty in devising ways to deter, disrupt, and destroy the intelligence efforts of MSS and other Chinese intelligence services before any secret government information or intellectual property of private firms and academic institutions that is the product of intense and gifted research and development work is lost. What should really be happening is MSS recruitment efforts should be leading over and over to traps. Information to which very costly, devious maneuvers might capture should prove to be cooked and valueless. MSS networks should be regularly penetrated by US counterintelligence, they should be rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. These tacks have been successfully performed to defeat the efforts of foreign intelligence services operating in the US going as far back as World War II.

Perchance the notion of setting out to attain such goals may seem pie in the sky, even Quixotic to those in US counterintelligence who may albeit be tired and uninspired, but such can be accomplished. Such things have been accomplished in the past against other foreign intelligence services under a similar set of circumstances. Smart people are known for being able to find answers to very difficult problems. An immediate thought is that new ideas for achieving such goals might be acquired from new types of sources. A reality about any system is that dogma exists, it can color the thinking of members of an organization, and it can insinuate itself into analysis. Additionally, supervisors in the analytical departments, knowingly and occasionally unknowingly because it would only be human, may place limitations on what directions, albeit even reasonable and logical ones, that analyses can move along. New thinkers may rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Outside the box thinking would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. Well-worn thinking would still have its place in other simpler issues. Hiring individuals for such out of the box assistance should be done with delicacy. There should be a certain exactness about the selection process. Those sought should be already known and possess the ability to present what may be unorthodox innovative, forward-looking perspectives. Hiring eccentric, whimsical, and outlandish thinkers would be unhelpful and undesirable. The projects on which the individuals would work on would be very compartmentalized and limited in scope and duration. The worst possible outcome would be to create some dreadful security problems. (Not that anyone would ask, but alas, greatcharlie’s editor is now a bit too long in the tooth to provide such outside the box assistance.) The actions of the MSS and other Chinese intelligence services, stealing away cutting-edge technologies and research and development, if left unchecked, could cause the US to face a difficult and reduced future. It is not just a scare story, designed to terrify US citizens. That is reality. The choice is to allow a set of unfortunate circumstances against US interests to slowly take shape or act now and begin to shape events in a manner that will ensure the US will retain its place as the world’s leader as time goes on. Deus hæc fortasse benigna reducet in sedem vice. (Perhaps God by some gracious change, will restore things to their proper place.)

As greatcharlie has stated in previous posts, poetry and song provide an emotional vocabulary, putting into words what one may be sensing. When thinking about the out of the box thinkers, but the innocent US civilians and an innocent US President, who have been attacked by errant US counterintelligence officers’ wrongful and detestable investigations, the song “Die Gedanken sind frei” (Thoughts are free) comes to mind. The most popular version was rendered by Hoffmann von Fallersleben in his Schlesische Volkslieder mit Melodien (Silesian folk songs with melodies) collection published in 1842 by Breitkopf & Härtel:

Die Gedanken sind frei, wer kann sie erraten,
sie fliegen vorbei wie nächtliche Schatten.
Kein Mensch kann sie wissen, kein Jäger sie schießen
mit Pulver und Blei: Die Gedanken sind frei!

Ich denke was ich will und was mich beglücket,
doch alles in der Still’, und wie es sich schicket.
Mein Wunsch und Begehren kann niemand verwehren,
es bleibet dabei: Die Gedanken sind frei!

Und sperrt man mich ein im finsteren Kerker,
das alles sind rein vergebliche Werke.
Denn meine Gedanken zerreißen die Schranken
und Mauern entzwei: Die Gedanken sind frei!

Drum will ich auf immer den Sorgen entsagen
und will mich auch nimmer mit Grillen mehr plagen.
Man kann ja im Herzen stets lachen und scherzen
und denken dabei: Die Gedanken sind frei!

Ich liebe den Wein, mein Mädchen vor allen,
sie tut mir allein am besten gefallen.
Ich sitz nicht alleine bei meinem Glas Weine,
mein Mädchen dabei: Die Gedanken sind frei!

(English Translation)

Thoughts are free, who can guess them?
They fly by like nocturnal shadows.
No person can know them, no hunter can shoot them
with powder and lead: Thoughts are free!

I think what I want, and what delights me,
still always reticent, and as it is suitable.
My wish and desire, no one can deny me
and so it will always be: Thoughts are free!

And if I am thrown into the darkest dungeon,
all these are futile works,
because my thoughts tear all gates
and walls apart: Thoughts are free!

So I will renounce my sorrows forever,
and never again will torture myself with whimsies.
In one’s heart, one can always laugh and joke
and think at the same time: Thoughts are free!

I love wine, and my girl even more,
Only her I like best of all.
I’m not alone with my glass of wine,
my girl is with me: Thoughts are free!

China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1)

The Headquarters of the Ministry of State Security (above). China’s primary civilian intelligence service engaged in the political warfare struggle against the US is the Ministry of State Security (MSS). Yet, while fully involved in that work, MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. It has also robustly enhanced another mission of grabbing intellectual property and an array of cutting-edge technologies from the US. This essay provides a few insights from outside the box on the MSS, the tactics, techniques, procedures, and methods, it believes, help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US.

There was a time not so long ago when discussion in US foreign policy circles concerning China centered on issues such as trade, Hong Kong, Taiwan, the South China Sea, North Korean denuclearization, and human rights. Now the primary focus of discussion is the coronavirus. China is where the virus originated and was surely ineptly handled, setting the stage for the current pandemic. How China has responded to the crisis turned pandemic has been a source of curiosity and absolute outrage globally. Despite preening about its own advances in science and medicine, China proved not to be up to the task of handling the outbreak that most experts agree more than likely began disastrously in a Wuhan laboratory. It is difficult to fully comprehend what on Earth went on in the minds of China’s leadership upon learning about their country’s coronavirus epidemic. Shutting down cities and restricting travel was among the means to control the spread among their own citizens but China’s government was quite derelict in ensuring the virus would not break out around the rest of the world. Worse, the Communist Party of China and the National Party Congress were unapologetic and frightfully defensive concerning all discussion of China’s role in what was happening. China very quickly became exercised with the US over the matter. They became particularly warm toward US President Donald Trump. The words of official spokespeople were certainly not seasoned in grace. Although it has found itself in an unpleasant, contentious relationship with the US as a result of its own doing, Beijing has nevertheless effectively doubled-down on the behavior that exacerbated the situation. China’s government spokespeople will most likely continue to assail the global media with waves of distortions. At the same time around the world, the number of people infected by the coronavirus continues to increase, the death toll rises, and the financial loss is being calculated in the trillions. Hopefully, People’s Republic of China President Xi Jinping is well-aware of what is transpiring and has set some type of guidance on just how far this whole cabaret put on by Beijing should go. Numquam enim temeritas cum sapienta commiscetur. (For rashness is never mixed together with wisdom.)

The figurative hammer of the foreign and national security policy apparatus swung by the arm of the Communist Party of China against the US is China’s intelligence services. They are the ones on the front lines of the political warfare struggle. Among those intelligence services, the primary element engaged is the Ministry of State Security (MSS). The Ministry of State Security is the embodiment of the logic that created the Chinese system’s intimidating, authoritarian order and for years has choreographed events to accomplish the Communist Party’s purposes. To that extent, the Communist Party of China has entrusted the defense of “their creation,” the modern Communist Chinese state, to this complex government organization. China has only offered soupçons about the MSS, and even less than that lately. Unless one is engaged in diplomatic, intelligence, defense, military, or law enforcement work, MSS is an elements of the Chinese government with which most outsiders when engaged in their normal business related to China, whether inside the country, in a country near by, or even at home, will have contact, but will often be completely unaware. The ostensible purpose and task of MSS is to defend China against external as well as internal threats. By performing its mission of collecting vital information about China’s friends, allies, competitors and adversaries MSS gives the leadership of the Communist Party of China time to make decisions and space to take action. To that extent, the MSS has adhered to its bread and butter mission of stealing national security and diplomatic secrets with specific regard to the US. However, it has also robustly enhanced another mission of collecting intellectual property and an array of cutting-edge technologies from the US. The Communist Party of China is surely counting upon it to successfully take on China’s adversaries in a large way with a small footprint. Interestingly though, there has been far greater discernment worldwide of MSS political warfare activities than Beijing might have imagined. The immediate implication of that has been the infliction of considerable damage to China’s reputation as a world leader. Veritas nimis saepe laborat; exstinguitur numquam. (The truth too often labors (is too often hard pressed); it is never extinguished.)

This essay does not focus on the political warfare effort by MSS, the nuts and bolts of which are somewhat straight forward, and compressed into summary form in the March 31, 2020 greatcharlie post entitled, “Commentary: Beijing’s Failed Political Warfare Effort Against US: A Manifestation of Its Denial Over Igniting the Coronavirus Pandemic”. It focuses on what the Ministry of State Security (MSS) is and what it does, day-to-day, for China. It is presented in two sections. This section, “Part 1,” provides greatcharlie’s insights from outside the box on the MSS and the tactics, techniques, procedures, and methods it believes both help to keep China secure and help to improve China’s capabilities and capacity to compete and struggle with the US. That discussion is buttressed by a few celebrated and trusted sources. “Part 2” continues that discussion and, without an ax to grind, greatcharlie calls attention to how, over recent years, a number of less-familiar, self-inflicted wounds have hindered the prosecution of a successful campaign by US counterintelligence services against the MSS as well as other Chinese intelligence services. The extent to which those same issues concerning US counterintelligence services have impacted the Trump administration is also touched upon. Without pretension, greatcharlie states that there is no reason for it to believe policymakers and decisionmakers in the White House and among US foreign affairs, defense, and intelligence organizations, would have a professional interest in its meditations on MSS intelligence operations in the US. However, it is greatcharlie’s hope that if given some attention, perhaps in some small way it might assist those who work on matters of gravity in this province improve their approach to defeating and displacing the MSS networks and operations as well as those of its sister organizations in the US. Bonus adiuvate, conservate popular Romanum. (Help the good (men) save (metaphorically in this case) the Roman people.)

People’s Republic of China Chairman Mao Zedong (left) and Kang Sheng (right). After the defeat of Imperial Japanese forces in China and prior to 1949, the Communust Party of China’s main intelligence institution was the Central Department of Socialism Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces, CDSA became one among a full array of government intelligence organizations that were created to supplement Party-based intelligence services. CDSA would draw information from foreign news agencies and open sources. It was hardly a very rewarding business.

Chinese Intelligence Under the Communist Party: The Beginning

The foundation of the Chinese intelligence services was laid during the revolutionary period in which the Communist Party of China sought to establish its rule. In the early 1930s, two intelligence services existed. One was centered in Shanghai and the Communist Party, the other was based in the Chinese Communist government that existed in Shaanxi where Mao Zedong established his base after the Long March. The later intelligence service proved to be the stronger of the two. By the late 1930s, it was replaced by a newly created Social Affairs Department (SAD) within the Communist Party. Within the years of struggle against Imperial Japanese forces in China, there was the Yan’an Rectification, from 1942 to 1944, in which Mao consolidated his paramount role in the Communist Party of China. Yan’an was also the part of the ten year period in which: Mao established his premier role in the Party; the Party’s Constitution, endorsing Marxist-Leninism and Maoist thought as its guiding ideologies, was adopted (Mao’s formal  deviation from the Soviet line and his determination to adapt Communism to Chinese conditions); and, the postwar Civil war between the Communists and the Kuomintang. Prior to 1949, the Communist Party of China’s main intelligence institution was the Central Department of Social Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces, CDSA became one among a full array of government intelligence organizations were created to supplement Party-based intelligence services. CDSA would draw information from foreign news agencies and open sources. It was hardly a very rewarding business.

The Ministry of Public Security was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. CDSA fell into the hands of Li Kenong, a deputy chief of staff to People’s Liberation Army (PLA) chief of staff Chou Enlai and a vice minister for foreign affairs. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. However, as time passed, it was also officially given jurisdiction over counter subversion, counterintelligence, and conducting espionage in Macau, Hong Kong, and Taiwan. Overseas during the 1950s, most Chinese diplomatic missions accommodated the MPS with an Investigation and Research Office for intelligence collection staffed by CDSA personnel, with analysis performed by the Eighth Bureau, publicly known in 1978 as the China Institutes of Contemporary International Relations. In 1953, CDSA became the Central Investigation Department (CID). In China, the MPS presence was nearly ubiquitous, as it kept a watchful eye on China’s population. It was energetically engaged in monitoring Chinese who returned from abroad. To cope with what it determined to be errant citizens, MPS ran labor reform camps. MPS personnel were known for behaving harshly among its own citizens. That behavior was said to be reflective of the violent mentality of its initial leader, Kang. Despite his alleged romance with Mao’s wife, Kang was far from a charming man. Rather, he was known for being an absolute brute. He would move on to become a member of the Communist Party of China Political Bureau, and Li Kenong moved up to take command there. In 1962, the decision was made to move Ministry of Public Security counterespionage functions over to the CID.

The 1960s were a volatile time for Chinese intelligence services as with all military institutions in China. Li Kenong died in 1962 and in 1966 he was succeeded by Luo Quinchang, who had been adopted by Kang in 1958 and ushered into the MPS. However, the MPS became involved in the power struggles that embroiled the Communist Party during the Cultural Revolution. Mao, feeling his power base was threatened mainly as a result of his failed Great Leap Forward, implemented the “Four Cleans Movement,” with the objective of purifying politics, economics, ideas, and organization of reactionaries, led by a one time ally, Luo Quinchang of MPS. His staff files were seized and mined for candidates for criticism and banishment to the lao jiao prison system.

Kang Sheng (above). The Ministry of Public Security (MPS) was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. As time passed, it was also officially given jurisdiction over counter subversion, counterintelligence, and conducting espionage in Macau, Hong Kong, and Taiwan. MPS personnel were known for behaving harshly among its own citizens. That behavior was said to be reflective of the mentality of Kang, who was known for being an absolute brute.

Most of the leadership of the CID was sent to the countryside for reeducation and the organization, itself, was abolished for a time. Its activities and assets were absorbed by the Second Department of the PLA’s general staff taking over its duties. The Second Department oversaw human intelligence collection to include military attachés at Chinese embassies overseas clandestine collection agents sent to other countries to collect military information, and the analysis of overt sources of information. Mao turned to Kang to ensure that his ideological and security directives were implemented. Kang, Mao’s wife Jiang, Wang Hongwen, Yao Wenyuan, Zhang Chunqiao, dubbed the “Gang of Four,” worked together in a campaign to renew China’s revolutionary spirit. With the assistance of the Red Guards, a mass student led paramilitary movement mobilized and guided by Mao from 1996 to 1967, the Gang of Four set out to destroy the “Four Olds” of society: old customs, old culture, old habits, old ideas. The Red Guards were particularly disruptive. Apparent moral confusion caused the base student army to rise and nearly wreck China by attacking senior Communist Party leaders such as Deng Xiaoping and by conducting mass executions. There were reports that the Red Guards cadres had engaged in cannibalism, eating students. They destroyed approximately 66 percent of China’s famous temples, shrines, and heritage sites. These included nearly 7,000 priceless works of art in the Temple of Confucius alone. The Red Guards would face resistance in major cities. Often the PLA was forced to violently put down their destructive attacks. The organization having fully flown off the rails, Mao instructed leaders of the Red Guards to end their movement.

Meanwhile, Kang had returned to the intelligence service from on high to assume responsibility for the CID cadres that remained left in limbo. Eventually, a new organization, the Central Case Examination Group, composed of CID cadres under Kang was created. That organization was instrumental in the removal of Deng Xiaoping from power. The CID was reestablished in 1971 following the death of Lin Biao and then again became entangled in another power struggle as Hua Kuo-feng and Deng Xiaoping vied for control of the party. By then, Kang had receded into the distance, viewed as too connected to the untidiness of the Cultural Revolution.

Following Mao’s death in 1976, the new leadership under Hua Guofeng initially tried to return to the pre-Cultural Revolution years and strengthen the CID. When Hua Kuo-feng and Wang Dongxing assumed power in 1977, they tried to enlarge the CID and expand the Communist Party of China intelligence work as part of their more general effort to consolidate their leadership positions. However, their hopes and dreams met their fate. Deng Xiaoping, having steadily ascended within the leadership ranks of the Communist Party of China, was uncertain of CID loyalties and his opinion of it was unfavorable. Circumstances indicated that he should order the shut down of all Investigation Offices in Chinese embassies. Although it remained part of the Chinese intelligence services, the CID was officially downgraded. According to Anne-Marie Brady in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the impact of the CID’s downgrade was softened by the fact that its intelligence efforts  were being paralleled and to some degree occasionally outmatched by the extraordinarily secret International Liaison Department of the Communist Party of China, which became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies worldwide.

The emblem of the Ministry of State Security (above). In 1983, there was considerable frustration in the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to the new Ministry of State Security (MSS). Known as the Guojia Anquanbu or Guoanbu, the MSS was stood up in July 1983 to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus.

The Inception of the Ministry of State Security

The story of the Ministry of State Security (MSS) began thoroughly in July 1983. That year, there was considerable frustration in the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to the MSS. Known as the Guojia Anquanbu or Guoanbu, the MSS was stood up to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus. When the reorganization of the MPS was completed in 1983, it was temporarily left with only traditional police functions. Nevertheless, the change turned out to be quite positive as both organizations were allowed a new beginning so to speak. With its inception, MSS added new dimensions to China’s foreign intelligence scheme while freeing MPS to revamp existing capabilities and explore and adapt a new as well as more technological set of cards to play in the intelligence game so to speak. MSS represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers. The cleaning up of old ways of conducting its business, and a modernization of Chinese intelligence that was long overdue.

At its nascent stage, the ranks of the MSS were filled with longtime MPS who transferred over to the office. MSS provincial branches were often staffed with PLA and government retirees. Despite the declaration of its raison d’être as a foreign intelligence organization, the MSS was initially asked to do what its rank and file knew how to do best, which was to perform as police. For that reason, the most important task that it was given after its inception, focusing on students in both China and abroad after the Tiananmen Square protests, was a natural fit. Tiananmen Square, in addition to being frightfully embarrassing to the Communist Party of China leaders, caused them to remain greatly concerned over a possible follow on move by students. That concern was thoroughly evinced when Chinese authorities announced that some 200 Chinese had been accused of spying for the Soviet Union. One might say that the counterintelligence purpose of the assignment made giving it to the MSS plausible. However, MPS had the domestic counterintelligence mission covered. Redundantly taking on the assignment concerning the student–surely MPS was on it–was a turn in a wrong direction. The MSS would eventually develop into an authentic foreign intelligence service, but it would take time. It would be an evolutionary process.

An ocean of student protesters in Tiananmen Square in May 1989 (above). At its nascent stage, the ranks of the MSS were filled with longtime MPS who transferred over to the office. MSS provincial branches were often staffed with People’s Liberation Army and government retirees. Despite the declaration of its raison d’être as a foreign intelligence organization, the MSS was initially asked to do what its rank and file knew how to do best, which was police work. For that reason, the most important task that it was given after its inception, focusing on students in both China and abroad after the Tiananmen Square protests, was a natural fit. The protests, in addition to being frightfully embarrassing to the Communist Party of China leaders, caused them great concern regarding a possible follow-on move by students.

As aforementioned, a paucity of quality information exists publicly from the Chinese government about the present-day MSS in primary or secondary sources. No official Chinese government website exists for the intelligence organization. There have been no press releases distributed or press conferences held by the organization’s public relations department. Access to information from the organization is essentially nonexistent. No significant writings have been published  by security scholars in China on the MSS. Precious few defections from MSS have occurred, so little has been provided from an insider’s view. What is best known generally about MSS in the US has been superbly relayed in I.G. Smith’s and Nigel West’s celebrated Historical Dictionary of Chinese Intelligence (Rowman & Littlefield, 2012).

The MSS headquarters is located in Beijing in a large compound in Xiyuan, on Eastern Chiang’an Avenue, close to Tiananmen Square. Within the security perimeter is snowing apartment block, Qian Men, where many of the MSS staff and their families live. The MSS is a civilian intelligence service and operates independently from the People’s Liberation Army General Staff Second and Third Departments, which also conduct military intelligence and counterintelligence operations. Although it has a central headquarters, the MSS actually was not built up as a centralized organization. It is composed of national, provincial, and local branches much as the MPS from which it sprang. Even the initial CDSA and later CID units of the MPS operated domestically under a decentralized and autonomous structure throughout China that was supported by the Communist Party of China. Their structure somewhat resembles that of the erstwhile regional and Soviet republic KGB bureaus. The provincial, and local branches receive directives from headquarters in Beijing and are financed by National Security Special Funds. Yet, only to the extent that provincial and local branches receive “administrative expenses,” could they be considered accountable to headquarters. They are largely autonomous in reality, reportedly acting as essential adjuncts to the local administration. The formal chief of the MSS holds the title Minister of State Security. As of this writing, the minister is Chen Wenqing. However, from the national level to the local levels, the MSS and its subordinate departments and bureaus report to a system of leading small groups, coordinating offices, and commissions to guide security work while lessening the risk of politicization on behalf of Communist Party of China leaders. Initially, the most important of these was the Political-Legal Commission (Zhongyang Guoja Anquan Weiyuanhui). The Political-Legal Commission was chaired by a Politburo member at the Central level with the title Secretary, who serves essentially as China’s security czar. There are Deputy Party Secretaries at the lower levels. The lower-level commissions oversee all state security, public security, prisons, and procuratorate (judicial) elements for their levels. Currently, there is a Secretary of the Central Political and Legal Affairs Commission (Zhengfawei) who oversees China’s security apparatus and law enforcement institutions, also with power reaching into the courts, prosecution agencies, police forces, paramilitary forces, and intelligence organs  Xi announced the creation of the Central State Security Commission (CSSC) in the Third Plenary Session of the Eighteenth Party Congress in November 2013. The CSSC held its first meeting on April 15, 2014. The purpose of this new commission was twofold. First, it was intended to balance internal political power created by the expansion of the security services and their capabilities in the 2000s. Second, the commission orient’s the MSS and other security forces toward planning and preempting threats to the party-state. At lower levels, provinces, counties, and municipalities have state security leading small groups (Guoja Anquan Lingdao Xiaozu). The political-legal Commissions and State Security leading small groups overlap in personnel but not perfectly. They combine with defense mobilizations committees and 610 offices to create a kind of system of systems that oversees local security and intelligence work. Headquarters is surely kept apprised of what the provincial and local branches are doing. Each level reports to the next MSS level up and the Political-Legal Committee at that level. This florid arrangement of horizontal and vertical relationships often creates bureaucratic competition that encourages pushing decisions upward while hiding information from elements of equal protocol rank.

Intellect, will, and hard earned experience drove MSS leaders forward as they molded the MSS into a truly effective intelligence organization. What compelled the domestic focus of its initial work is further apparent in that process. The first two ministers, Ling Yun and Jia Chunwang, faced the challenge of turning a small Ministry with only a handful of outlying provincial departments into a nationwide security apparatus. The expansion occurred in four waves. In the first wave during MSS’ inaugural year, the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai were created. A second wave appeared shortly thereafter between 1985 and 1988, including Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang. The third wave from 1990 to 1995 completed the expansion of the Ministry across at the provincial levels, bringing in Anguilla, Hunan, Qinghai, and Sichuan provinces. The fourth wave the provincial-level departments exoanded vertically, taking over local public security bureaus or established subordinate municipal or County bureaus. The MSS policy of expanding representative offices in most major towns and cities was reversed in 1997. Nevertheless, when MSS minister Jia left in 1998 for the MPS, the MSS was a nationwide organization at every level. Presently, the MSS’ thirty-one major provincial and municipal sub-elements. Interestingly, as MSS moved through each growth spurt, it did not ignite efforts to rename the organization, to divide it into pieces and parcel out some of its departments among other Chinese intelligence services, or to disband it altogether in the way CDSA and MPS suffered in the two previous decades. There seemed to be an understanding system wide that the need existed for a solid civilian foreign intelligence as well as counterintelligence capability.

The Wuhan Hubei National Security Office in China, home of the provincial Ministry of State Security Bureau (above). The expansion of MSS provincial departments occurred in four waves.  In the first wave, during MSS’ inaugural year, the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai were created. A second wave appeared shortly thereafter between 1985 and 1988, creating the Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang bureaus. The third wave from 1990 to 1995 completed the expansion of the Ministry across at the provincial levels, bringing in Anguilla, Hunan, Qinghai, and Sichuan provinces. The fourth wave the provincial-level departments expanded vertically, taking over local public security bureaus or established subordinate municipal or County bureaus. Presently, the MSS has thirty-one major provincial and municipal sub-elements.

As relayed previously, MSS was initially staffed with personnel drawn largely from the MPS. Many local MPS officers transitioned overnight from being police to MSS officers. The MSS foreign intelligence capability was built up when intelligence cadres from the Communist Party of China were brought into its ranks. The new MSS was also funded in part by the MPS. The fact that MSS, in a similar way to MPS, established provincial offices, which operated under cover names, such as “Unit 8475,” has been completely uncloaked and was made fairly well-known courtesy of the Historical Dictionary of Chinese Intelligence. To help MSS take on its mission, MPS passed some networks to the new organization. Yet, with some uncertainty that existed as to the political nature of MSS, MPS was reportedly reluctant to make such transfers. Weariness and disappointment was also apparently felt among some of the old MPS professionals who opted to move to the MSS. While there were far greater opportunities for foreign travel, the financial side-benefits of working closely with industry were no longer available to them.

Employment on the MSS staff continues to hold considerable social status and is generally thought of as a desirable career. MSS intelligence officers are usually recruited before or during their university education, and a large proportion are graduates of the China Institutes of Contemporary International Relations (CICIR), the Beijing Institute of International Relations, the Jiangnan Social University, or the Zhejiang Police College. Those requiring technical skills usually attend the Beijing Electronic Specialist School. These establishments provide training for MSS recruits, who usually come from families with MSS links or otherwise are influential and beneficiaries of guanxi. Nevertheless, however well connected the candidates are, they will have to be dedicated and disciplined although not yet necessarily Party members. Guanxi is often exercised to facilitate entry into the MSS.

Promotions aee endorsed at both the bureau and headquarters levels. Senior branch positions require the approval of the local administration, although, in practice, the will of headquarters usually goes unchallenged. The quality of performance during the information war over the coronavirus pandemic will also likely play a considerable part in future promotion. Interestingly, although thoroughly part of the MSS, branch personnel are regarded as employees of the local government. More than half the MSS staff recruitment takes place in the region’s where the officers will be posted for the breath of their careers and where they have family links. Those family links are quite important. This structure enables the MSS to fulfill the increasingly large responsibility of ensuring social stability, considered a significant operational priority. There is no equivalent to this system in the West. Training takes place in the branches. There are no centralized, formal training academies, and new personnel are expected to learn their profession on the job by reading old and current operational files, by working with mentors, and attending occasional lecturers and conferences. Expectedly in the Communist country, during training, a heavy emphasis is placed on political indoctrination, and although probably less than 15 percent of MSS staff are women, they tend to be almost entirely Communist Party of China members. Internal transfers, and secondments are routine and occur mainly from the law and political departments of local government. There a tacit understanding that one could find a home in the MSS with all of the care and comfort imaginable during and after active service.

Mao (left) and Soviet Premier Joseph Stalin (right). Immediately following Mao Zedong’s Communist forces defeat of General Chang Kai-shek’s Kuomintang Nationalist forces, China and the Soviet Union stood as the two prominent Communist countries. Soviet Premier Joseph Stalin saw the victory in terms of Soviet interests, however Mao, saw the Communist Revolution in China as an achievement of the Chinese people. Despite reservations, Mao welcomed assistance from Moscow in the form of physical aid but experts and advisers. Soviet intelligence officers assisted the burgeoning Chinese intelligence service with the intention of creating a capable, parallel organization in a “brother” Socialist country, with hope of exploiting it to the greatest degree possible. However, cooperation that was established between Chinese and Soviet intelligence services ended with the split between Chinese and Soviet leaders.

Residual Impact of Soviet Intelligence Upon Chinese Intelligence?

Naturally, the once significant impact and influence of the Soviet intelligence service on Chinese intelligence has faded more and more with the coming of each new generation into the system. Yet, fragments from that past past still remain. Immediately following Mao Zedong’s Communist forces defeat of General Chang Kai-shek’s Kuomintang Nationalist forces, China and the Soviet Union stood as the two prominent Communist countries. Soviet Premier Joseph Stalin saw the victory in terms of Soviet interests, however Mao, saw the Communist Revolution in China as an achievement of the Chinese people, and to that extent was only interested in formulating the best path to Socialism for China. Mao had held reservations about overlaying China with the Soviet model, but nonetheless welcomed assistance from Moscow in the form of physical aid but experts and advisers. Nevertheless, an agreement was established between Mao and Stalin to have a Soviet advisory mission providing physical aid and significant guidance and advice on nearly all aspects of government. Concerning intelligence, Chinese and Soviet services liaised significantly and comfortably. Soviet advisers used their own service as a model to structure the organization, staffing, training, intelligence operations, and resources of Chinese intelligence services. In the end, Chinese intelligence services mirrored those of the Soviets. It became an effective tool for China’s security. What happened with the Chinese also happened with intelligence services of Eastern Bloc and other Communist governments’ intelligence services in the late 1950s. However, also much as in the Eastern Bloc, Soviet intelligence officers assisted the burgeoning Chinese intelligence service with the intention of creating a capable, parallel organization in a “brother” Socialist country that Soviet intelligence could exploit to the greatest degree possible.

Consequently, for decades after World War II, the Chinese intelligence service, even without Soviet direction, evinced some organizational and operational aspects similar to those of the Soviet intelligence services of the past. To that extent, the KGB has remained a fully useful yardstick from which one could measure, understand, and conceptualize the structure and functions of the Chinese intelligence services as they evolved. Interestingly, the period in which Chinese intelligence services received advice and closely liaised the Soviet counterparts was also a period of evolution of Soviet intelligence. As soon as one intelligence organization was opened for business in the Soviet Union, it was replaced by another with added responsibilities. Those organizations included: Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs) or NKVD; 1938-1946, Narodnyi Komissariat Gosudarstvennoe Bezopasnosti (People’s Commissariat for State Security) and Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs) or NKGB-NKVD, placing police and security functions under one chief; and, 1946-1953, Ministerstvo Vnuirennikh Del (Ministry for Internal Affairs) and Ministerstvh Gosudarstvennoe Bezopasnosti (Ministry for State Security) or MVD-MGB. Eventually, in 1954, all of the non-military security functions were organized in what was dubbed the Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or the KGB. It was under odd circumstances that Soviet intelligence services would identify themselves as models for those of other countries to follow. Interestingly enough, there was a lesson for the Chinese to take away from that period of the growing pains felt by Soviet intelligence services. In effect, the evolution of the Chinese intelligence services was inevitable if it was to meet the evolving needs of the leadership in a changing world. Without wanting to declare or insinuate some causality, or proffering that there was some curious act of imitation, it must be noted that Chinese intelligence services, following the years of close contacts with the Soviet counterparts, went through a similar period of near continuous organizational and name change.

Cooperation that was established between Chinese intelligence services and Soviet intelligence services could not survive the split between Chinese and Soviet leaders. The cause was gaping differences in outlook. Mao’s perception of the right relationship between the Soviet and Chinese Revolutions was influenced by his profound identification with the Chinese national tradition, which led him to reject conceptions and political lines not sufficiently suited to the mentality of the Chinese people and to their originality and creativity. Such were the sensibilities behind the “Great Leap Forward.” Not even quiet liaison through a virtual cross border masonry between field officers of the two intelligence services would have been allowed.  

Unlike its sister civilian intelligence service, the MPS, the MSS generally appears to have adhered to the non-politicization  of the service. MSS senior executives have evinced an acumen for being clever with politics. Occasionally, they have not been pristine in avoiding any mix up between their true task and purpose and extraneous political matters. Indeed, MSS elements, particularly at local levels, often have provided protection services for the business dealings of Communist Party of China officials or their well-connected friends. The purges of Beijing Party secretary Chen Xitong in 1995 and Shanghai Party secretary Chen Liangyu in 2006 were understood to have involved the ministry. Following the fall of Bo Xilai and Zhou Yongkang, the Beijing State Security Bureau chief Fang Ke and Vice Minister Qiu Jin were ousted in rather widespread purges as a consequence of their use of MSS resources to support certain leaders in their political tussles.

How MSS Is Organized

In terms of operations and functional (administrative) duties, a common understanding has been that MSS is divided into bureaus, each assigned to a division with a broad directive and each bureau is given a specific task. On a Weibo account, reportedly associated with the MSS, a suitable outline of the first 11 bureaus was posted in November 2016. A description of that organizational structure of the MSS is easy enough to find online. The bureaus on that list, along with an additional six bureaus, was discovered on the common yet only moderately reliable source, the online encyclopedia, Wikipedia: Confidential Communication Division: Responsible for the management and administration of confidential communications; International Intelligence Division: Responsible for strategic international intelligence collection; Political and Economic Intelligence Division: Responsible for gathering political, economic, and scientific intelligence from various countries; Taiwan, Hong Kong, and Macau Division: Responsible for intelligence work in Taiwan, Hong Kong, and Macau; Intelligence Analysis Division: Responsible for analysing and reporting on intelligence and collecting guidance on how to handle intelligence matters; Operational Guidance Division: Responsible for directing and supervising the activities of provincial level MSS offices; Counterintelligence Division: Responsible for gathering counterintelligence information; Counterintelligence Division: Responsible for monitoring, investigating, and potentially detaining foreigners suspected of counterintelligence activities. This Bureau is reported to primarily cover and investigate diplomats, businessmen, and reporters; Internal Security and Anti-Reconnaissance Division: Responsible for protecting the MSS from infiltration by foreign entities by monitoring domestic reactionary organizations and foreign institutions; External Security and Anti-Reconnaissance Division: Responsible for monitoring students and institutions abroad in order to investigate international anti-communist activities; Information and Auditing Division: Responsible for the collection and management of intelligence materials; Social Research Division: Responsible for conducting public opinion polling and surveying the population; Science and Technology Investigative Division: Responsible for managing science and technology projects and conducting research and development; Science and Technology Investigative Division: Responsible for inspecting mail and telecommunications; Comprehensive Intelligence Analysis Division: Responsible for the analysis and interpretation of intelligence materials; Imaging Intelligence Division: Responsible for collecting and interpreting images of political, economic, and military targets in various countries through both traditional practices and through incorporation of satellite imagery technologies; and, Enterprises Division: Responsible for the operation and management of MSS owned front companies, enterprises, and other institutions. (Additionally, In 2009, the MSS was reported by a former official to have a Counterterrorism Bureau.)

Since leaving the Central Intelligence Agency (CIA) where he was a highly-regarding analyst on China, Peter Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Among a number of issues, Mattis expressed a view compatible with greatcharlie’s here in a 2012 article, “The Analytic Challenge of Understanding Chinese Intelligence Services” Studies in Intelligence Vol. 56, No. 3 (September 2012) 47, that “Protecting the integrity of US intelligence and policy processes is an important task for the US Intelligence Community, but clear understanding of Chinese intelligence serves more than the CI [counterintelligence] mission. At the core, analysis of Beijing’s intelligence institutions is about trying to understand systematically how the Chinese government uses information to inform its policy formulation, guidance to diplomats and security officials, and the execution of its policies.” Along with a former military intelligence officer and diplomat, Matthew Brazil, Mattis published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant. In covering the web of Chinese intelligence services that engage in intelligence operations, Mattis and Brazil present a great deal about the super secret MSS which one can be sure is cutting edge stuff. For many analysts in defense, foreign affairs, and intelligence worldwide, it presents nothing less than a treasure trove and should find a permanent place in syllabi in college and university courses worldwide for years to come. (Regular reference is made to Mattis’ writings in this essay.)

Mattis and Brazil share the view that MSS headquarters is organized into numbered bureaus. They further explain that it is spread across at least four compounds in Beijing. However, in their assessment, they believe MSS is organized a bit differently than in the outline of its departments aforementioned. They state that at the present, the MSS is believed to possess at least eighteen bureaus. Unlike the People’s Liberation Army  (PLA) where military unit cover designators offer a way to track units, MSS elements, they explain, are not so readily identified. In Mattis’ and Brazil’s own words, “The following designations are ones in which we possess a modicum of confidence”: First Bureau: “secret line” operations by MSS officers not under covers associated with Chinese government organizations; Second Bureau: “open line” operations by MSS officers using diplomatic, journalistic, or other government-related covers; Third Bureau: unknown; Fourth Bureau: Taiwan, Hong Kong, and Macau Bureau; Fifth Bureau: Report Analysis and Dissemination Bureau; Sixth Bureau: unknown; Seventh Bureau: Counterespionage Intelligence Bureau, gathers information and develops intelligence on hostile intelligence services inside and outside of China; Eighth Bureau: Counterespionage Investigation,  runs investigations to detect and apprehend foreign spies in China; Ninth Bureau: Internal Protection and Reconnaissance bureau, supervises and monitors foreign entities and reactionary organizations in China to prevent espionage; Tenth Bureau: Foreign Security and Reconnaissance Bureau, manages Chinese student organizations and other entities overseas and investigates activities of reactionary organizations abroad; Eleventh Bureau: China Institutes of Contemporary International Relations,  performs open source research, translation, and analysis. It’s analysts also meet regularly with foreign delegations and spend time abroad as visiting fellows; Twelfth Bureau: Social Affairs or Social Investigation Bureau, handles MSS contributions to the United front work system; Thirteenth Bureau: Network Security and Exploitation (also known as the China Information Technology Evaluations Center (Zhongguo Xinxi Anquan Ceping Zhongxin) may manage the research and development of other investigative equipment; Fourteenth Bureau: Technical Reconnaissance Bureau conducts mail inspection and telecommunications inspection and control; Fifteenth Bureau: Taiwan operations linked to the broader Taiwan Affairs work system. It’s public face in the Institute of Taiwan Studies at the China Academy of Social Sciences; Sixteenth Bureau: unknown; Seventeenth Bureau: unknown; and, Eighteenth Bureau: US Operations Bureau for conducting and managing clandestine intelligence operations against the US.

Chairman Deng Xiaoping (above). Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Chinese industry needed to retain a competitive edge. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government. They receive intelligence collected by Chinese intelligence services. They undertake commercial espionage for their own benefit as well.

Intelligence Targets of Today’s MSS

Having created the space and acquiring the flexibility over the past few decades to allow the service to evolve into the elite, very capable intelligence service the Communist Party of China originally wanted it to be, it would seem MSS senior executives and managers have now figuratively declared “game on!” to China’s competitors and adversaries. The mission, as originally intended, has not changed much since 1983. Overall, it is now defined as collecting solid intelligence from the inner workings and the very top of foreign military, diplomatic, political, economic, financial, scientific, educational, media, communications, and social institutions. That is primarily what Beijing wants and that is what MSS is chasing after. Its tactics, techniques, procedures and methods are surely more refined. By conventional wisdom, one would proffer that as a priority, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. Infiltration of these operations by an adversary as China would certainly have far-reaching implications for US national security. Although the PLA would most interested in US military equities in its region and elsewhere in and around Asia, the MSS would expectedly support that work by collecting what it could on the instruments that the US uses to make conventional war and nuclear war. The intelligence threat China has posed to US national security further extends overseas, as China’s foreign intelligence service seeks to infiltrate the systems of US allies and partners. This particular aspect is seen as potentially having grave implications for US alliance stability and the security of US national defense information. Lately, the chief feature of the intelligence war between the US and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its victims.

Deng Xiaoping and the Emphasis on Economic Espionage

Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. The Communist Party of China’s aim was to raise the country’s gross domestic product by 7.5% annually for the next five years. In order to achieve such rapid economic growth, However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Further, the increased demand for raw materials such as oil and iron ore, and new environmental and labor laws led to cost increases, making manufacturing in China more expensive which caused some factories to close. China sought to diversify its economy, for example, through the manufacture of better made high end products. However, that diversification of the economy required the Chinese to increase their knowledge of design and manufacturing processes. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government, and receive intelligence collected by Chinese intelligence services. Those firms have also proved to be capable of engaging in commercial espionage themselves.

During the administration of US President Barack Obama, economic espionage by Chinese intelligence gained real traction. Startled US government officials began to sound the alarm particularly over the destructive impact of Chinese commercial espionage upon US national security. Intrusions by Chinese actors into US companies and other commercial institutions harm both the individual companies and the overall US economy, to the benefit of China. Indeed, in July 2015, Bill Evanina, who was the National Counterintelligence Executive in the Office of the Director of National Intelligence, and remains in that position as of this writing, stated point blank, “Economic security is national security.” Nevertheless, the vociferous statements of those tasked with China’s operations had no real effect on the Obama administration’s course and Chinese intelligence activities steadily intensified. The leadership of the Communist Party of China has not concealed the fact that they recognize the link between economic and national security, and its commercial and national security espionage efforts function in tandem to exploit it.

US Attorney General William Barr (above). The present US Attorney General William Barr is both troubled and angered by China’s espionage efforts against the US and he intended to defeat those efforts. Barr insists China is working to supplant the US as the leader in technology in all areas, by literally stealing away the future of the US. He explains that to accomplish that, China has continuously sought, through a variety of clandestine ways, to grab whatever about US technologies,  developmental practices, and manufacturing practices. Barr wants the US business community to accept these realities and become part of the answer. In making deals with China, US businesses are often selling out their own long-term viability of us companies sold out for short term gain. As dangerous, China has been able to cultivate relationships with their employees and recruit them for spying.

US Attorney General William Barr, in a June 21, 2020 interview on FOX NEWS “Sunday Morning Futures,” proffered that the US for decades has been a leader in technology. China would like to overcome US dominance in the field. To that end, China has been stealing all us technologies developmental practices, manufacturing practices. Barr stated: “The way I look at is, this is a fundamental challenge to the United States. Since the late 19th century, our opportunity and our growth, our prosperity as a country has come from our technological leadership. We have been the technological leader of the world. In the last decade or so, China has been putting on a great push to supplant us, explicitly. They want to be the leader in all the future technologies that are going to dominate the economy. And so what’s at stake is the economic opportunity of our children and our grandchildren, whether we can continue to be the technological leader of the world. The Chinese have embarked on a very aggressive program during this time of stealing and cheating in order to overtake us. They have stolen our intellectual property. When they steal our secrets about future technology, they’re stealing the future of the American people.”

Barr left no doubt that China was quite some distance from competing fairly. He insisted that it was the intention of the Trump administration to put a halt to China’s very open efforts at robbery. Barr explained: “The Chinese efforts run the gamut from more traditional espionage of recruiting people to work for them, explicitly, to cultivating relationships that they are then able to use. And the people frequently are not completely attuned to the fact that they are being used as essentially stooges for the Chinese. So, it runs the gamut of things. And, sometimes, some of these programs, high-sounding programs, are used to the advantage of the Chinese.” Barr expressed concern over how educational programs have been used by Chinese intelligence services to penetrate US academic institutions and take away the knowledge, training, and research offered for use in China’s efforts to overwhelm the competitive edge the US possesses. Barr explained: “We are clearly cracking down on researchers and others that are sent over here to get involved in our key technological programs. And, by the way, this is not just weapons systems. This is agriculture. This is medicine. This is robotics. This is artificial intelligence and so forth. It’s the whole gamut of important technologies going forward.”

Dimensions of MSS Intelligence Collection

In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three more apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Assuredly, the illicit procurement of specific technology by MSS is executed through the use of Chinese front companies. It is a relatively soft approach to intelligence collection, but it has had a devastating impact. According to Mattis in his 2012 article, “The Analytic Challenge of Understanding Chinese Intelligence Services” cited earlier here, FBI analysts reported that over 3,200 such companies had been quietly set up as fronts for intelligence collection purposes. Other relative short-cuts in espionage included tasking scholars, and scientists to purchase information before they travelled to countries that possessed targeted technologies. MSS has also encouraged Chinese firms to buy up entire companies that already possessed the desired technology.

With regard to the cyber attack, it is perhaps the most prolific type of attack against industry in the US, EU, and within other advanced industrialized countries. This dimension of Chinese intelligence collection is perhaps the most aggressive, and hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running human agents. It is simply another dimension of China’s campaign. Moreover, countries such as the US provide such a target rich environment for the MSS, if human intelligence were the only focus, constraints on manpower resources would always be a big problem to overcome.

By far, the most complex and risky dimension of MSS intelligence collection are its human intelligence operations. Least challenging are MSS operations in China. No resource constraints hinder the MSS in terms of both manpower to use against foreigners there. The efforts of foreign counterintelligence services typically face great limitations in terms of ways and resources to stem Chinese efforts against their foreign intelligence colleagues on the ground. The close proximity of other countries in the Far East would appear to make operating in these countries easier, too! Difficulties begin when tries to take a bite out of more advanced industrialized countries in the region. Japan, for example, has historically been a difficult country for Chinese intelligence services to operate within. Against Japanese targets, attempts to cultivate operatives and informants still occur, but a greater reliance is surely placed on technical collection by MSS. Outside of its region, in target rich US, EU Member States, and other advanced industrialized countries, even the Russian Federation, Chinese intelligence services as a whole initially some difficulty figuring out how to go about approaching a target using officers. They would also naturally be concerned over facing considerably stiffer resistance from more adept counterintelligence services such as those of Japan. Interestingly, as time went on, they managed to find a number of sweet spots from which, and methods with which, they could conduct human intelligence collection operations with some degree of success. Lately, it seems to have been easy enough for Chinese intelligence services to establish networks of operatives and informants, and reportedly even sleeper agents, in the US, placing them in locations from which they could do considerable harm.

Collection through Front Companies and Operatives

As mentioned, a very quiet approach to intelligence collection is ubiquitous and pernicious form of inteloigence collection operations in the US. Most US citizen can look direct at the activities of what appear to be benign companies and not observe or discern that it is firm of foreign attack against their country. With little threat of being discovered, Chinese front companies set up where they can best acquire companies, technologies, brain power in the form of students, and even intelligence operatives and informants. Some US firms that have unwittingly linked themselves to seemingly innocuous, but actually nefarious institutions in China, business, academic, scholarly, or otherwise, that are tied to the government, particularly the Chinese intelligence services, may often have Chinese intelligence operatives working out of them, thus providing a convenient cover for their activities. In July 2019, a federal grand jury in Chicago indicted Weiyun “Kelly” Huang, a Chinese citizen, on fraud charges, charging her with providing fake employment verifications. A grand jury indicted her two companies, Findream and Sinocontech, on charges of conspiracy to commit visa fraud. The two companies incorporated by Huang did not exist, except on paper. Federal authorities allege the Findream and Sinocontech were front companies used to provide false employment verification for Chinese students, convincing immigration officials that they were here legally. Huang made use of a website based in China, chineselookingforjob.com, and the China-based “WeChat” platform, as well as Job Hunters of North America, to recruit for her companies. Court records explain that over 2,600 Chinese students declared themselves as employees for either Findream or Sinocontech from September 2013 to April 2019. In a bungling oversight Huang claimed to have employed so many young people that according to a 2017 US Immigration and Customs Enforcement list, Findream and Sincocontech ranked among the top US-based companies that hired students under the federal Optional Practical Training program. Findream ranked number 10, just behind Facebook. Sinocontech ranked number 25, just behind Bank of America. Surely, that served to call some attention from US counterintelligence services to its activities. Tragically, on LinkedIn, it is indicated that great numbers of graduates from schools from around the country wrote in their online biographies that they were employed by either Findream or Sinocontech as data analysts, web developers, consultants and software engineers. Huang compiled approximately $2 million from the alleged fraud scheme. Prosecutors state that the citizen of the Communist China indulged herself lavishly in Neiman Marcus, Louis Vuitton, Prada, Chanel, Hermes, and other luxury retail stores.

In a September 2018 criminal complaint from the US Department of Justice, Ji Chaoqun, a Chinese citizen, was charged with one count of knowingly acting as an agent of a foreign power, China. While Ji was still in school in China, an intelligence officer from the Jiangsu State Security Department, a provincial bureau of the MSS, approached him at a recruitment fair. They recruited Ji and tasked him with gathering biographical information on eight naturalized, ethinc-Chinese, US citizens after he arrived in Chicago to begin his studies. Reportedly, Chinese intelligence wanted to recruit those individuals, most of whom “worked in or were recently retired from a career in the science and technology industry, including several individuals specializing in aerospace fields.” Ji performed the task of collecting the information. After graduating with a master’s degree in electrical engineering from the Illinois Institute of Technology in 2015, he remained in the US through a temporary work program known as Optional Practical Training. That program allows international students to stay for up to two extra years if they have earned degrees related to science, technology engineering and mathematics. After Ji graduated with a master’s degree in electrical engineering in 2015, he remained in the US through a temporary work program known as Optional Practical Training. The program allows international students to stay for up to two extra years if they have earned degrees related to science, technology engineering and mathematics. Ji stated that he was employeed as a software engineer for a company called Findream LLC. According to court records, Ji’s responsibilities included writing “well designed, testable, efficient code by using best software development practices.” Although Findream was advertised as a startup technology company based in Mountain View, California, the company did not exist, except on paper. In April and May of 2018, the FBI made clandestine contact with Ji via an undercover agent. During the May meeting, Ji revealed that he was first approached by the MSS. In October 2017, email and MSS messages exchanged between the MSS officer and Ji were uncovered by the FBI.

Technical Intelligence Collection and Cyber Attacks

MSS technical collection can include the use of high-tech tools covering phone calls and all forms of messaging to relatively low level actions against electronic equipment such as mobile phones and computer networks. While technical intelligence collection, cyber attacks by Chinese intelligence services upon targets in the US, have been deplorable, the skill displayed and their list of accomplishments has been impressive. What have essentially been standard targets of cyber attacks from Chinese intelligence services in recent years have been those levelled against US national security decision makers and government organizations, particularly during the Obama administration. The objective of that targeting has been to access any classified information they might possess. Through that information, MSS would surely hope to develop insight into highly sensitive US national security decision making processes. Several instances of such cyber attacks have been made public, among them: in 2010, China reportedly attempted to infiltrate the email accounts of top US national security officials, including then Chairman of the Joint Chiefs of Staff Admiral Mike Mullen and then Chief of Naval Operations Admiral Gary Roughead; in July 2015, the US Office of Personnel Management announced that hackers had extracted personnel records of roughly 22 million US citizens. The hackers were reportedly affiliated with the MSS. Some of the stolen files contained detailed personal information of federal workers and contractors who have applied for security clearances. Among the information extracted were the fingerprints of 5.6 million people, some of which could be used to identify undercover US government agents or to create duplicates of biometric data to obtain access to classified areas; and, in May 2016, the then Director of National Intelligence James Clapper stated there was indicia supporting a concern that foreign actors had targeted the 2016 US Presidential Campaigns with cyber operations. Those foreign actors plausibly included Chinese intelligence services, as well as actors in the Russian Federation and other countries. During the 2008 US Presidential Election, evidence existed that indicated China infiltrated information systems of the campaigns of then Senator Barack Obama and Senator John McCain. The experience gained and the lessons learned by MSS in those cyber operations primarily against national security and political targets during the Obama administration allowed for a rapid development of the organization’s cyber warfare capabilities and capacity. Rather than figuratively apply the law of lex talionis and a bit more to knock MSS back on its heels, defensive actions and push back by the Obama administration was so slow and so frightfully slight that the MSS was allowed the space and the time to even ratchet up its cyber game. An indictment unsealed in October 2018 revealed that US was made aware of at least a portion of MSS directed cyber operations aimed at swallowing up technologies researched and developed by firms in the US and other advanced industrialized countries.

In October 2018, the US Department of Justice unsealed charges leveled on 10 Chinese nationals, alleging a persistent campaign by Chinese intelligence officers and their recruits to steal aerospace technology from companies in the US and France. In a thoroughly complex operation, from January 2010 to May 2015 a provincial bureau of the MSS, the Jiangsu Province Ministry of State Security (‘JSSD”), headquartered in Nanjing, China, conspired to steal sensitive commercial technological, aviation, and aerospace data by hacking into computers in the US and other advanced industrialized countries. According the indictment, MSS officers managing the operation included Zha Rong, a Division Director in the JSSD, Chai Meng, a JSSD Section Chief, and other MSS officers who were not named. Both Zha and Chai supervised and directed human intelligence and activities by one or more members of the conspiracy aimed at hacking into the computers of targeted firms that were used in and affecting interstate and foreign commerce and communications, and steal information, to includie intellectual property and confidential business data, and to use these companies’ computers to facilitate further computer intrusions into other companies.

As for their computer savvy MSS operatives, Zhang Zhang-Gui, a computer hacker who operated at the direction of the JSSD, tested spear phishing messages and established and maintained infrastructure used in multiple intrusions. Zhang also coordinated hacking activities and shared infrastructure with Liu Chunliang, a fellow computer hacker who operated at the direction of the JSSD, and coordinated the activities of other computer hackers and malware developers, including Gao Hong Kun, Ma Zhiqi, and an identified unindicted co-conspirator (‘UCC-1″). Among his activities, Liu established, maintained and paid for infrastructure used in multiple intrusions, deployed malware, and engaged in domain hijacking in connection with the intrusion of a San Diego-based technology company. The hacker Gao Hong, who operated at the direction of Liu and was an associate of Zhang, engaged in the computer intrusions into Capstone Turblne, a Los Angeles-based gas turbine manufacturer and an Arizona-based aerospace company. Ma Zhiqi, also mentioned, a computer hacker who operated at the direction of LIU, was a personal acquaintance of Liu and UCC-1 as well. Zhuang Xtaowei, a computer hacker and malware developer, who also operated at the direction of Liu, managed malware on an Oregon-based aerospace supplier’s systems and stole the firm’s data from no earlier than September 26, 2014, through May 1, 2015. On February 19, 2013, one or more members of the conspiracy hacked into a second French aerospace company’s server affiliated with Liu, using credentials Liu had provided to Ma on December 14, 20L2. Gu Gen, the Information Technology Infrastructure and Security Manager at the French aerospace manufacturer with an office in Suzhou initially mentioned, provided information to JSSD concerning the firm’s internal investigation into the computer intrusions carried out by members of the conspiracy while under the direction of an identified JSSD intelligence officer. Tjan Xi, an employee of the same French firm who also worked in its Suzhou office as a product manager, unlawfully installed Sakula malware on a computer of the firm at the behest of the same unidentified JSSD Intelligence Officer.

In July 2020, the US Justice Department indicted two Chinese nationals, Li Xiaoyu and Dong Jiazhi (above), for participating in a decade-long cyber espionage campaign that targeted US defense contractors, COVID researchers and hundreds of other victims worldwide. Experience gained and the lessons learned by the MSS in those cyber operations primarily against national security and political targets during the Obama administration allowed for a rapid development of the organization’s cyber warfare capabilities and capacity. Rather than figuratively apply the law of lex talionis and a bit more to knock MSS back on its heels, defensive actions and push back by the Obama administration was so slow and so frightfully slight that the MSS was allowed the space and the time to even ratchet up its cyber game.

In July 2020, the US Justice Department indicted two Chinese nationals, Li Xiaoyu and Dong Jiazhi, for participating in a decade-long cyber espionage campaign that targeted US defense contractors, COVID researchers and hundreds of other victims worldwide, stealing terabytes of weapons designs, pharmaceutical research, software source code, and personal data from targets that included dissidents and Chinese opposition figures. The 27-page indictment alleges that both Li and Dong were contractors for the Guangdong State Security Department of the MSS. Prosecutors also allege that the MSS, prosecutors said, supplied the hackers with information into critical software vulnerabilities to penetrate targets and collect intelligence. The indictment mostly did not name any companies or individual targets, but The indictment indicated that as early as January 2020, the hackers sought to steal highly-valued COVID-19 vaccine research from a Massachusetts biotech firm. Officials said the probe was triggered when the hackers broke into a network belonging to the Hanford Site, a decommissioned US nuclear complex in eastern Washington state, in 2015. US Attorney William Hyslop in public statement on July 21, 2020 emphasized that there were “hundreds and hundreds of victims in the United States and worldwide.” Indeed, their victims were also located in Australia, Belgium, Germany, Japan, Lithuania, Netherlands, South Korea, Spain, Sweden and the United Kingdom. The MSS has been known to utilize contractors for its cyber espionage operations. Clearly, MSS is not adverse to putting its faith in the young hackers to compromise security and deeply penetrate US systems to steal untold amounts of information. Integrating contractors in its cyber espionage operations allows the MSS access a much desired wider pool of talent. Under China’s National Security Security Law, they obligated to serve the needs of the government of course with some remuneration, a point which will explained later in this essay. To some degree, it provides some plausible deniability of the hackers work against some countries, but as demonstrated by this case it provides MSS a limited shield from US capabilities. Li and Dong both studied computer application technologies at the University of Electronic Science and Technology of China, in Chengdu. As a modus operandi, Dong would research victims and find potential methods of remotely breaking into computer systems. Li would then compromise the networks and steal the information. The truth is rarely pure and never simple in the intelligence arena, so it remains uclear whether US counterintelligence, following the indentification of these hackers and their activities, has managed to neutralize them and set up satisfactory defenses to prevent further Interference by MSS hackers. Oddly enough, there was some benefit gained by Beijing, knowing or unknowningly the Communist Party of China, to the extent that the hackers are young and ingenious, making them relatable to contemporaries and even younger people fascinated by Internet technology inside and outside of China. Presumably, Li and Dong still reside safely in China.

MSS Human Intelligence Collection

As human intelligence collection in the field is perhaps the most complex dimension of MSS operations, it is presented here in greater detail than those aforementioned. It has been generally understood in the West for some time that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections (guanxi) and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use.

In August 2020, Alexander Yuk Ching Ma (above), a 15-year veteran of the CIA and a former Chinese linguist in the FBI’s Honolulu Field Office, was charged with violating US espionage laws. It has been generally understood in the West for some time that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of technology and data. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use.

In August 2020, Alexander Yuk Ching Ma, a 15-year veteran of the CIA and a former Chinese linguist in the FBI’s Honolulu Field Office, was charged with violating US espionage laws. According to court documents, twelve years after he retired from the CIA in 1989, Ma met with at least five MSS officers in a Hong Kong hotel room, where he “disclosed a substantial amount of highly classified national defense information,” including facts about the CIA’s internal organization, methods for communicating covertly, and the identities of CIA officers and human assets. After providing that information to MSS officers in March 2001, Ma and a relative that assisted him, also worked for the CIA, were paid $50,000. Prosecutors were not full aware of how much Ma was paid the MSS following the initial payment. They are aware, however, that Ma returned from one trip to China with $20,000 and a new set of golf clubs. In an effort to gain access additional sensitive information, Ma secured a position in 2004 as a contract Chinese linguist for the FBI. He used his new position and security clearance to copy or photograph classified documents related to guided missile and weapons systems and other US secrets and passed the information to his Chinese intelligence handlers. In 2006, Ma arranged for his wife to travel to Shanghai to meet with his MSS contacts and pass a laptop to them. (Interestingly, Mao’s wife was not named in the criminal complaint.) The FBI eventually saw Ma straight and according to court documents, special agents intercepted Ma using an undercover FBI employee posing an MSS officer conducting an audit of his case. The undercover operative also claimed to be tasked with looking “into how Ma had been treated, including the amount he had been compensated.” In a clandestine video recording a of a meeting with the FBI undercover operative, Ma is seen counting $2,000 in cash the operative gave his supposedly to acknowledge his work on behalf of China. Ma, who was born in Hong Kong, is recorded saying that he “wanted ‘the motherland’ to succeed” and admitted that he provided classified information to the MSS and that he continued to work with some of the same intelligence officers who were at the 2001 meeting. Prosecutors stated that the relative of Ma, who assisted him, is now 85-years-old and suffers from “an advanced an debilitating cognitive disease.” Given that mitigating circumstance, he was not charged.

In February 2019, Zhao Qianli, a 20-year-old Chinese national, pleaded guilty in court for taking photos of the US Naval Air Station Key West in Florida. He received a sentence of one year in prison. Zhao came to the US as an exchange student, however, the record of his activities indicates that the young operative was not in the US to just brush up his English. When Zhao was actually arrested in September 2018, investigators discovered photos and videos of government buildings and an antenna field on his digital camera and smartphone. Eyewitnesses saw Zhao ignore a sign clearly indicating the area was restricted and walk directly toward the antenna field and take photos. Although Zhao had actually studied in a summer exchange program that ended in September 2018, his is visa had already expired when he was arrested. In his defense, Zhao alleged that he was just a tourist who got lost. By successfully denying that he was engaging in espionage, Zhao avoided being expelled from the US, persona non grata, but that did not prevent his prosecution for taking photos in a prohibited place. Court documents indicate none of the photos and videos found on his cell phone and digital cameras were of any tourist attraction sites in Key West. Reportedly, Zhao was in touch with Chinese intelligence officers inside the US before he took photographs at the base. During his interrogation, Zhao told the FBI that he was the son of a high-ranking Chinese military officer and that his mother worked for the Chinese government. The fact that the young spy was tasked to take photographs at an extremely high security location with the great risk of being detained perhaps meant that there was a certain urgency to collect the information. (With so many internal political squabbles remaining largely unknown, it seems odd that the young man would be sent on a near Kamikaze mission into the figurative dragon’s lair, knowing that there was better chance than not that he would be caught, very likely causing some embarrassment for his father and mother.)

In February 2019, Zhao Qianli, a 20-year-old Chinese national, pleaded guilty in court for taking photos of the US Naval Air Station Key West in Florida. He received a sentence of one year in prison. Zhao came to the US as an exchange student. Travellers businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections (guanxi) and the potential threat of alienation from the homeland. Particularly with regard to students, Chinese intelligence agencies often use the “flying swallow” plan, whereby overseas Chinese students who serve as spies work with a single contact in China—just as swallows pick up only one piece of mud at a time to build their nests. The students do not have their personal files inside China’s intelligence system, so if they are caught, there is little information to be revealed.

As this approach has resulted in a reasonable degree of success, and MSS officers could continue to capitalize on a cultural and language affinity, a preconception had actually developed in the minds of interested parties in the US that the MSS would continue to take that course. Support could also found for that view looking at the success of MSS in Taiwan, with its ethnic Chinese population. Most recently, in May 2020, Taiwanese authorities detained Major General Hsieh Chia-kang, and a retired colonel, Hsin Peng-sheng, for allegedly passing classified defense information to China. Hsieh once served as the deputy commander of the Matsu Defense Command and had overseen the Air Defense Command when apprehended. He reportedly had access to the specifications for the US-made Patriot missiles as well as the Taiwanese Tien-kung III and Hsiung-feng 2E cruise missiles. Reported, Chinese intelligence officers recruited Hsieh’s comrade  Hsin with all of stops out while he was in China, leading a Taiwanese tour group. Hsin, a former colleague, allegedly first approached Hsieh about working for Chinese intelligence. According to the prosecutors, Hsieh traveled to Malaysia and Thailand to meet his handlers. The indications and implications of Hsieh’s pattern of travel are that he may have been working for Chinese intelligence since 2009 or 2010. In addition to collecting and passing classified materials, both Hsieh and Hsin agreed to assist Chinese intelligence in spotting and recruiting other sources.

In March 2010, Wang Hung-ju, who was arrested because of his connections to an espionage case. Wang was a former official in the Special Service Command Center in the National Security Bureau, and served for a short period as the bodyguard for Taiwanese Vice President Annette Lu before retiring in 2003. The Taiwanese press repeatedly reported that Wang was uncovered as part of the investigation of a Taiwanese businessman, Ho Chih-chiang. MSS intelligence officers, plausibly from the MSS bureau in Tianjin, recruited Ho in 2007 and used him to approach Taiwanese intelligence officials. Ho’s handlers instructed and empowered him to offer money and other inducements to recruit serving officials. Supposedly, Ho was in contact with Wang, which led to his travelling to China where he was recruited by the Tianjin State Security Bureau. Wang reportedly attempted to recruit two friends into his intelligence network, including an officer in the Military Police Command. While the shift to recruiting a broad base of foreign recruits in China was an important step in the evolution of Chinese intelligence, the process still had its limitations. Nearly all foreign-born operatives were recruited within China, rather than their home countries or elsewhere.

Retired Taiwanese Major General Hsieh Chia-kang (center) MSS officers continue to capitalize on a cultural and language affinity in the recruitment of ethnic Chinese worldwide. Most recently, in May 2020, Taiwanese authorities detained Major General Hsieh Chia-kang, and a retired colonel, Hsin Peng-sheng, for allegedly passing classified defense information to China. Hsieh once served as the deputy commander of the Matsu Defense Command and had overseen the Air Defense Command when apprehended. He reportedly had access to the specifications for the US-made Patriot missiles as well as the Taiwanese Tien-kung III and Hsiung-feng 2E cruise missiles.

However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method. One can better estimate how active and well MSS officers and operatives are performing by who has been recently caught among their recruits and what they have been discovered doing.

In April 2020, Candace Claiborne, a former US Department of State employee, pleaded guilty to conspiracy to defraud the US. The criminal complaint against her alleges that Claiborne, having served in a number of posts overseas including China and having held a top-secret security clearance, failed to report contacts with suspected intelligence officers from a bureau of the MSS. Claiborne’s MSS handler used the cover of operating an import-export company with a spa and restaurant on the side. The MSS tasked with collecting and passing information on US economy policy deliberations and internal State Department reactions to talks with China. They more specifically told Clairborne that her reporting on US economic policy was “useful but it is also on the Internet. What they are looking for is what they cannot find on the Internet.” In accord with her instructions, prosecutors claim Claiborne provided copies of State Department documents and analysis. In return, Claiborne and a co-conspirator received “tens of thousands of dollars in gifts and benefits,” including New Year’s gifts, international travel and vacations, fashion-school tuition, rent, and cash payments.

In May 2019, Kevin Mallory was charged under the Espionage Act with selling US secrets to China and convicted by a jury last spring. In May 2020, sentenced to 20 years in prison; his lawyers plan to appeal the conviction. Mallory’s troubles began in 2017 when his consulting business was failing and he was struggling financially. In early 2017, prosecutors said, he received a message on LinkedIn, where he had more than 500 connections. It had come from a Chinese recruiter with whom Mallory had five mutual connections. That recruiter, Michael Yang, according to the LinkedIn message, worked for a think tank in China, the Shanghai Academy of Social Sciences and was interested in Mallory’s foreign-policy expertise. Mallory was deployed to China for part of his career and was fluent Mandarin. The message led to a phone call which led to Mallory boarding a plane for Shanghai to meet Yang. Mallory would later tell the FBI he suspected that Yang was not a think-tank employee, but a Chinese intelligence officer, which apparently was okay by him. Yang was an MSS intelligence officer. Mallory’s visit to China initiated an espionage relationship with the MSS by which he received $25,000 over two months in exchange for handing over government secrets. Reportedly, the FBI eventually caught him with a digital memory card containing eight secret and top-secret documents that held details of a still-classified spying operation.

Kevin Mallory (above). Mallory was charged in May 2019 under the Espionage Act with selling US secrets to China. In targeting ethnic-Chinese for recruitment, MSS found itself simply working on the margins. The method was too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. In early 2017, prosecutors said,  Mallory received a message on Linkedin from a Chinese recruiter, who allegedly worked for the Shanghai Academy of Social Sciences and was interested in Mallory’s foreign-policy expertise. He was actually an MSS intelligence officer. Other communications led to Mallory’s visit to China and the creation of an espionage relationship with MSS. When the FBI eventually caught him, he possessed a digital memory card containing eight secret and top-secret documents with details of a still-classified spying operation.

In the wild kingdom, ambush predation, a behavior displayed by MSS officers in the instances just presented, works well instinctively for many animals, but it requires possessing an innate patience. The prey must enter a well-set trap of some kind. The haul of victories will be determined by how target rich the environment in which the trap set is with the prey the predator wants. Increasing the number of those targets would mean becoming proactive, going out a hunting that desired prey down. Thus, in the third and most recent step in the evolution of Chinese intelligence, MSS officers have become willing to recruit agents while abroad. The risk was greater, but the potential fruits would be greater, too! According to Mattis, the new approach was first identified by Sweden in 2008, when its intelligence services and law enforcement determined Chinese intelligence officers operating out of the Embassy of the People’s Republic of China in Stockholm, had recruited a Uyghur émigré to spy on fellow émigrés inside as well as outside of Europe. German intelligence and counterintelligence services identified a second instance in 2009, alleging the existence of a spy ring controlled by a Chinese intelligence officer operating out of the Consulate of the People’s Republic of China in Munich.

Once determined to go after even a broader pool, MSS naturally thought strongly about collecting intelligence with might and main throughout the US. A smattering of examples MSS operations a decade later uncovered by US intelligence and counterintelligence services and law enforcement provides an ample sense of that. Fast forward three years and one will discover how successful Chinese human intelligence penetration has been at some of the finest academic institutions in the US: in January 2020, the chair of Harvard’s Department of Chemistry and Chemical Biology, Charles Lieber, was alleged to have violated federal law by failing to disclose his involvement in China’s Thousand Talents Plan to Harvard administrators, who allegedly then passed along false information to the federal government. Lieber was reportedly paid more than $1 million by China in exchange for agreeing to publish articles, organize international conferences and apply for patents on behalf of a Chinese university; in December 2019, a Chinese Harvard-affiliated cancer researcher was caught with 21 vials of cells stolen from a laboratory at a Boston hospital; in August 2019, a Chinese professor conducting sensitive research at the University of Kansas was indicted on charges he cloaked his links to a university in China; and, in June 2019, a Chinese scholar at the University of California, Los Angeles was convicted of shipping banned missile technology to China. The National Counterintelligence Executive, Evanina, has explained, “A lot of our ideas, technology, research, innovation is incubated on those university campuses.” He further stated, “That’s where the science and technology originates–and that’s why it’s the most prime place to steal.” However, MSS does not limit itself to seeking big things from big places such as Harvard. Desired information on national security matters can be found just about anywhere in the US. Consider, in April 2016, a Florida woman was charged by the US Department of Justice, in an 18-count indictment for conspiracy to illegally export systems, components, and documents on un-manned underwater vehicles, remotely operated vehicles, and autonomous underwater vehicles to China.

Selecting Prospective Recruits

Visits to China by foreigners may be viewed by Ministry of Tourism as opportunity to display China’s cultural richness and advancements in all areas. The MSS would only characterize those visits by foreigners as intrusions into China. The foreigner, to them and their sister intelligence, counterintelligence and law enforcement organizations, will always represent a potential threat. MSS could only imagine exploiting the situation by seeing opportunities to recruit new operatives. Commonly acknowledged among experts in this province is that domestically, the MSS exercises responsibility for the surveillance and recruitment of foreign businessmen, researchers, and officials visiting from abroad. The MSS Investigation Department surveillance of dissidents and foreign journalists is often quite obvious. It is supported by more clandestine measures taken by state ministries, academic institutions, and the military industrial complex. The various Chinese intelligence services can identify foreigners of interest in China through a number of means such as trade fairs, exhibitions, and business visas. Once identified, an intelligence officer using a cover may try to develop a friendship or business friendship often using lavish hospitality and flattery. The Chinese intelligence services have also been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. Sometimes efforts will be made via social media to spot potential recruits. A variety of ploys will be used to get to the target to travel to China where the meat and potatoes of the recruitment process will get underway.

In the current environment, US citizens especially will be closely investigated by a provincial MSS office. That kind of investigation would not be conducted with a view to recruit immediately. For the MSS, it was important to construct a psychological profile of a person, his political orientation, his attitude towards his home country and towards the country he was visiting for some reason. What is very clear about the recruitment of foreign operatives and informants by the MSS in China is that rigor is used in the selection process. The ostenibly way MSS to determine whether a foreign official should be targeted would be to investigate whether they ticked certain boxes through evaluating their actions and other information available. Among those boxes were likely the following examples: standing and influence within his organization, access to required information; standing and influence own people given position; standing and influence among specific people given position and access to decision making process and required information; and, the ability to provide secure access to information for MSS officers.

The likes and dislikes of the target and observed particular appetites of the target that may have left the door open to manipulation by seduction or blackmail are vigorously investogated. If a file secreted from the target organization can be collected by MSS agents in a position to grab it. It would be copied or stolen and included in the target’s file. A background that included an exceptional interest in China, left-leaning sympathies, and even affiliation with Socialist or Communist groups would make the target even more attractive for MSS to recruit for China’s case and the Communist Revolution. Particularly useless are observations and “insights” that merely verify generalizations, derivative, or even bigoted preconceived ideas about the target. After accumulating a sizable amount of material using plain observation, clandestine contacts and conversations, and use of a suite of technical tools for audio- and video-surveillance of the places of residence, all the information is analyzed and conclusions are reached on it. A decision is then made about transforming the investigation into a recruitment. The MSS officer who attempts the recruitment in China will exploit whatever has been collected about the target. Information acquired while the recruitment is underway will also be made available to the officer and his manager. The MSS officer will appeal to the target’s discretion. Ideally, the target wil be led to voluntarily agree to work for MSS. However, under exigent circumstances, compromising materials might be used, however, in this day and age it is hard to determine what behavior is recorded would qualify as compromising–”Goodness knows, anything goes!.”

The same rigorous selection process of operatives and informants would be used overseas as in China. By the time of their recruitment of a target, MSS would be fully aware of their recruits’ particulars. Productive operatives are a true sign of a successful recruitment. Sometimes, the prospective recruit will be asked to travel to another country where MSS officers will more formally bring in the target and introduce him or her to the world of espionage. Additionally as in China, the objective of an overseas recruitment may not always be collection. The goal can also be to educate a foreigner, conveying a favorable image of China and how it represents the best future for the world.

Within the Chinese intelligence services, the belief is that foreigners lack the strength of connection, patriotism, that Chinese have for their country is dogma. With ethnic Chinese émigrés, the belief is that the strength of their connection to China can be exploited. For decades the line emanating from Beijing has been that the people of the West for that matter are rich, sick, and filthy. With specific regard to the US, world’s chief superppwer, a guiding idea in China’s geopolitical and geostrategic struggle with it has been that the US is terminal empire. The belief that the US is collapsing from within flourishes despite the country’s decades long record of economic success and steady ascent. In current times, Beijing’s line has become nuanced to express the view that the US is spiraling downward under the weight of racism endemic to all institutions and neo-fascism. To that extent, the liberal democracy is suffocating on its own self-aggrandizement. China sees its quest for dominance over the US further aided by the fact that the US citizen, in the face of an ever encroaching China, would prefer to enjoy an easy life, a lazy existence, and would hardly be concerned with providing any resistence. So far, MSS has been able to add one successful recruitment after another to its tally.

The Minister of State Security, Chen Wenqing (above). The male MSS officer deployed from Beijing Headquarters or a provincial bureau who one might encounter in the US will not appear as a run of the mill joe. He or she will be well-spoken, well-mannered, well-minded, well-built, well-dressed, well-groomed, and well-knowledged, certainly leaving a target well-impressed. Their comportment resembles that of the MSS Minister Chen Wenqing, seen above. All of that is done to have an added impact among targets that they are dealing with someone special, becoming part of something special, and doing something special. However, shrewd MSS managers are aware that taking a “one size fits all” approach to doling out assignments to recruit and run agents in the field would be self-defeating. Managers, when resources are available will consider which officer on the team would best be able to recruit the target and complete the task at hand. While one target may respond well to the gun barrel straight male MSS officer with a commanding presence, another target may be assessed to be likely more responsive to a female officer with a lighter touch.

Some Specifics on How It Is Done: The MSS Officer on the Beat in the US

Based on information gleaned from defectors, MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. Having stated that, it is also very likely that far greater numbers of MSS officers as well as officers from the PLA and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. More often than not, they operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial.

Possunt quia posse videntur. (They are able because they appear able.) The MSS officer deployed from Beijing Headquarters or a provincial bureau who one might encounter in the US will not appear as a run of the mill joe. He or she will be well-spoken, well-mannered, well-minded, well-built, well-dressed, well-groomed, and well-knowledged, certainly leaving a target well-impressed. All of that is done to have an added impact among targets that they are dealing with someone special, becoming part of something special, and doing something special. MSS is results oriented, and that is always foremost in the minds of good managers. Actions taken will never be perfunctory, and situations should not be forced. In the field, operating against an opponent, nothing can be thought of as too trivial to disregard. After being read-in on reports, must let nothing escape a manager’s consideration. Every target for recruitment is unique, requiring some nuance. Thus, shrewd managers in MSS are aware that taking a “one size fits all” approach to doling out assignments to recruit and run agents in the field would be self-defeating and counterintuitive. Managers, when resources are available will consider which officer on the team would best be able to recruit the target and complete the task at hand. While one target may respond well to the gun barrel straight male MSS officer with a commanding presence, another target may be assessed to be likely more responsive to a female officer with a lighter touch. That might make the target more comfortable and easier to handle once the collection process begins. This is not any reference to sexual enticement or manipulation. Rather, the touch of a female officer may prove more effective. For some operatives, the female officer may be able to effectively take a “motherly approach,” comforting them and making them more responsive. Having stated that about female officers, in some cases, it may be discovered after the initial approach that a woman may prove to be, for a variety of reasons, too intimidating for a target and make the interaction difficult and likely unsuccessful. The target may simply hold a bias against women, and perhaps may find working for a woman disagreeable. Such are the realities of human interactions.

Among scientists, technicians and engineers, it may be the case that the target would be best approached by a more compatible, “bookwormish,” reserved and understanding officer, who can connect with the target not only on a professional level, being able to discuss technical details of information sought and the work in which the target may be engaged, but on a social level, perhaps having many of the same interests as the target. In every case though, the main pitch to the target would include something along the lines that Just as humanity has no nation, science has no nation. The line that would soon follow is how China would be the dominant power and be the country to lead humanity to excellence and so on.

As mentioned earlier, possessing a diverse team of male and female officers for operations is not likely to be the case for most MSS managers operating under either official cover or non-official cover. For this reason, it has become necessary for MSS to seek to the cooperation of scientists, technicians and engineers from other government branches or civilian enterprises who would be directed to attend lectures, conferences, conventions trade shows and the like, and make contact with targets and establish an interaction that could lead to passing the target of to an MSS officer or actually engaging in the tradecraft necessary to recruit the target and manage the target’s activities, use tradecraft to collect information procured and provide requirements collection and solutions to problems.

For an intelligence officer recruiting agents, speech is everything. Word choices must build confidence, create trust, console, assure, inspire, and comfort. To create compliant agents, the right word choice must be made every time. Some submission of operatives and informants to the words of the officer must take place, causing the operatives and informants to put aside what they may know or imagine and accept the new knowledge the officer puts before them. While of course in reality, all operatives and informants are being manipulated and corrupted by their foreign intelligence officer handlers, a relationship akin to a teacher and student or mentor and mentee is established in optimal cases. As in those sort of relationships, the operative or informant becomes the responsibility of the officer. Further, as in such relationships, it should be the hope of the officer that the operative or informant perfirms superbly and exceeds all expectations.

The less certain the recruit is about the objective truth, the more likely the individual will be drawn to a false reality. Many who are successfully recruited ultimately would believe that their actions were humanitarian contributions to peace. It is very unlikely that the operative will ever know the degree to which that furtive bit of information he or she is stealing will support any nefarious plans the officer and his country may have cooked up for the US or another country. That is always thrown into the bargain. The MSS officer’s relationship with the operative is only professional. Friendship is established due to necessity. All appearances will be false. Intriguingly, the intellects of the majority of recruits are unable to confound insincerity. Targets of MSS recruitment indeed often fail to realize that if it were not for the officer’s need to collect information from, or pass the Communist Party of China-line to, the operative, the officer would hardly have anything to do with anyone of such character that they would willingly betray their own homeland. The only reality for the recruit is that they are being molded, groomed to do nothing more than committing treason at the behest of a hostile intelligence service of a foreign country. It is all certainly not some childish parlor game. Quid est turplus quam ab aliquo illcieli? (What can be more shameful than to be deceived by someone?)

In a number of cases in the US in which economic espionage has occurred identified as having a Chinese nexus, indications were that nontraditional actors have been used in Chinese intelligence operations for quite some time. Just how many nontraditional actors are in a position and willing to serve the interests of the Chinese intelligence services could only be known based on intercepted information, informants working for US intelligence and counterintelligence and after they may be activated to collect information or materials. A conversation on the margins of a professional gathering that begins with innocuous banter. There could be a clandestine contact, an email or letter, sent to the target requesting to discuss a matter in the target’s field to assist with the writing of an article or book, to assist with academic or other scholarly research, or to discuss a grant or prize from an overseas nongovernmental organization of some type. The next contact, if any, might include leading comments or questions on technical matters or one’s work, might appear odd. That would be an almost sure sign that the inquisitive interlocutor, if not simply socially inept, was probing. If the target had even the slightest awareness of the efforts of Chinese intelligence services to recruit spies, it is at that point the individual should realize that he ir she is in a bad situatupion and break that contact immediately. If the MSS officer notices that the target realizes his or her the questions were compelled by more than a thirst for knowledge and does not run, the officer knows he may have hooked his fish.

As part of their tradecraft, MSS officers would prefer hole-in-corner meetings with prospective recruits in small, quiet locations such as cozy, dimly lit establishments, conversing over coffee or tea, perhaps a dash of brandy or even a bite to eat. It would be far better site for a furtive discussion than some crowded establishment or a spot nearby some busy thoroughfare. Other sites usually selected are hotel rooms, gardens, and parks. The MSS will also want to have an unobstructed view of passersby and other patrons to at least determine whether observable surveillance activity is being directed upon the meeting. The MSS officer will want to eliminate as many distractions as possible as he or she will want to focus wholly of communicating with the prospective recruit and have reciprocate with the same level of attention. The officer will want to analyze the individual close-up and personal and every response to his or her remarks. If a full-on recruitment effort is not made right away, everything will be done to establish a close association for the moment with the target. The figurative “contracted specialist,” will engage in similar activities, and much as the MSS officer, would also try to become a close associate of the prospective recruit. Much as an intelligence officer would be, the contracted agent would doubtlessly be placed under the close supervision of an MSS manager most likely operating under non-official cover, but potentially under officer cover. If a prospective “contracted specialist” left no doubt in the minds of MSS officer that he or she would be unable to perform the more hands-on job of recruiting operatives and informants, they might be called into service to “spot” experts at professional gatherings or even at their workplaces who MSS desires or to collect information from available databases and files there.

The Tianjin State Security Bureau (above). The thirty-one major provincial and municipal sub-elements of the MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations, taking into account that they perform mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus are now essentially small-sized foreign intelligence services. They are given considerable leeway to pursue sources. In Mattis’ view, that independence accounts for variation across the MSS in terms of the quality of individual intelligence officers and operations.

Overseas Espionage by the Provincial Bureaus: A Dimension within the Human Intelligence Dimension

It is important point out that although the bureaucratic center of gravity may reside in its Beijing headquarters, in a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations, taking into account that they perform mostly surveillance and domestic intelligence work. These provincial state security departments and municipal state security bureaus are now essentially small-sized foreign intelligence services. They are given considerable leeway to pursue sources. In Mattis’ view, that independence accounts for variation across the MSS in terms of the quality of individual intelligence officers and operations. He further explains that unless specific units are referenced, reality will contradict general assessments. The indication and implication of this is that defeating MSS efforts in the US will require a broad-based strategy that accounts for the scale of the intelligence organization and compartmentation.

The Shanghai State Security Bureau (SSSB) has surfaced in several US espionage cases. The record its uncloaked operations leaves no doubt that SSSB is constantly looking for opportunities to collect foreign intelligence. It was actually SSSB intelligence officers that approached Clairborne and requested that she provide information on US economy policy deliberations and internal State Department reactions to talks with China. It was SSSB that recruited Mallory. It was SSSB that approached a freelance journalist focused on Asian affairs received SSSB requests for short, interview-based papers related to US policy in Burma, US contacts with North Korea, and US talks with Cambodia related to the South China Sea. Away from the US, in a case involving South Korean diplomats in Shanghai, a Chinese woman, in exchange for sex, requested and received telephone and contact information for senior South Korean government officials. Beyond government documents, the woman also used her influence to help Chinese citizens acquire expedited visa approvals to South Korea. SSSB reportedly blackmailed a Japanese code clerk working in the Japanese Consulate in Shanghai in 2003 and 2004 over his relationship with a prostitute. Allegedly, the illicit relationship began at a karaoke parlor that may have been owned by the SSSB and that catered to Japanese diplomats and businesspeople. Once the code clerk in the grips of the SSSB, its intelligence officers demanded background information on Japanese diplomats posted to the consulate and the schedule for diplomatic pouches going back to Tokyo. Counterintelligence plays a key role in SSSB efforts, too! When the SSSB blackmailed the Japanese code clerk, the organization reportedly asked him to name all of the Chinese contacts of the Japanese consulate in Shanghai.

Other evidence available indicates the SSSB is responsive to the global needs of the MSS and China’s central decision makers. A job announcement errantly circulated publicly around Shanghai universities in 2015, encouraged students who spoke English, Japanese, German, French, Russian, Taiwanese, or the languages of China’s recognized minorities to apply to the SSSB. Mattis proffers that the request for those specific language skills are suggestive of foreign-intelligence targets, counterintelligence coverage of foreigners inside China, and domestic intelligence work for monitoring the party-state’s internal enemies. The job announcement also emphasized that skills in information security, computer software programming and telecommunications as being desirable. In its recruitment efforts, SSSB benefits from a local pool that includes some of the best universities in China, including Fudan and Shanghai Jiao Tong. Shanghai’s universities, think tanks, businesses, and modern infrastructure draw a large, high-quality pool of foreigners from which the SSSB can recruit operatives. Shanghai Jiaotong University, one of China’s most prestigious universities, has been linked to military thefts in cyberspace, leaving open the possibility that such students also might seek work with state security. Admittedly, the job announcement did not describe whether such skills were required in technical support or operational positions. A recently-passed intelligence law prescribes “[combining] open work and secret work” in intelligence operations. Thus, SSSB capabilities very likely exceed human-intelligence operations to include computer network operations.

As the Historical Dictionary of Chinese Intelligence revealed it to be the pattern within the provincial departments  and municipal bureaus, the SSSB leadership appears to come from within the bureau or at least the MSS. The current bureau director is Dong Weimin, who has run the organization since 2015. Unlike the Beijing State Security Bureau’s leadership, service in the SSSB unlikely provides for upward mobility to other parts of the MSS. The directors of the Beijing State Security Bureau regularly move into the MSS party committee and become vice ministers. The most notable among these are Qiu Jin and Ma Jian. The only example of an SSSB director promoted upward in recent memory seemingly is Cai Xumin. He led the SSSB from 2000 to 2004, when he was promoted to MSS vice minister. Cai would return to Shanghai to serve as the city’s deputy procurator in late 2006.

Away from the economic espionage and technology theft in particular, MSS officers regularly have operatives engage in something akin to a Hollywood depictions of “secret agent spying” by taking photographs of restricted areas, gaining entry into restricted areas, and collecting documents, materials, and other property from a restricted area. Those types of activities are perhaps more commonplace that most ordinary citizens might believe. It is only after an MSS officer is captured, or officer of another Chinese foreign intelligence service such as the Second Department of the PLA, that they are made aware that such activity is taking place. Greater awareness that is occurring is the only chance of thwarting suspicious activity when it occurs. When Chinese nationals engaged in such activity are occasionally captured, usually found in their possession is a cache of surveillance equipment. There is typically so much that it evinces the agent believed, with a high degree of confidence that he or she would be able to act without relative impunity in or around a targeted restricted area. It may also very well have been the precedence of previous success spying on the site that helped fashion that notion. Despite the regularity of such activity, the use of MSS officers to recruit agents to do the dirty work of spying has been a fruitful approach.

MSS Informants: Motivations

Attendant to any discussion of the use of actual research scientists across the spectrum of advanced technologies as operatives, as surrogates for MSS officers in the field, would be the discussion of civilian informants and responsibilities of Chinese citizens under China’s National Security law. In the West there usually would be a variety of motivations for citizens to more than likely violate their own Constitution to engage in surveillance and higher levels of activity on behalf of US intelligence and counterintelligence services and law enforcement. Against a foreigner, they might see it as a Patriotic duty. To surveil another citizen might cause pangs of dismay anxiety for there would be the real possibility of violating the 1st Amendment and Fourth Amendment rights of a fellow citizen under the US Constitution. Sadly the motivations of money ideology, conspiracy, and excitement, as well as a healthy dose of indifference will often cure any anxieties or nervousness about another citizens Constitutional rights. Different from Western democracies, however, for the Chinese citizen, such motivations do not factor in such a decision to come to call of their country’s intelligence services. The law requires them to do so. If any motivations at all could be said to factor in a Chinese citizen’s decision to obey the direction of the intelligence service, expectedly the Communist Party of China would list faith and adherence to the ideals of the Communist Revolution, the Communist Party of China, patriotism, the homeland. Supposedly, revolutionary zeal drives the heart of China as one beating heart so to speak.

The National Security Law of the People’s Republic of China, as adopted at the 15th session of the Standing Committee of the Twelfth National People’s Congress declares under Article 9 that in maintenance of national security, priority shall be given to prevention, equal attention shall be paid to temporary and permanent solutions, specialized tasks shall be combined with reliance on the masses, the functions of specialized authorities and other relevant authorities in maintaining national security shall be maximized, and citizens and organizations shall be extensively mobilized to prevent, frustrate, and legally punish any conduct that compromises national security. Article 11 decrees that there will be no tolerance shown for the failure to meet one’s obligation to maintain national security. The article states: “All citizens of the People’s Republic of China, state authorities, armed forces, political parties, people’s groups, enterprises, public institutions, and other social organizations shall have the responsibility and obligation to maintain national security.” Authorities in China understand that extraordinary powers are entrusted in the hands of many, such as MSS officers, who work on national security matters. Contractors, and even informants, who might work on their behalf are placed under the same scrutiny. Those who have attempted to cross the Chinese government have faced stiff reprisals. The shadow of sudden death can hang over the head of any individual arrested for such betrayal. As stated under Article 13: “Whoever as an employee of a state authority abuses power, neglects duty, practices favoritism, or makes falsification in national security work or any activity involving national security shall be held liable in accordance with the law.” The article further declares: “Any individual or organization that fails to fulfill the obligation of maintaining national security or conducts any activity compromising national security in violation of this Law or any relevant law shall be held liable in accordance with the law.” The furtive work of Chinese citizens at home and abroad under the direction of the MSS does not need to be without guerdon. As explained under Article 12: “The state shall commend and reward individuals and organizations that have made prominent contributions to maintaining national security.”

On MSS Informants Overseas

The immediate impression created when one learns that China regularly makes full use of Chinese nationals to support the intelligence collection process is the mind boggling prospect of a multitude of adults from China’s population, which according to the World Population Review as of this writing is put at nearly 1,439,239,000. While there may very well be several Chinese national informants moving around Western countries on a given day, that number is certainly not in the millions. Certainly, not every adult in China will be directly asked to be an informant overseas. Seasoned members of the service have decades of experience approaching young Chinese travelers. Usually prospective informants are approached just before travelling overseas for busuness or tourism or early in their overseas education or career. The younger the informant more time they might have in place and more likely they might be responsive to an MSS officer’s entreaties to take on the job. It is not a matter of taking anyone who comes along. MSS officers are looking for a safe pair of hands; those with cool heads, who can comfortably kick around foreign parts. They must be the very soul of discretion and not easily rattled.

Glenn Duffie Shriver (above). Often in the recruitment of US operatives, as well as those of other countries, prospective targets will be approached who may not at the present time have much by way of an access but potentially could establish that access in time. The recruitment is conducted quietly and low-key to successfully avoid raising suspicion or pose concerns to anyone. The relationship between the MSS officer or contractor and the recruit, seemingly having no importance, will evolve gradually on a schedule set by observant, diligent, and patient MSS managers. A number of cases that conform to this type of recruitment have been made public. In a notable one, Glenn Duffie Shriver after graduating college decided to live in China after a short period of study there from 2002–2003. MSS officers convinced him to assist their efforts in the US for pay. Shriver reportedly received more than $70,000 from the Chinese intelligence to apply to the US Foreign Service and the CIA’s National Clandestine Service. In October 2010, pleaded guilty to conspiring to provide US national defense information to the MSS.

Recruiting Spies for the Long-Run: MSS Style

Often in the recruitment of US operatives, as well as those of other countries, prospective targets will be approached who may not at the present time have much by way of an access but potentially could establish that access in time. This was also a method that Soviet intelligence was famous for. To that extent, the recruitment process is conducted quietly and low-key to successfully avoid raising suspicion or pose concerns to anyone. The relationship between the MSS officer or contractor and the recruit, seemingly having no importance, will evolve gradually on a schedule set by observant, diligent, and patient MSS managers. As for the recruit, the motivation is typically emotional, somewhat ideological. For example, from the moment of contact with the MSS, they may sense that they are able to shape the fate of the world through their furtive activities. If the recruitment takes long enough, the target will even be passed on to another officer for development. When the recruit “matures” to the point of getting into position in a business, think tank, government organization, academic institution, or some other targeted location, the MSS officer handling the individual will begin full-fledged tasking. All forms of espionage and active measures will get under way full throttle. All in all, the speed differential with other forms of recruitment is not as critical as the depth of penetration by the recruit. What MSS gets from the effort is a highly prepared mole buried deep within the US foreign and national security policy apparatus.

A number of cases that conform to this type of recruitment have made public. In a notable one, in October 2010, Glenn Duffie Shriver pleaded guilty to conspiring to provide US national defense information to SSSB intelligence officer. Shriver, a recent US college graduate decided to live in China after a short period of study there from 2002–2003. Apparently finding Shriver to be a viable target, Chinese intelligence officers successfully pitched him the idea of assisting their efforts in the US for pay. Shriver reportedly received more than $70,000 from the Chinese intelligence to apply to the US Foreign Service and the CIA’s National Clandestine Service. If he managed to be hired by either, he would have been obligated to communicate classified US national defense information to their organization. The apparent intent of the SSSB’s was to collect a stream of reporting on US foreign policy. It was seemingly inconsequential that only some of a portion of it would have been directly related to Asia and particularly China.

Honey Traps

As noted in the discussion on the overseas intelligence operations of MSS provincial bureaus, Chinese human Intelligence officers have also been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. Indeed, a bog-standard method of snagging traveling businessmen is the honeytrap. As defined more specifically in Henry S. A. Becket, The Dictionary of Espionage: Spookspeak into English (Stein & Day, 1986), a honey trap is a method of sexual entrapment for intelligence purposes, usually to put a target [such as Kalugin] into a compromising position so that he or she can be blackmailed. The approach would be made once MSS intelligence or counterintelligence managers believed enough had collected enough about the target and the target’s activities, that they understood how the foreign national thought, and whether he would respond favorably to an effort to make that sort of clandestine contact with him, the approach is made by a selected female or make operative.

According to Kalugin in First Directorate, to further the KGB’s mission, he loosed those alluring qualities his personal appearance and attributes and those of other handsome males and females as weapons very effectively against Western officials and especially secretaries working in key offices in the US foreign and national security policy apparatus when he believed something considerable could be gained by doing so. If lucky, the target may already have become in contact with a woman from a house of elegant pleasure, and the recruitment of the prostitute is what is required. However, there are cases in which the prostitute may not have the background to engage the target in a way that is best for the MSS to establish appropriate level of contact to move forward toward effectual recruitment.

Prospective MSS intelligence officers?: Freshmen of Nanjing Campus of China Communications University in military training in 2015 (above). The MSS has been known to exploit relationships such as sexual relationships and illegal activities to pressure individuals to cooperate with them. It is a bog-standard method known as the honeytrap. While prostitutes and “contractors” are often used for this purpose, female officers may be put in a position to take on a honey trap role. Insisting that female officers surrender themselves to act as lures for potential targets for recruitment is surely not in line with that goal. MSS officers, particularly to young female officers, have been forced to choose whether to engage in such behavior to support the MSS mission. The question is posed, “Which comes first, love of self and honor or love of country and dedication to the Communist Revolution?”

The true humanist by the Marxist definition, seeks to understand human nature with the notion that all can be brought into an ideal Communist World. Insisting that female officers surrender themselves to act as lures for potential targets for recruitnent is surely not in line with that goal. Nevertheless, when MSS officers, particularly to young female officers, are forced to choose whether to engage in such behavior to support the MSS mission, the question is posed, “Which comes first, love of self and honor or love of country and dedication to the Communist Revolution?” The female officer would certainly need to consider what her family would say and what her community would say about her taking on such an assignment. The final answer would be founded on the officer’s own self-respect, dignity, self-worth, conscience. In a system where the desires of the individual must be subordinated to the needs of the state, the only answer is to give primacy to love of country and support the Communist Revolution. That being the case, for the majority of female officers, engaging such work would still be simply outside the realm of possibility. Ad turpia virum bonum nulla spies invitat. (No expectation can allure a good man to the commission of evil.)

Discussion will be extended in Part 2, to be published later