Book Review: Robert Spalding, War Without Rules: China’s Playbook for Global Domination (Sentinel, 2022)

People’s Republic of China People’s Liberation Army (PLA) Navy’s Aircraft Carrier, Type 001A Shandong (Hull 17), the PLA Navy’s second aircraft carrier, but the first built domestically (above). In War Without Rules: China’s Playbook for Global Domination (Sentinel, 2022), retired US Air Force Brigadier General Robert Spalding discusses China’s military concept of unrestricted warfare. Spalding points out the concept may also include the use of armed force with its arsenal of weapons as the Type 001A Shandong, it is a military concept designed for the use of non-military forms of warfare: psychological, media, information, technology, cyber, financial, political, social, and espionage. The aim of unrestricted warfare is to weaken the US internally and to exploit its vulnerabilities. Spalding says there can be no doubt that the ultimate goal of the Communiet Party of China is world dominance. From his perspective, that does not bode well for the US.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping promises the Chinese people that China will supplant the US as the world’s dominant power in every sector. (Surely, it would be out of character for Xi to assure the Chinese people something as mundane as French King Henry IV declared one day in 1598 as France was just beginning to emerge from its ruinous religious wars: “Je veux que chaque laboureur de mon royaume puisse mettre la poule au pot le Comanche.” (I desire that every laborer in my realm should be able to put a fowl in the pot on Sundays.). Reference is commonly made to that statement with the phrase, “poulet au pot.”) One might imagine that some similitudes of the romanticism á la the French Revolution, megalomania, or some bizarre combination of both, perhaps in concert with others, have driven the zeal of Communist Party of China’s leadership over the years to achieve this goal. Xi will very likely have a lot of other unsettling things to say as time goes on. As attaining the dominant position in the world has been a long sought goal but never reached, some experts, scholars, and policy practitioners still look askance at the whole idea. China’s ambitions and capabilities as they concern attaining this lofty goal no longer sit in the realm of the theoretical or left to philosophical meanderings. Xi is clearly determined to achieve it under his leadership. If China were ever to make the dream of dominance come true, it would not be so willing to relinquish that position. Beijing would doubtlessly do whatever it took to stay on top.

Although the idea of China being the world’s dominant power may be a pleasurable thought in Beijing, the moral and ethical implications are remarkably overwhelming. The idea of China achieving that goal is a frightening prospect, terrifying leaders in other countries whether its friend or foe. The subject of this review is Robert Spalding’s War Without Rules: China’s Playbook for Global Domination (Sentinel, 2022). In his book, Spalding says there can be no doubt that the ultimate goal of the Communiet Party of China is world dominance. From his perspective, that does not bode well for the US. A retired US Air Force Brigadier General, Spalding, in War Without Rules, expresses his most recent meditations about China’s efforts to achieve dominance overseas and even greater control at home. He offers more answers on how the US and its allies might respond to that effort. Spalding states in his “Introduction”: It is not enough to know what your enemy wants. One needs to understand his strategy. In this regard, Washington has been, to use Spalding’s words, “really confused.” He says the US is “primed to fight in one way-all-out war-and see aggression through the same lens.” The indications and implications of this is that the US over the years has failed to discern and accept the Chinese are doing something very different and thereby, Washington has failed to act appropriately. To that extent, War Without Rules is a further attempt by Spalding to get the word out to US political leaders about what China is doing. Yet, more than a book about China’s concepts, intentions, and actions to knock the US off its perch as the dominant power in the world, greatcharlie found that War Without Rules is a book that stirs the reader’s curiosity. The reader is caused to inquire further into the author’s judgments and give greater consideration of their own views on the matter. Such books are figurative catnip for greatcharlie.

Robert Spalding retired from the US Air Force as a brigadier general after more than 25 years of service. If US Air Force officers were listed by achievements–perhaps they are somewhere in the Pentagon, Spalding would surely be among the luminaries. His Air Force biography provides the best picture of the experience and knowledge he possesses. Spalding is a former insider, who worked within the deepest points, most grave points of the US military and other national security bureaucracies. It must be noted that as a former flag officer and B-2 Stealth bomber pilot and unit commander, he was among a him in unique, elite caste of military officer, not quick to speak out, does not lightly show emotion, at least publicly or react because of it, not the type to fret over a perception without the full facts, and whose views when expressed should be taken very seriously.

Overview

In War Without Rules, Spalding frames the problem in getting Washington to understand how China has been steadily moving in the direction of achieving dominance in his Introduction by stating: “From our standpoint, we use military force to achieve a political outcome.” To that extent, he continues: “So they’re constantly in a state of war, they never exit time to peace. And that means they’re always fighting for advantage, they’re always fighting . . . to gain an advantage over their opponent, and . . . are willing to do whatever means necessary.” Spalding states that over those years he came to two key realizations: first, the number one goal of the Chinese Communist Party is the survival of the Chinese Communist Party; and, second, the number one threat to achieving that goal is American democracy. Spalding observes that although there may not be full agreement in the US that China is an enemy, China certainly views the US as its enemy, an existential one. Much as with Spalding’s preceding work, Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019), which greatcharlie reviewed in its November 30, 2021 post, Wat Without Rules is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction.

Unrestricted Warfare: the Playbook 

The central element of Spalding’s discussion on China’s efforts to dethrone the US as the world’s dominant power is the concept of “unrestricted warfare.” That concept is laid out in a 1998 book entitled Unrestricted Warfare authored by two People’s Republic of China People’s Liberation Army (PLA) colonels, Qiao Liang and Wang Xiangsui. Spalding essentially uses War Without Rules to parse out the text which was once relatively unknown in the West. In each of the chapters of War Without Rules, Spalding presents excerpts from Unrestricted Warfare along with his interpretations and assessments of the text.

Spalding explains the concept of unrestricted warfare, or what the two authors call a “cocktail mixture of warfare” and define as “warfare which transcends all boundaries and limits.” Spalding points out that while China’s version of unrestricted warfare may also include the use of armed force, it is a strategy that prioritizes the use of non-military forms of warfare: psychological, media, information, technology, cyber, financial, political, social, and espionage. (The espionage element will be considered in greater detail later in this review.) The aim of unrestricted warfare is to weaken the US internally and to exploit its vulnerabilities. (Spalding would call unrestricted warfare in War Without Rules as “beyond-limits combined war.” As the term seems to best reflect the flavor of strategy’s meaning in Chinese, greatcharlie shall hereinafter refer to the strategy of unrestricted warfare more thoroughly as “beyond-limits combined war.”) Since under what was a new concept in 1998 the battlefield is everywhere, for the PLA, everything can be weaponized. On a short list of things weaponized, Spalding includes computers, drugs (fentanyl), financial markets, viruses (COVID-19), social media platforms, universities, scientific organizations, NGOs, trade, and media outlets. To create a foundation for the conceptualization of their new approach, Spalding explains that the two PLA colonels “pulled together centuries of Chinese thinking about warfare and made it relevant in a modern context.” To that extent, Spalding goes as far as to state that the book, Unrestricted Warfare, preached a new version of a very old Chinese formula for victory first set down in print thousands of years ago by Sun Tzu, who wrote in Art of War (c. 5 B.C.), which focused on military organization, leadership, and battlefield tactics, that the acme of skill was to defeat an enemy without fighting.

Spalding insists Unrestricted Warfare is “the main blueprint for China’s efforts to unseat America as the world’s economic, political, and ideological leader.” He states further, it is “the key to decoding China’s master plan for world domination.” Spalding points out that the two colonels wrote the book at a time when the US was enjoying its brief “unipolar moment,” having recently achieved victory over the Soviet Union in the Cold War and won a one-sided military victory in the First Persian Gulf War. And China had not yet attained economic and military superpower status. Much as their superiors in the Communist Party of China, the sense of ardor of the two PLA colonels were respectively inflamed by what they witnessed in the Gulf War and they became more determined than ever to find a way to enhance their country’s capabilities and raise its status globally. Given what Spalding says Unrestricted Warfare endows, it is a wonder why its two authors were allowed by their masters to publish, nonetheless write such a piece in an unclassified context. There must have initially been some nervousness in China’s Ministry of Defense and the Communist Party of China over security concerns. Some time and effort was presumably put into parsing out how the US and its allies would react if a copy got into their hands.

Cynics and conspiracy theorists would doubtlessly go as far as to say Unrestricted Warfare may be a false document, a piece of disinformation, generated by one or more national governments wanting to create a picture of a virulent, predatory China hellbent upon dethroning the US as the global superpower in any way possible. To that extent, they ostensibly insinuate that Spalding has taken the bait and run with it to an extreme. They would perchance offer a caveat to the effect that readers not allow themselves to be bewitched by Spalding the “dream-weaver” or the “teller of tales”. Other detractors of Spalding’s opus would hypothesize that if political leaders were sufficiently impressed by the length and breadth of Chinese activities depicted in the book, it would open the door to greater overwatch and responsibilities for counterintelligence services in the US Intelligence Community and federal law enforcement. Thereby, the document was very likely created within the intelligence industry to influence political support for enhancing their respective powers, broadening their respective missions, and increasing their respective resources. That would be quite a judgment on the character of the men who run the intelligence services and federal law enforcement organizations in the US. Anything is possible from an industry in which many of its professionals as a practice must deny their own names and concealing their accomplishments and contributions is de rigueur. So many “capers” are still kept close to the vest by top executives and managers. Then again, some could say conversely that any effort to create second thoughts on Unrestricted Warfare could possibly be the work of the opposition, a misinformation campaign of some sort.

Everyone is entitled to an opinion. Having said that, it might be helpful to remind such cynics that Spalding in part resolves the provenance of Unrestricted Warfare by laying out the manner in which events have unfolded and continue to unfold and how Chinese activities “follow the script” of Unrestricted Warfare practically to the letter. Spalding notes that Unrestricted Warfare has been used at China’s military academies. It would be unusual for a “misinformation tool” to be placed on syllabi in such educational institutions. Surely, that evidence alone should help carry his argument well-outside the realm of conjecture and settle it down into reality for most. All that being stated, greatcharlie reckons that diving any deeper into such matters, would be counterproductive, and that it would be best to “stay on mission” and discuss the good readers will find in War Without Rules.

As a book concerning the course of China’s implementation of beyond-limits combined war, War Without Rules, to an extent, is a book about both the past and present. Yet, more importantly, it is an argument concerning the type of future the US and the rest of the world’s industrialized democracies really want. Spalding leaves doubt that he believes the idea of Chinese dominance is unacceptable given the nature of China’s totalitarian government. He feels the growing concern about China within Washington and the capitals of its allies is warranted. Spalding insists that much more must be done by those capitals to convince China that the matter of it becoming the world’s dominant power is simply out of court. In his view, too many mistakes have been made already by them, especially by Washington, that have allowed China to advance quite a bit in that direction. Spalding makes considerable reference to the political leaders, business leaders, senior government officials, and distinguished scholars, academics, and technical experts who exercise the lion’s share of authority within their countries. Western elites called themselves keeping an eye on Beijing, but Spalding explains for far too long have assumed the military is China’s main weapon in a war. To his amazement, he observed they somehow or another failed to realize that money can be a stronger weapon. To the detriment of the interests of their own respective countries, through interactions with China, particularly economic through commerce, finance, and trade, have lavished Beijing with enough money to wage a beyond-limits combined war against them which the Communist Party of China fully intends to win! 

In Act II, scene iv, of William Shakespeare’s The Life and Death of Richard the Second, a Welch captain speaks these words of doom and gloom to the Earl of Salisbury: “The bay-trees in our country are all wither’d / And meteors fright the fixed stars of heaven; The pale-faced moon looks bloody on the earth / And lean-look’d prophets whisper fearful change; / Rich men look sad and ruffians dance and leap, / The one in fear to lose what they enjoy, / The other to enjoy by rage and war:” Rest assured, War Without Rules is not a manifestation of a sense of doom and gloom concerning China held by Spalding. War Without Rules does not present a “scare story”, pour employer une phrase populaire. Spalding certainly is not whining about China in War Without Rules.  From what greatcharlie is aware of, operating with such a mindset would hardly be Spalding’s way of thinking or doing things. Despite his strong feelings, his discussion is more intellectual than overtly emotional. Afterall, he is a consummate professional from the US foreign and national security policy realmand for warriors such as Spalding, “strength of character consists not only of having strong feelings, but maintaining one’s balance in spite of them!” Spalding has a mind and will to win.

In a 1978 October 13, 1978 Wall Street Journal article entitled, “U.S. Monetary Troubles” by Lindley H. Clark Jr., Paul Samuelson, the Nobel laureate from the Massachusetts Institute of Technology, recalled that John Maynard Keynes once was challenged for altering his position on some economic issue. “When my information changes,” he remembered that Keynes had said, “I change my mind. What do you do?” Spalding admits initially having been somewhat dismissive, himself, about the Unrestricted Warfare and viewed the precepts revealed by the two PLA colonels as somewhat fanciful or lofty. Spalding notes in the Introduction of War Without Rules: “When I first read the Chinese war manual Unrestricted Warfare in 1999, I thought it was wacky. I was flying B-2 Stealth bombers out of Whiteman Air Force Base in western Missouri and reading a lot about war. As an Air Force officer, I thought it was part of my day job to understand the bigger picture–even though the prevailing attitude in the military was ‘Just fly the planes.’ ” Torah Lishmah! Spalding’s whole perspective changed once he discerned China was putting everything he read into motion, and doing it well. Spalding spoke truth to power at the Pentagon and the White House then, and speaks of only what he knows to be the truth in War Without Rules now.

At the time of this review, a 212 page translation of Unrestricted Warfare: China’s Master Plan to Destroy America, Reprint ed. (Echo Point Books & Media, 2015) has been made available for purchase on Amazon.com. The description provided for the book on Amazon is as follows: “Two colonels in the People’s Liberation Army, Qiao Liang (乔良) and Wang Xiangsui (王湘穗). Its primary concern is how a nation such as China can defeat a technologically superior opponent, such as the United States.” Having examined Unrestricted Warfare, greatcharlie would wholeheartedly agree that the audience best situated to parse it out in the round would be academics, other scholars, and practitioners in the province of foreign and national security policy. Any level-best effort by those somewhat unfamiliar with these matters, which would be laudable. Still, Unrestricted Warfare is made more easily understood through Spalding’s lens, colored by his expertise and experience. Spalding’s examination of the book via War Without Rules better enables readers with the chance to gain knowledge on a matter that would essentially be limited to those thoroughly steeped in China policy, Chinese defense issues, Chinese military culture, and military science. To that extent, his book will remain an important resource in every personal, public, academic, and institutional library.

The Roman historian Titus Livius (59 B.C.-A.D. 17), known as Livy, provided in Greek, a history of Rome that begins with the earliest legends of Rome before the traditional founding in 753 B.C. through the reign of Emperor Caesar Augustus during his own lifetime. In Book XLIV, sec. 15 of that history Ad Urbe Condita (From the Founding of the City) (c. 28 B.C.), he writes: “Plerumque ipsam se fraudem, etiamai initio cautior fuerit, detegere.” (A fraudulent intent, however carefully concealed at the outset, will generally, in the end, betray itself.) Increasing sunlight has been shone upon China’s activities, not just on the coronavirus disaster or in the domain of foreign and national security policy, but the totality of its malign actions. Included among those actions would be: predatory investment scams directed against trusting governments of often small and less industrialized countries; intrusions into sovereign waters for mass fishing; intellectual property theft from companies and research labs that have invested millions in research and development into; and, demands of censorship insisted upon of those in any arena who have received funding from, or are doing business with, China, Beijing must accept that as a result of such actions, impressions of China have not generally been positive worldwide. Communist Party of China leaders have doubtlessly come across the many statements made internationally about Chinese government spokespersons, diplomats, and other officials. To that extent, the Communist Party of China can hardly be happy about the damage being done worldwide to China’s reputation through books such as War Without Rules. Spalding’s voice is surely one that is looked upon as something better than annoying by the Communist Party of China. Spalding is among an ever growing group of China specialists who are determined to uncloak the fraudulent intent of China established decades ago. They put China’s intentions in full view of the world to see. Perhaps what specialists as Spalding present on China might be perceived as nothing less than affront or rebuke. It could only have been worse it his voice emanated from Taiwan. Then Beijing would have considered his act of writing and publishing the book as one more betrayal.

Spalding holding up copies of War Without Rules (left) and Stealth War (right). Although packed with excellent suggestions, War Without Rules, as with his preceding work, Stealth War, is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, military, diplomatic, economic, political, and information (media) power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction. Given the success of Stealth War, Spalding was undoubtedly pre-empted to write another work of such magnitude. Surely, he was not lumbered by that task, and welcomed the opportunity to gnaw further at the issue of China ambitions and maligned actions and intentions. War Without Rules is every bit as brilliant as its predecessor. It is another superb exposition of Spalding’s pragmatic thinking.

The Author

In War Without Rules, readers are presented with the perspectives and insights on US-China relations through the lens of a man with years of experience on such matters. While hesitant to rewrite the biography of the author from its aforementioned November 30, 2021 post in which it reviewed Stealth War, greatcharlie believes that only by presenting his singular education and military experience in that way can the reader get a true sense of qualifications to inform readers on the subject matter.

Robert Spalding retired from the US Air Force as a brigadier general after more than 25 years of service. If US Air Force officers were listed by achievements–perhaps they are somewhere in the Pentagon, Spalding would surely be among the luminaries. His Air Force biography provides the best picture of the experience and knowledge he possesses. Excluding his list of educational accomplishments, it reads as follows: “General Spalding received his commission through Fresno State University’s ROTC program in 1991. He earned his doctorate in economics and mathematics from the University of Missouri at Kansas City in 2007. The general attended undergraduate pilot training in 1993, and was subsequently assigned as a B-52 Stratofortress co-pilot in the 5th Bomb Wing at Minot Air Force Base, North Dakota. He subsequently transitioned to the B-2 Spirit at Whiteman AFB, Missouri. In 2001, he was selected as one of three Air Force Olmsted Scholars, and was a distinguished graduate of Mandarin Chinese language training at the Defense Language Institute in Monterey, California. Afterward, the general attended Tongji University in Shanghai as a graduate research student. He then returned to Whiteman AFB as a B-2 evaluator pilot and assistant director of operations for the 393rd Bomb Squadron. The general was then assigned to the Office of Secretary of Defense’s Prisoner of War Missing Personnel Office as the military assistant for the deputy assistant secretary of defense. During the Iraq surge in 2007, General Spalding deployed to Baghdad and directed the Personal Security Coordination Center. After a stint at the Air War College at Maxwell AFB, Alabama, he was reassigned to the B-2 at Whiteman AFB. While at Whiteman AFB, he was the chief of safety, operations group commander and vice wing commander. He was then selected as a Military Fellow at the Council of Foreign Relations in New York. General Spalding then served as the chief China strategist for the chairman of the Joint Chiefs, the Joint Staff at the Pentagon, Washington DC. His next assignment led him back to China as the Senior Defense Official and Defense Attache to China in Beijing, China. Prior to his current assignment he served at the White House as the Senior Director for Strategic Planning at the National Security Council, Washington D.C.”

Spalding is by no means an outsider, with special access, looking in on the situation. He is an erstwhile insider, who worked within the deepest points, most grave points of the US military and other national security bureaucracies. It must be noted that being a former flag officer and B-2 Stealth bomber pilot and unit commander, which placed him in unique, elite caste of military officer, not quick to speak out, does not lightly show emotion, at least publicly or react because of it, not the type to fret over a perception without the full facts, never speak idly, and whose views when expressed should be taken very seriously. 

On Stealth War

Spalding’s Stealth War was promoted as a book which discusses how China has quietly waged a six-front war on America’s economy, military, diplomacy, technology, education, and infrastructure, and has been winning. It might be enough for greatcharlie just to describe Spalding’s exceptional achievement with Stealth War as providing piercing judgments, a novel-like reporting of actual events, and a clarity that allows him to cast a cold eye on China policy analysis and intelligence analysis and its practitioners, both past and present. However, Spalding, even more, has interestingly taken his own dissatisfaction, disappointment, and anger over how badly the US has handled China, placed his country in some considerable degree of danger, and safely expressed it on paper, turning it into a positive force to better understand how things have taken shape and how atrocious events are unfolding right before the eyes of every US citizen.

Although packed with excellent suggestions, Stealth War, as with War Without Rules, is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, military, diplomatic, economic, political, and information (media) power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction. Given the success of Stealth War, Spalding was undoubtedly pre-empted to write another work of such magnitude. Surely, he was not lumbered by that task, and welcomed the opportunity to gnaw further at the issue of China ambitions and maligned actions and intentions. War Without Rules is every bit as brilliant as its predecessor. It is another superb exposition of Spalding’s pragmatic thinking.

If you were fortunate enough to have read Spalding’s Stealth War, you are certainly primed and ready to approach the heady revelations of War Without Rules with an open mind. However, if you have not had the chance to read his preceding work, you can still jump right in War Without Rules. If Spalding had written War Without Rules solely to communicate with professionals within the US foreign and national security policy bureaucracies or the respective bureaucracies of US allies, his target audience still would have been somewhat sizable, and in of itself a market satisfying enough for his publisher. 

However, knowing the considerable level of interest in China across an array of issues is presently high, the targeting of a larger general audience was very likely insisted upon by his publisher. Of course, publishers make money selling books. Spalding, himself, was evidently willing to reach a far greater audience with his work, but his priority in writing this book apparently went beyond turning a profit. As Spalding explains in his “Introduction”, in attempting reach a larger audience, his intention was  to make average citizens, particularly in the US, better aware of China’s malign aims and objectives and tactics. An attendant benefit of that would possibly be mobilizing them to get their representatives in the US Congress and especially the White House to mitigate its creeping influence.

As part of his effort to reach a greater audience with War Without Rules, Spalding intentionally presents his discussion in a way as to coast the most interested China policy wonk as well as someone who has not read a book on China beforehand comfortably through the subject matter. Spalding does not take for granted how much the reader can absorb from what he teaches. As part of his effort to control that process, he carefully apportions how much of the story he feels would be appropriate. When he feels the reader should be ready for more, Spalding ratchets up the complexity of discussion and his anecdotes. Spalding surely accomplished that presumed mission, as his text is informative, lucid, challenging and accessible.” One can only imagine an individual with his richesse connaissances is holding back considering how much more he could have potentially ruminated upon. To that extent, while all should find War Without Rules a browsable, satisfying meditation, Spalding’s lack of profundity might disconcert some.

Previous Reviews

As Beijing pushes ahead with its varied malign efforts, books as Spalding’s War Without Rules surely deserve a look from the eyes of many. In most reviews readily available online, appreciation is shown toward Spalding’s willingness to share the meditations of his praiseworthy exploratory mind. Reviewing War Without Rules for the New York Review of Books, Francis Sempa, who at the time was Assistant US Attorney for the Middle District of Pennsylvania, explains that China, according to Spalding, is the enemy of the US, and its statesmen and strategists to “know” the enemy better and to appreciate the enemy’s strategy. Sempa points to Spalding’s view that the aforementioned US statesmen and strategist need to appreciate that we are at war with China, though not yet “a shooting war”, and suggests it is uncertain whether they will recognize that reality. Sempa notes Spalding’s evidence that China is waging war lies in the tactics and strategies set forth in Unrestricted Warfare. Citing what Spalding gleaned from that text, Sempa similarly explains that unrestricted warfare, or what the Chinese authors call “beyond-limits warfare,” includes psychological, media, information, technology, cyber, financial, political, social, and espionage warfare. to. Revealing even more from the text of War Without Rules, Sempa explains Spalding believes that China’s practice of waging war with non-military means lulled the US into a false sense of security after the Cold War by convincing US elites that China was liberalizing politically and that the US could benefit financially by “engaging” China rather than containing or confronting it. Sempa notes that a lot of American elites did (and still do) benefit financially from engagement with China. Overall, the review was favorable. Yet, Sempa notes, too, that Spalding failed to mention another factor that imperils US security–the gradual formation of a new Sino-Russian strategic partnership, which developed and expanded while the US was distracted by wars in Afghanistan and Iraq. He says additionally that China has also engaged in a massive military build-up and has extended its influence throughout the Indo-Pacific region via its Belt and Road Initiative. Sempa declares: “Unrestricted warfare also includes geopolitics.

Reviewing the book for the journal of the US Naval Institute, Proceedings, a Lieutenant Cregge states that War Without Rules is “no doubt a blistering critique of the Chinese Communist Party.” Cregge cites Spalding’s explanation that two Chinese PLA colonels, Unrestricted Warfare, provide the playbook for a broad, undeclared Chinese war against the US. Beyond a translation of the two colonels concepts to English, War Without Rules seeks “to explain the challenging prose, logic, and colloquialisms” of Unrestricted Warfare that remain. Through his own description, Cregge notes that the colonels reflected on, among many other topics, how the face of war “would change”, given the US preeminence demonstrated both in its coalition victory in the First Persian Gulf War and its commanding position in the international economic and diplomatic orders. Cregge states that for those interested in examining an array of examples of Chinese coercion against the US-led international order, War Without Rules provides such cases “in spades.” He also notes that for more skeptical China doves, it may be less convincing. Criticizing the War Without Rules, Cregge proffers the book’s compelling argument suffers for two reasons. He explains that many modern examples of Chinese unrestricted warfare against the US rely on seemingly arbitrary citations. He further asserts the book’s partisan perspective is evident throughout, which may further estrange some policymakers or voters, despite a desire, quoting Spalding, that “we should all be China hawks.” Cregge admits that these particular critiques do not argue that the information asserted is necessarily wrong. Cregge additionally criticizes the book saying that given the weight of accusations against Chinese and US organizations and even named individuals, a comprehensive citation regime and bibliography would have greatly reinforced War Without Rules.

Providing a review of War Without Rules for The Epoch Times, that also makes use of quotes from an interview Spalding provided Epoch TV’s “China Insider” program, journalists Hannah Ng and David Zhang report his book walks readers through the principles outlined in the Chinese publication, revealing the regime’s belief that there is no sector of life outside the realm of war. Spalding, they note, determined that this approach stemmed from a doctrine laid out by two Chinese colonels back in 1999 in their book, Unrestricted Warfare. Seeking to boil the matter down further, Ng and Zhang state that according to Spalding, the notion of war espoused by the Chinese communist regime is completely different from ideas in the West. Citing Spalding, the reviewers note that from the Western standpoint, military force is used to achieve a political outcome. However, the “Chinese Communist Party” sees the outside world as always in a state of war. Thus, China is constantly in a state of war with it. That necessitates always fighting to gain an advantage over their opponent, and are willing to accomplish that through any means necessary. To push back against this unconventional war imposed on the US, Ng and Zhang say Spalding called for the country to decouple from China. Quoting Spalding once more, the reviewers write: “If we can decouple from China . . . get them out of our economic, political, academic and natural systems and begin to reinvest in our own citizens, reinvest in infrastructure and manufacturing in science and technology and STEM [science, technology, engineering, maths] education, you’re going to start to see opportunities arise that haven’t been there for decades in the United States.”

Interestingly enough, more than just reviews exist of Spalding’s book. As of the time of this writing, a couple of unofficial “study guides” for War Without Rules have been made available for purchase on Amazon.com at prices oddly not far short of the cost for the book itself! The study guides are in effect synopses of a synopsis of a book. (Without pretension, greatcharlie hopes readers will not find that its review of War Without Rules should be placed within that category, too.)

The August First Building in Beijing, Headquarters of the People’s Liberation Army (above). The central element of Spalding’s discussion on China’s efforts to dethrone the US as the world’s dominant power is the concept of “unrestricted warfare.” That concept is laid out in a 1998 book entitled Unrestricted Warfare authored by two People’s Republic of China People’s Liberation Army colonels, Qiao Liang and Wang Xiangsui. Spalding essentially uses War Without Rules to parse out the text which was once relatively unknown in the West. In each of the chapters of War Without Rules, Spalding presents excerpts from Unrestricted Warfare along with his interpretations and assessments of the text. Spalding insists Unrestricted Warfare is “the main blueprint for China’s efforts to unseat America as the world’s economic, political, and ideological leader.” He states further, it is “the key to decoding China’s master plan for world domination.”

The Chapters of War Without Rules

War Without Rules is 256 pages in length, and has 11 chapters. The chapters are well-arranged and titled as follows: Chapter 1: “Know Your Enemy”; Chapter 2: “A New Way of War”; Chapter 3: “The Magic Shoes of Technology”; Chapter 4: “The Weapons of Revolution”; Chapter 5: “The War God’s Face Has Become Indistinct”; Chapter 6: “Desert Storm: ‘A Military Masterpiece”; Chapter 7: “America’s Weakness”; Chapter 8: “Weaponizing the International Order”; Chapter 9: “Deploying All of the Above”; Chapter 10: “Calling It War”; and, Chapter 11: “Fighting Back with New Rules”. One might figuratively call each chapter a “deep penetration strike” against what the former B-2 Stealth pilot presumably views as Washington’s record of willful ignorance and to a degree, political apathy.

With the aim of not spoiling the readers’ own experience reading War Without Rules, greatcharlie will not provide a sizable review covering chapter by chapter. Instead greatcharlie delights to simply peek, to gaze therein on those parts of his admirable work that it found fascinating and captivating. The same approach was taken in its review of Stealth War. At the same time, Spalding has done a more than admirable job at breaking down the blueprint for China’s effort to attain dominance, Unrestricted Warfare, in order to allow all readers to grasp the work. There was concern in writing this review that an unintended consequence of summarizing his effort would be to gut Unrestricted Warfare to the point that its essence would be significantly obscured to readers. Thus, with a focus on keeping the discussion to the more significant lessons learned from the Gulf War by the two PLA colonels, greatcharlie presents a somewhat fulsome discussion of what it has determined to be its “top 3” chapters. They include: Chapter 4: “The Weapons Revolution”; Chapter 7: “America’s Weakness”; and, Chapter 11: “Fighting Back with New Rules”. Of course, greatcharlie believes every reader will best select for himself or herself, the chapters that content them most.

Chapter 4: “The Weapons Revolution”

In Chapter 4: “The Weapons Revolution”, Spalding explains when Unrestricted Warfare was written China did not have Stealth bombers, am adequate Navy. He notes that the colonels saw promise in what China did have in abundance. Those resources include: a billion people, computer programmers, devious hackers, financial speculators, currency reserves. Spalding, himself, adds what would be recognized as the issue de jure doctors studying exotic viruses. Spalding says the colonels explained all of these, organized and tasked to maximize their potential, could be used as weapons and must be seen as such. Effecting the possible disruption, destruction, and potentially gaining control all areas of the opponents society would be possible to the degree that the opponent’s ability to fight wars in the standard way would be broken. The opponent would be destroyed from the inside similar to an erstwhile healthy individual struck by an unseen virus. The colonels explain that with the weaponization of its abundant resources, China could strike at the very hearts of its opponents. To that extent, the two colonels suggest that fully accepting such ideas requires one to adopt “a new way of thinking about warfare.” Spalding remarks that unlike ships and planes, these weapons needed no upgrades as a result of being suited for the last conflict. The colonels write: “In the past, all that was needed was the invention of a few weapons or pieces of equipment, such as the startup and the Maxim machine gun, and that was sufficient to alter the form of war, whereas today upwards of 100 kinds of weapons are need to make up a certain weapons system before it can have have an overall effect on war. However, the more weapons that are invented, the smaller any individual weapons role in war becomes, and this Is a paradox that is inherent in the relationship between weapons and war . . . Other than the all-out use of nuclear weapons, a situation which is more and more unlikely and which may be termed nuclear war, none of the weapons, even those that are extremely revolutionary in nature possess the right to label future warfare. . . .”

Interestingly, Spalding does not delve too much into the idea that such claims by the two colonels seemed more than just skance as an effort to justify the state in which the Communist Party of China had left their country’s defense, its security. After reading the above passage, greatcharlie thought that perhaps the two colonels overlooked, or worse, dismissed an important aspect of the human element of warfare as it concerns the way weapons are often innovatively used to the extent one could call their influence on the battlefield revolutionary. Imaginably, in the PLA, the sort of go-ahead mentality that has led to innovation in the use of weapons in Western armies, does not fit well. That is doubtlessly the case in all the bureaucracies of China’s totalitarian, Communist government system. The ability of research and development teams, commanders, and soldiers, sailors, and marines to find new ways to exploit available high-tech and information warfare technologies in often absolutely brilliant ways, cannot be discounted, or worse, dismissed so readily. 

In World War II, the decision by German Army commanders to level their long range, high velocity firing, 8.8 cm Flak 18, an 88mm anti aircraft gun, at opposing forces in the North African desert in 1941 changed the picture concerning artillery range, speed, and destructive effort through the war. Batteries of 88s were successful at supporting movement of tank and infantry units and breaking up attacks by opposition forces. In terms of weapons systems as a category, airplanes were initially used in observation and reconnaissance roles. The two colonels mention the contribution of the renowned Italian air war theorist General Giulio Douhet relatively in passing in Chapter 4: “Desert Storm: A Military Masterpiece”. They do not discuss just how genuinely revolutionary his precepts on potential use of the airplane in war were. Spalding surely would have included any comments by the two colonels on US Colonel William “Billy” Mitchell if they had deigned to mention the contribution of his ideas on air power and the need to make airplanes an integral part of US defense in preparation for the next war. It took an impressive degree of inner strength it took for these commanders to subject themselves to being “the voice crying in the wilderness,” a phrase that perhaps alien to the ears of the two colonels (Certainly not to Spalding!). The impact of the airplane was multiplied exponentially when it was eventually used as an asset for tactical and strategic attacks against an enemy. They can destroy enemy positions along the forward edge of the battle area, provide close air support for troops in contact with an opponent or move to a point deep in an opponent’s rear. When attacking an opponent’s units in depth, diverting, disrupting, or destroying attacking forces before they are even in contact with friendly troops, and destroying command, control, and communication centers and lines of supply. In a strategic attack role, airplanes can disrupt and destroy an opponent’s ability to even wage war, affecting the opponent’s ability to produce weapons, train troops. Further, airplanes can serve in an air defense role, friendly forces on the ground and at sea, and provide air cover for other airplanes in strategic attacks.

The two colonels sort of obedient, lock-step, short-sighted thinking on sophisticated weapons systems was further apparent in their statements about high-tech and information warfare. In another quote from Unrestricted Warfare provided by Spalding, it was explained: “Even if in future wars all the weapons have information components embedded in them and are fully computerized, we can still not term such war as ‘information warfare’ . . . because, regardless of how important information technology is, it cannot completely supplant the functions and the roles of each technology per se. For example, the F-22 fighter, which already fully embodies information technology is still a fighter, and the “Tomahawk” missile is still a missile, and one cannot lump them all together as “information weapons” nor can a war that’s conducted using these weapons be termed information warfare. Computerized warfare in the broad sense and information warfare in the narrow sense are two completely different things. The former refers to the various forms of warfare which are enhanced and accompanied by information technology, while the latter primarily refers to war in which information technology is used to obtain or suppress information. . . .” 

Spalding explains the two colonels believe huge investments in cutting edge weapons was a misallocation of funds and a dangerous distraction from what really matters in international conflicts. To that extent, Spalding looked at US Secretary of Defense Donald Rumsfeld in the administration of US President George W. Bush falling into what the colonels saw as a self-made trap as his focus was on constantly improving US weapons systems in terms of accuracy and lethality, an approach called the Revolution in Military Affairs. Intriguingly, on this point, politics seems to be playing more of a role than some sort of singular military thinking. Lending support to the idea that the Communist Party of China has the country on the right course militarily, better than imagined, because it has not heavily invested in weapons technology as the US, could have simply been a manifestation the two colonels belief, trust in, and loyalty toward the decisionmaking of China’s leadership. L’élan de générosité des croyants. On the other hand, China has always lagged behind a bit with the US in terms of its own research, development and deployment of its “big weapons”. It appears the two colonels have gone a bridge too far in suggesting that China would only need to innovate and adapt by exploiting nonmilitary resources to surpass the US and drive it from the top of the world order. Under a totalitarian, Communist government system in which even the commas of a text would be repeatedly scrutinized, placating the leadership and Communist Party of China’s military thinkers by pandering would surely be de rigueur especially if one hopes to have a position in a bureaucracy, advance in it, or even more, stay healthy and safe. Robust expressions of appreciation and optimism over the decisionmaking of the Communist Party of China’s leadership are expected. Speaking truth to power is just not the norm in China. To that extent, as alluded to earlier, it is likely the two colonels were once more taking on the role of “justifiers” in that last passage.

The US Air Force F-22 “Raptor” Stealth Fighter (above). Spalding explains the authors of Unrestricted Warfare believe huge investments in cutting edge weapons as the F-22 was a misallocation of funds and a dangerous distraction from what really matters in international conflicts. To that extent, Spalding considers the idea that Donald Rumsfeld, US Secretary of Defense in the administration of US President George W. Bush fell into what the colonels saw as a self-made trap because his focus was on constantly improving US weapons systems in terms of accuracy and lethality, an approach called the Revolution in Military Affairs. On this point, politics seems to be playing more of a role than military thinking. The two colonels could possibly be lending support to the idea that the Communist Party of China has the country on the right course militarily, better than imagined, because it has not heavily invested in weapons technology as the US. China has always lagged behind a bit in its own research development and deployment of its big weapons.

Further criticizing the US weapons acquisition process, according to Spalding, the authors of Unrestricted Warfare further explain there is a general unwritten rule that an army fights the fight that fits its weapons. They assert that very often it is the case that only after a military acquires a weapon does it begin to formulate tactics to match it. They go on to say, with weapons coming first, there is a decisive, constraining effect on the evolution of tactics. However, as the Roman Emperor and Stoic philosopher, Marcus Aurelius Antoninus Augustus was quoted as saying: “Because your own strength is unequal to the task, do not assume that it is beyond the powers of man; but if anything is within the powers and province of man, believe that it is within your own compass also.” One only need consider how the thinking of commanders as Heinz Guderian on the use of tanks, or panzers in his case, impacted German military strategy and tactics through World War II. In 1937, when he was a relatively obscure officer in the German Wehrmacht, Guderian wrote Achtung-Panzer!: The Development of Armored Forces, Their Tactics and Operational Potential. It was a seminal text that pointed out that in the next war, the importance of the tank with the very crucial addition of motorized infantry had to be recognized by the German Army. After carefully studying armor for 15 years, he insisted through Achtung-Panzer! [Beware the Tank!] that if tank forces were “full of verve” and “fanatically committed to progress” they would “restore the offensive power of the army.” Such ideas were adopted by the German Army, the result of which would be laying the foundation for the German Blitzkrieg. Such was the revolution on the battlefield Guderian had envisioned. He was given the opportunity to put his ideas into effect. Guderian commanded the XIX Corps during the invasion of Poland in 1939 and France in 1940, and commanded Panzergruppe Guderian during Operation Barbarossa, the invasion of Russia in 1941.

Similar thoughts were espoused by other military thinkers in the West between the world wars who influenced the way World War II fought and won. then US Army Colonel George S. Patton published a piece entitled,“Tanks in Future Wars”, in the Cavalry Journal (May, 1920), pages. 342-346, in which he explained the War Department must focus on tanks as an armored force and not place them piecemeal among infantry and artillery. He concluded, “The tank corps grafted onto infantry, cavalry, artillery, or engineers will be like the third leg of a duck; worthless for control, and for combat impotent.” Reportedly, Patton was immediately told to cease and desist by the powers that were if he wished to have a career in the US Army. Patton famously led the US 3rd Army on its armored and mechanized rampage through France in 1944 and its drive into Germany in 1945. Captain Dwight Eisenhower, wrote a piece for the Infantry Journal entitled, “A Tank Discussion,” (November 1920), pages 453-458, in which he sought to make the case for keeping tanks as part of the equipment of the infantry units. Eisenhower became the Supreme Allied Commander in Europe and great say in how the war was fought in Europe. In the United Kingdom, Captain B. H. Liddel Hart and Brigadier J. F. C. Fuller also mused about a revolution in armored warfare after World War I recognizing how the nature of warfare had changed with the introduction of the airplane, poison gas, and longer range artillery, and that machinery was stronger than wool. The British Army was experimenting with armored units under General Percy Hobart beginning in the 1920s. (In 1926, Fuller who served in the Tank Corps in World and participated in both the Battles of Arras and Cambrai, was given command of an Experimental Force (Tank)  brigade at Tidworth, on the Salisbury Plain. He ran into some difficulties while there.)

After examining in the round the situation of US and NATO Allies in Western Europe which faced a massive Warsaw Pact force in the East and thoroughly reviewing the US military experience in Vietnam, in the late 1970s and early 1980s US military theorists and planners sought to move away from the notion of fighting a battle of attrition, hoping to hold the line against an armored and mechanized heavy surges across the. Inner-German Border into the North German Plain, the Fulda Gap, and the Hof (Hessian) Corridor. They developed the Airland Battle concept which included an emphasis on maneuver, the operational art, high-mobility, high-tempo operations, innovation, flexibility, agility, capabilities, and military acumen, leadership, intimate knowledge of the battlefield, enhanced command, control, communication, and intelligence, the attack in depth, firepower, greater lethality, and the better use of existing weapons systems and the introduction of new, more capable weapons systems with the belief that they would have a considerable multiplier effect on the battlefield.  Notable among those weapons systems were the F-15 Eagle fighter, F-16 Falcon fighter, A-10 close support fighter, M270 MLRS (Multiple Launch Rocket System), the UH-60 Blackhawk helicopter, AH-64 Apache attack helicopter, the M1A1 Abrams main battle tank, the M2 and M3 Bradley fighting vehicles, the HMMWV (Humvee), and many more pieces of impressive gear. Later would come rather exquisite weapons systems such as the F-117A “Nighthawk” Stealth fighter and the E-8A Joint STARS (Joint Surveillance Target Attack Radar System). Special operations forces would be better developed in order to successfully engage in direct action behind opposition lines and alongside allied forces, and provide security for critical facilities and equipment and engage in other sensitive missions. The Airland Battle concept was manifested in the US Army’s formidable FM 100-5 Airland Battle Strategy.

For all of the advanced military thinkers mentioned and beyond, it was more often not an easy route to establish a strategy-resources match. They, too, were voices crying in the wilderness in the beginning. However, they managed to get the right attention. Through research, testing, and applying lessons learned from every failure, their theories were validated, the right weapons were procured, and the result was success in its use, though not completely successful for some as Guderian, fortunately for the world, given the politics of his country and the off-kilter way higher authorities prosecuted the war in which they were used. The renowned poet of Ancient Rome, Publius Ovidius Nāsō, known as Ovid (43 B.C. – 17 A.D.) wrote: Cui peccare licet, peccat minus. (Who is allowed to make mistakes, makes fewer mistakes.) In the environment in which the two colonels functioned, it is apparent that creating a theory on war then hoping funds would be  appropriated for their development was unheard of. It is hard to imagine some burgeoning, truly innovative military thinker in China leaping up to suggest ways of fighting wars that were beyond what was immediately understandable to superiors, required the use of weapons systems China did not have, and would have called for massive expenditures on defense.

General Heinz Guderian (top) in a half-track modified for use as a mobile command center during the Battle of France, 1940. According to Spalding, the authors of Unrestricted Warfare explained the general unwritten rule is that an army fights the fight that fits its weapons. They further assert that very often it is the case that only after a military acquires a weapon does it begin to formulate tactics to match it. They go on to say, with weapons coming first, there is a decisive, constraining effect on the evolution of tactics. One only need consider how the thinking of commanders as Heinz Guderian on the use of tanks, in his case, panzers, influenced German military strategy and tactics. In 1937, when he was a relatively obscure field officer in the German Wehrmacht, Guderian wrote Achtung-Panzer!: The Development of Armored Forces, Their Tactics and Operational Potential. It was a seminal text that pointed out that in the next war, the importance of the tank with the very crucial addition of motorized infantry needed to be recognized by the German Army. His ideas were adopted, they would serve as the foundation for the German Blitzkrieg. Such was the revolution on the battlefield Guderian had envisioned.

Spalding repeatedly remarks that in this chapter of Unrestricted Warfare, the two colonels rebuke the practice of developing weapons to meet the requirements of a theory for a new tactic, doctrine, or grand strategy. The two colonels began to sound more as cynics as Spalding quoted their reflections on US weapons systems design. It seemed more of the same self-serving perspectives seemingly aimed at placating the Communist Party of China. Perhaps coming across weapons systems then being forced to find ways to use them is a problem faced by the armed forces of countries which “garner” foreign military technologies and research, development, and plans by clandestine means.

There are points on which Spalding apparently fully agrees with the two colonels’ assessments. He stated that in Somalia, for the first time in history, unilateral access to superior weapons technology stopped conferring a big advantage to the dominant power. Spalding quotes from Unrestricted Warfare: “Customizing weapons systems to tactics that are still being explored and studied is like preparing food for a great banquet without knowing who is coming, where the slightest error can lead one far astray. Viewed from the performance of the US military In Somalia, when they were at a loss when they encountered Aidid’s forces [the ragged gunmen of warlord Mohammed Aidid, who tried to force foreign troops out of Somalia in the early 1990s], the most modern military force does not have ability to control public clamor, and cannot deal with an opponent who does things in an unconventional manner.” Far be it for greatcharlie to serve as an ideal apologist for the US armed forces over Somalia, Afghanistan, or Iraq–it lacks the faculty, but casting ones mind back, one might recall the outcomes of those campaigns were determined more by resources made available, how resources were utilized, and how those campaigns were fought, than by the nature of the varied resources of the US armed forces themselves. Spalding goes on to say the US nuclear arsenal would be useless in small-scale deployments as Somalia and in the counterinsurgency campaigns in Afghanistan and Iraq. Cutting edge conventional weapons developed via Rumsfeld’s Revolution in Military Affairs would also have little effect according to Spalding.

However, looking at the matter realistically from the two colonels’ position, applying China’s abundance of certain nonmilitary resources much as weapons was,  for so long, the only prospect China had for possibly defeating a larger, more powerful, more advanced industrial power as the US. The US had choices concerning the development of weapons system and strategies, China really did not. Interestingly enough, if the matter were considered forthrightly, those resources in abundance which are discussed in Unrestricted Warfare were resources already in existence. Thus, the beyond-limits combined war concept was developed around those abundant resources. As with any theory, the colonels could hardly have been certain that the application of these resources would yield all the desired results.

French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Spalding notes in this chapter that through beyond-limits combined war, China has been acquiring technology without paying a cent toward developing it, carefully taking control of the world’s shipping businesses, infiltrating US corporations and scientific laboratories, using US investor dollars to finance its factories and companies-and then insisting that any profits stay in their country. However, in War Without Rules, Spalding has spotlighted China’s ongoing open and clandestine efforts to implement beyond-limits combined war. To that extent, the prospect that China might quietly succeed completely as originally envisioned ostensibly no longer exists. There is time for the US and other industrialized powers to put things right, but no time to waste. An array of defenses can be further organized and calibrated to thwart China’s beyond-limits combined war.

As War Without Rules was written before the Russian invasion of Ukraine, Spalding writes about nuclear weapons arsenals without knowledge that Russian Federation President Vladimir Putin now speaks of using them to respond what he perceives as the US and NATO’s attempt to conquer Russia, rob it of resources and squeeze it to death, much as its was outlined in what is known commonly as the Gerasimov Doctrine. The US faces the real prospect of having to use its nuclear weapons in response to a strategic attack from the Russian nuclear triad. Spalding writes that for superpower as the US, the only real value of the nuclear triad now is as a deterrent. China understood this early on and mostly stayed out of the nuclear arms race during the Cold War. Until recently, the Communist Party of China chose to maintain a minimal nuclear arsenal, just enough to deter any other nation’s potential nuclear strike. By keeping its stockpile modest and its nuclear budget limited, the Chinese avoided the massive expenses that helped bring down the Soviet Union. However, as their wealth has grown, the Chinese have added to their nuclear stockpile, creating alarm and some confusion among Western analysts. 

Spalding, laying his thinking process bare for the world to read, asks the following questions: Are new silos and warheads just a deepening of their deterrence or is this a change of strategy  in creating an offensive nuclear capability? Is it perhaps a ruse, with empty silos or hollow missiles meant to provoke the US and others to waste yet more billions? Mais dans nos cœurs, nous n’y croyons pas complètement. From the colonels perspective in 1998, nuclear war is obsolete, but this may be an area in which the Chinese leadership has moved beyond that notion.” Spalding then adds, “And even if they are simply increasing their deterrence, does that mean we have to increase our lethality.”

Earlier in this very same chapter of Unrestricted Warfare, Spalding notes how the colonels warn against making statements and acting in ways concerning weapons systems development and deployment which can up the ante with an opponent and result in unforeseen negative consequences. Spalding includes the following passage from Unrestricted Warfare: “Marshal [sic] Olgarkov, the former chief of the Soviet General staff [Nikolai Olgarkov was chief of staff from 1977 to 1984], was acutely aware of the trend of weapons development in the “nuclear age” and when, it an opportune time, he proposed the broad new new concept of the “revolution in military technology,” his thinking was clearly ahead of those of his generation. But being ahead of his time in his thinking hardly brought his country happiness, and actually brought about disastrous results. As soon as this concept . . . was proposed, it further intensified the arms race which had been going on for some time between the United States and the Soviet Union. It was just, at that time, no one could predict that it would actually result in the break up of the Soviet Union and its complete elimination from the superpower contest.” It does not appear China will disintegrate as a result of increasing its nuclear arsenal. However, from what the colonels emphasize here, it is unlikely the Communist Party of China is bluffing, playing some game, by investing in the construction of nuclear missile silos, intercontinental ballistic missiles, and a far greater sea launched ballistic missile capable submarine fleet.

Chapter 7: “America’s Weakness”

Spalding begins Chapter 7: “America’s Weakness” explaining that in Unrestricted Warfare, the two colonels were diligent students of the US military. When they performed a post-mortem of the first Gulf War, and discovered a number of missed opportunities by the US that were considerable. What caught his attention was the view of the two colonels that US bombers were used in the war that were nothing less than “flying mountains of gold” which they also said made the US arrogant while they exposed the morbid US fear of casualties as a fundamental weakness. Spalding cites the following passage from Chapter 4 of Unrestricted Warfare: “Large-scale use if costly weapons in order to realize objectives and reduce casualties without counting costs–the kind of Warfare that can only be waged by men of wealth-is a game that the American military is good at. ‘Desert Storm’ manifested the Americans unlimited extravagance in war, which has already become an addiction. Airplanes which cost an average of US$25 million each carried out 11,000 wanton and indiscriminate bombings in a 43-day period, destroying the headquarters of Iraq’s Socialist Party with each US$1.3 million Tomahawk guided missiles, taking aim at foxhole with precision guided bombs worth tens of thousands of dollars . . . even if the American generals knew as soon as they began that they need not spend so much on this unrestrained US$6.1 billion dollar battle banquet . . . their own extravagance would still not have been prevented. An American made bomber is OK Ike a flying mountain of gold, more costly than many of its targets. Shouldn’t hitting a possibly insignificant target with tons of American dollars arouse people’s suspicions?”

Spalding states that although Unrestricted Warfare was published four years before what he calls Gulf War Two, that war’s mismanagement and heavy price in lives and dollars is something they could have predicted. He notes that it began with the same intensity of the first Gulf War, routing the overmatched army of Iraqi President Saddam Hussein rapidly. However, he say what came next, an asynchronous guerilla war fought by remnants of the Iraqi Army along with what he says the colonels would call non-state actors. The mission of the US opponent was to kill US soldiers and create a body count that the US public would not tolerate.

Here once again, the colonels offer the more of the same self-serving perspectives seemingly aimed at placating their commanders in the PLA. Spalding notes as much in this chapter stating:  “These are military men, writing first to a military audience.” The two colonels also again do their level best to establish a clear pattern of purpose and consistency in everything done by the Communist Party of China. Surely, the US spends great amounts on defense. Political leaders have sought to address the problem with defense contractors. Still,, survivability of US soldiers, airmen, sailors, and marines is put at a premium. Survivability of the planes they fly,, the ships in which they sail, and tanks in which they fight is an important factor in weapons system research and development. However, at the point in China’s defense development, the leadership was hardly interested in doing the same. This of course left the PLA far less advanced and in fact underdeveloped as a force. The implications would most likely have been dreadful for Chinese troops if they had been asked to fight in the army they had against an advanced industrial power or powers. More than anything else, this chapter of Unrestricted Warfare as with others, is window into the breast of two Chinese Communist military apparatchiks.

Two PRC PLA Navy Upgraded Type 094A Nuclear Submarines underway (above). Spalding writes that for a superpower as the US, the only real value of the nuclear triad now is as a deterrent. China understood this early on and mostly stayed out of the nuclear arms race during the Cold War. Until recently, the Communist Party of China chose to maintain a minimal nuclear arsenal, just enough to deter any other nation’s potential nuclear strike. By keeping its stockpile modest and its nuclear budget limited, the Chinese avoided the massive expenses that helped bring down the Soviet Union. However, as their wealth has grown, the Chinese have added to their nuclear stockpile, creating alarm and some confusion among Western analysts. Spalding asks the following questions: Are new silos and warheads just a deepening of their deterrence or is this a change of strategy  in creating an offensive nuclear capability? Is it perhaps a ruse, with empty silos or hollow missiles meant to provoke the US and others to waste yet more billions? From the colonels perspective in 1998, nuclear war is obsolete, but Spalding says it is possible that China’s leadership has moved beyond that notion.

Further focusing singly upon the US military with regard to the overall picture of US national security, Spalding indicates the two colonels use beyond-limits combined war as measure to gauge the development of US theory on warfare. Spalding cites a passage from Chapter 4 of Unrestricted Warfare which says the following: “Formulation of the ‘joint campaign’ originally came from the ‘Number One Publication in November 1991 of the United States Armed Forces Joint Operations’ regulations issued by the US Military Joint Conference . . . This regulation exposes the four key elements of the ‘joint campaign’ –centralized command, equality of the Armed Forces, complete unification, and total depth while doing battle. It has made clear for the first time the command control authority of the battle zone unified commander; it has stipulated that any one military branch can 5ake a leading role based on different situations; it has expanded air/ground integrated battle’ into ground, sea, air, and space integrated battle; and it has emphasized implementation of total depth while doing battle on all fronts.” Citing the colonels further, they go on to explain: “The limitations of this valuable thinking , however, lies in that its starting point and ending point have both fallen onto the level of armed force and have been unable to expand the field of vision of ‘joint’ to all of the realms in which humans can produce confrontational behavior. Surely, this a direct reference to their idea of weaponizing almost every enterprise and endeavor in which China can come into contact with the US.

Pushing ahead, the two colonels consider total dimensional warfare, a theory bandied about in the US Army’s Training and Doctrine Headquarters concerning non-military combat operations and referenced the 1998 edition of the compendium, The Essentials of War, which emphasized “a single principle covering all types of the Amy’s military operations.” Spalding quotes them as writing: “Their practice [the US Army] is to no longer distinguish between non-combat operations and general military operations, but to differentiate battle operations into four types–attack, defense, stabilization, and support–and return the original manuscript to such responsibilities of non-combat operations as a rescue and protection and reassembling the old set of combat operations, in order to . . . altogether discard the concept of “total dimensional warfare.” In evaluating their own imperfect assessment of thinking in the US Army which they apparently conflate with thinking across the board in the US Armed forces and the US Department of Defense, Spalding further cites the two colonels as saying: At face value, this a move of radical reform and simplification by simply cutting the superfluous. In reality, however, this is . . . poor judgment. At the same time as the theoretical confusion brought by the unripe concept of ‘non-combat military operations’ was eliminated, the rather valuable ideological fruits that they had accidentally picked were also abandoned on account of the newly revised compendium. . . . Further criticizing the thinking of US military thinkers, the two colonels admonish: ” ‘Total dimensional war’s’ understanding of battle is already much broader than any previous military theorist, but as far as its innate character is concerned, it still has not escaped the ‘military’ category. For example, the ‘non-military combat operations’ concept . . . is much broader in meaning than military operations and can be placed along with comparable war realms and patterns outside the field of vision of American servicemen. It is precisely this large domain that is the area for future servicemen and politicians to develop imagination and creativity–with the result that it also cannot count as truly meaning ‘total dimensional.’ “

In evaluating what the two colonels have stated, Spalding interestingly states in agreement that just considering warfare from the point of view of the application of military force is insufficient. He points out that from his experience on the Joint Staff at the Pentagon that a US President “has numerous levers of power under his control, which can easily lead to overreliance on military options.” Going further he states: “At the end of the day, our system is still geared to leaning on the military and hard power as our best deterrent. That leaves the rest of the playing field open to the Chinese way of war.

All the ways in which that Spalding says China has engaged as beyond-limits combined war–taking every enterprise and endeavor in which one country can come into contact with another, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational, and weaponizing them–would be activities that fell in the province of a country’s intelligence services. Intelligence services engage in a incredibly broad array of both open and clandestine, and covert activities, using appropriated tools and available resources, to create or exploit opportunities to act in support of the policies and the interests of their countries. Legions of agents or operatives are recruited by intelligence services worldwide to work to meet collection requirements and otherwise in various fields and in a multitude of organizations too large for most services to maintain sufficiently trained staffs of professional officers and agents to cover. Recruited spies are selected for their facilities and tabs are kept on the lot of them in reasonable, undetectable ways to avoid the potential double-cross. The Roman historian and politician, Publius Cornelius Tacitus, known as Tacitus (c. A.D. 56 – c. A.D. 120), remains widely regarded as one of the greatest Roman historians by modern scholars. His final work, Annales (The Annals) is a history of the Roman Empire from the reign of Tiberius to that of Nero, the years A.D. 14–68. In Book I, chapter 58, he writes: Proditores etiam iis quos anteponunt invisi sunt. (Traitors are detested even by those whom they prefer.)

The weaponization of the ordinary, the day-to-day, in the intelligence world has been taken to extremes in the spy genre of film, particularly with the series, “James Bond” in which a shoe would become a telephone, a pen would become a pistol, a car would become a submarine, and so on.

It is understandable that China’s state-run and private sectors would work together to act against foreign opponents and imaginably even friends. It would appear from Unrestricted Warfare  and War Without Rules they call it beyond-limits combined war. Cynics might make the case that Spalding has gone a long way in War Without Rules to make what is actually rather mundane appear novel and intriguing. On a more practical level, and to avoid unnecessarily offending any US or foreign intelligence service, the operations of the erstwhile foreign intelligence service of the Deutsche Democratische Republik (German Democratic Republic, also known as East Germany or GDR) during the Cold War are discussed here to provide an example of an intelligence service engaged in beyond-limits combined war.

Generaloberst Markus Wolf, chief of the erstwhile German Democratic Republic’s (East Germany’s) foreign intelligence service, Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance). All the ways in which that Spalding says in War Without Rules that China has engaged as beyond-limits combined war–taking every enterprise and endeavor in which one country can come into contact with another, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational, and weaponizing them–would be activities that fell in the province of a country’s intelligence services. For instance, East Germany’s foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), with frightening efficiency, operated against its Western opponents to collects as much information possible in preparation for any conflict in Europe between East and West, and be in position to potentially break down the societies of the Eastern Bloc’s opponents from within. Throughout the Cold War, his agents poured into West Germany and when possible countries beyond, secured key positions, and reported on, and influenced the activities of, a multitude of organizations in a broad spectrum of areas, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational.

For 34 years, Generaloberst Markus Wolf was the very successful head of GDR’s foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA. With frightening efficiency, he developed an array of tactics, techniques, procedures and methods for operating against his Western opponents in advance of any eventual conflict in Europe between East and West, or to break down the societies of opponents of the Eastern Bloc. Throughout the Cold War, his agents poured into West Germany and when possible countries beyond, secured positions, reported about, and influenced the activities of a multitude of organizations in a broad spectrum of areas, social, political, diplomatic, military, commercial, financial, scholarly,  scientific, and informational. 

Wolf described the work in his memoir, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997). In Chapter 4, he recounts the process of penetrating non-military combat targets for exploitation. He explains: “Once accepted in West Germany, agents usually began their assignments with an inconspicuous period of manual labor to help overcome the bureaucratic barriers of getting established in the West. We therefore preferred candidates with craftsman’s skills or practical experience in a profession. Almost every one of the students and budding scientists who emigrated in the early years found employment in research facilities or companies of interest to us–the Federal government’s nuclear research facilities in Julich, Karlsruhe, and Hamburg; the Batelle Institute in Frankfurt-am-Main, which had been set up by the United States; Siemens, Germany’s largest electronics company; and IBM Germany or the giant German chemical companies BASF, Hoescht, and Bayer. Because we assumed that Germany’s traditional arms manufacturers would–after the storm over German militarization died down–eventually resume military production, we also placed people in companies such as Messerschmidt and Bölkow.” With specific regard to the controllers, they were not mere handlers of spies in the West but expert psychologists who prided themselves on their close personal ties to their charges on the ‘invisible front’.” (For those interested in more on Wolf and the HVA, see the November 13, 2019 greatcharlie post entitled Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997) for a bit more detail on the matter.)

As a brief thought, perhaps some push back would have been caused in the minds of two the colonels if they had been made aware of the fact that the US Intelligence Community includes a number of organizations from the armed forces and the Department of Defense, to include the US National Security Agency, and human intelligence elements that are staffed in great measure by US military personnel and led by military commanders. From that fact, perchance they would even admit that the US armed forces for quite some time, have been engaged to some degree in beyond-limits combined war worldwide.

Chapter 11: “Fighting Back with New Rules”

In Chapter 11: “Fighting Back with New Rules”, Spalding unleashes one insight after another on how the US should respond to beyond-limits combined war. He explains the US needs a defense to meet an offensive we are only beginning to understand beyond-limits combined war. China is quite different as an opponent than the Soviet Union because it has become the factory of the US providing cellphones to toys. Through its theft, China is becoming competitive in the most high-tech areas such as super computing and artificial intelligence. They have a space program and a rapidly growing military. They have suddenly developed a nuclear arsenal that could potential match that of the US.

Taking lessons from Unrestricted Warfare, Spalding writes the US can begin to exploit a range of economic problems. China has a government of one man, one rule which has never worked. He says world opinion is turning against China due to its blatant aggression. He suggests the same principles of Sun Tzu which the authors of Unrestricted Warfare espoused, should be used to respond to the strategy: Know the face of war: it is combined, unrestricted war that seeks victory through no violent means, but does not rule out violence; Know your enemy, his strengths and weaknesses; Join your forces to meet the threat: create one-mindedness”. Focusing the many parts of our government on the single objective of stopping China is essential; and, The people must be in harmony with their leaders.

Spalding says the US needs to map out a globally inclusive strategy built on three pillars: protect, rebuild, and inspire. These three pillars would found a robust effort to reshape the international order away from the totalitarian form of government upon which China is built and wants to impose on the world and toward the promotion of human rights, democracy, civil liberty, rule of law, and economic prosperity. Exploitation of labor and environmental challenges must also be confronted as global supply chain reorient to nations that support competitive markets, strong labor protections and environmental standards. 

Protect

Refine and export tools that encourage those nations that play by the rules of fair and open markets to tighten collaboration in economic, financial, trade, and information flows. The ability of rule breakers to use the US and partner countries to exploit the free system’s near open borders to avoid tariffs and other protections. Examples Spalding provides for such activity includes: making tariffs permanent for the Communist Party of China-led economy and contingent upon an annual vote in the US Congress,  which would consider whether China is a human rights violator and if it has a market based economy. On finances, he suggests the US Department of Labor allow every person in the US who participates in a public or private pension fund to opt out of sending their investment dollars to China and designate that portion of their funds be invested manufacturing in their local communities.

Rebuild

Spalding recommends a massive movement in fiscal spending “away from guns toward butter.” By focusing on infrastructure, our industrial base, energy, STEM education, and research and development, the US will rebuild its core economic and science and technological superiority to lead the world once again. Explaining that idea, Spalding says $100 billion from the defense budget could be shifted to a massive research and development and reindustrialization effort focused on quantum computing, artificial intelligence, machine learning, 5G and telecommunications, “the internet of things”, nuclear and carbon-free energy, data science, cryptocurrency, biopharma, robotics, logistics, manufacturing, and transportation. Those investments would be protected with a robust counterintelligence program designed to ensure the benefits of these investments only accrue to the US and its allies and partners.

Inspire

Spalding states that the US should join with “developed” allies and partners to create a strategic economic development plan that seeks to promote collective economic prosperity tied to democratic principles. He proposes that idea be brought to fruition via the creation of an organization able to work with like-minded developed countries to identify and promote the economic prosperity and institutional integrity of like-minded developing partners. 

Among further recommendations in this province, Spalding says a Global Development Fund for Democratic Infrastructure Investment should be developed with a mandate to analyze the global trading routes and infrastructure to invest in a robust, resilient international logistics architecture, which would promote free trade, secure and verifiable customs procedures, and the collective economic prosperity of like-minded countries. Attendant to that, he states an international data-tracking system should be developed to inform where the US, allied countries, and their respective companies are investing to assist smaller companies and institutional investors to allow them to take advantage of the accompanying economic growth prospects. Spalding feels that by linking “a resurgent economic and science and technological powerhouse” with democratic-allied and partners countries, the US will forge a new consensus, which will begin to drive positive outcomes in international institutions such as the UN and World Trade Organization. Together, this coalition of free countries with strengthened economic, financial, trade, and informational ties, girded with a robust military alliance focused on deterrence, will fuel a rebound in the growth of democracy around the world 

Spalding insists that there are many specific actions that extend from those strategic concepts that cover all aspects of US society. He concisely examines a few realms among which those actions could occur: political; economic; diplomatic; information; education; military; consumers; and voters.

As it is generally taught in US military educational institutions, for the US to achieve optimal outcomes following a military conflict–in the case with China, non-combat military operations, it must converge all four elements of national power—diplomacy, information, military, and economics (DIME)—into a cohesive, multi-domain campaign plan before, during, and following military confrontation. Here are Spaldings recommendations that concern those elements.

Diplomacy

Spalding praises the Quadrilateral Security Dialogue (Quad Alliance: US, Japan, Australia, India) As a strong deterrent to Chinese aggression. It can be strengthened and expanded. As large as Chin’s military might is, when combined with the US, the countries of Asia including South Korea and Vietnam are more than a match. He calls the Australia, United Kingdom,, US (AUSKUS) Agreement an important step in linking the US, United Kingdom and Australia in more than a mere military alliance. The sale of US nuclear submarines to the Australians is an action the Chinese colonels would admire if grudgingly. It draws a line in the sand declaring that China’s actions will be countered. Spalding believes the agreement and the sale have the effect of forcing allies who have maintained close ties economically to China to choose sides. Spalding says the decision really boils down to whether the would prefer to have the US military or the PLA defend their interests in Asia.

US President Joe Biden announcing the AUKUS pact and nuclear submarine deal on September 15, 2021. On screen for their respective announcements on the pact and deal are United Kingdom Prime Minister Boris Johnson and Australian Prime Minister Scott Morrison in Canberra. Spalding calls the Australia, United Kingdom, US (AUSKUS) Agreement an important step in linking the US, United Kingdom and Australia in more than a mere military alliance. The sale of US nuclear submarines to the Australians is an action the Chinese colonels would admire if grudgingly. It draws a line in the sand declaring that China’s actions will be countered. Spalding believes the agreement and the sale have the effect of forcing allies who have maintained close ties economically to China to choose sides. Spalding says the decision really boils down to whether the would prefer to have the US military or the PLA defend their interests in Asia.

Information

Spalding notes one of the greatest successes of China has been the use of information warfare. To challenge that success, Spalding suggests the US government should encourage US-based social media companies to assist more robustly in countering Chinese Propaganda. Facebook, Google, Twitter, and others are committed to publishing accurate information. However, a constant flood of Chinese falsehoods, intended to create political dissension should fall well outside their guidelines. In more sophisticated realms, Spalding says the US needs to protect the next generation of data. For example, one key step the US should pursue is universal encryption. By ensuring that all data in a free society are encrypted, and by developing platforms that allow for safe processing of encrypted data, the West can successfully compete with China in artificial intelligence.

Military

Spalding recognizes that while the two colonels did not envision, at least I. Unrestricted Warfare, a Chinese military thar could confront the US, that day appears to be nearing. Still, he notes that the theory of Unrestricted Warfare is that military expansion is just a ruse to provoke even greater spending by rivals. Starting with their second rate aircraft carriers and the proliferation of missile silos that may or may not hold nuclear warheads, the Chinese military may be more Potemkin than not. On this point through his words, Spalding does not connect the cause for China’s military build up as preparation for the possible invasion of Taiwan. Still, Spalding says he believes China will make a move on Taiwan soon. That would require the US to plan the evacuation of Taiwanese civilians and resupply of Taiwan’s military as well as a plan to destroy the country’s high-tech manufacturing capabilities for computer chips.

Yet, Spalding says there remains some small wrinkle in his own thinking that says under Unrestricted Warfare, that the military invasion on the ground would be China’s last option given it has quite a few nonmilitary options at its disposal. If China truly seeks to avoid a shooting war, perhaps the leadership of the Communist Party of China might attempt to find satisfaction in peace.

Casting its mind back to the aforementioned Livy and his Ad Urbe Condita (From the Founding of the City) (c. 28 B.C.), greatcharlie is reminded of a passage in Book XXX, section 30, in which the historian presents the exordium of the Carthagian general before Roman generals whose forces werecamp outside of the city of Carthage, itself. He wrote: Maximae cuique fortunae minime credendum est. in bonis tuis rebus, nostris dubiis, tibi ampla ac speciosa danti est pax, nobis petentibus magis necessaria quam honesta. melior tutiorque est certa pax quam sperata uictoria; haec in tua, illa in deorum manu est. ne tot annorum felicitatem in unius horae dederis discrimen. cum tuas uires tum uim fortunae Martemque belli communem propone animo; utrimque ferrum, utrimque corpora humana erunt; nusquam minus quam in bello euentus respondent. non tantum ad id quod data pace iam habere potes, si proelio uinces, gloriae adieceris, quantum <dempseris>, si quid aduersi eueniat. simul parta ac sperata decora unius horae fortuna euertere potest. omnia in pace iungenda tuae potestatis sunt. (The greatest good fortune is always the least to be trusted. In your favorable circumstances, in our uncertain situation, peace, if you grant it, will bring you honor and glory;8 for us who sue it is necessary rather than honorable. Better and safer is an assured peace than a victory hoped for. The one is in your own power, the other in the hands of the gods. Do not commit the success of so many years to the test of a single hour. Bear in mind not only your own resources but also the might of Fortune and the impartial god of war. On both sides will be the sword, on both sides human bodies. Nowhere less than in war do results match men’s hopes. You will not add so much glory, if victorious in battle, to what you can now have by granting peace, as you will lose in case of any reverse. The fortune of a single hour can lay low honors already won, and with them those in prospect. In making peace.)

Economic

Spalding says that China has been getting away with so much for so long, forcing it to play by the rules will cause a shock. From the US side, Spalding explains that there are thousands of details that the US Department of Treasury and the US Securities and Exchange Commission could enforce. Congress has been aggressive about proposing new restrictions, such as requiring companies to certify that there is no forced labor in their supply chain. Spalding believes legislation is needed that will alter the view in the corporate sector that it is in its best interest to promote a country that defies free markets and the rule of law. Spalding says the US growth strategy must be looked upon as a matter of national security. US manufacturing that has gone overseas to China must be brought back.

To an extent, top US civilian authorities and military, intelligence, and law enforcement elements of the US foreign and national security policy bureaucracies as well as other policy circles–to include businesses, universities, think tanks, and news media houses, to name a few–are now regularly discussing the matter, at least publicly, displayed concern in studies and reports and more importantly in the spectrum of policy approaches toward China. He also had a haunting suspicion that very few were aware of what was happening. Far less aware of it all was the US public, going on day-to-day believing they were safe and secure from China and every other country for that matter, and the well-being of the country was in the diligent, conscientious, and thoughtful hands of their elected leaders.

Surely the dead-enders among some elected officials, China policy experts, and business executives of firms in the US well-tied and still benefitting immensely from China’s opportunities surely would rebuff what Spalding has been saying. Imaginably, some, perhaps hurt particularly by his insinuations of failing in their respective duties to place concern for their company employees and their country as paramount, would likely look upon him–perchance given what greatcharlie after many years has come to understand about human nature– disdainfully and mock him as something akin to the character of Scottish writer Kenneth Grahame’s The Wind in the Willows (1908), “Mr. Toad”  He writes: “The clever men at Oxford / Know all that there is to be knowed. / But they none of them know one half as much / As intelligent Mr Toad!

In more direct action, Spalding proffers in this section that the US should seek opportunities to counter China’s Belt and Road Initiative, through which it provides countries loans with the aim to gain political leverage. In many cases, countries that have defaulted on those loans have been left with no choice but to give China long-term access to mineral resources or their ports. Spalding calls it a form of economic colonialism which must be countered.

With regard the other 4 points in which he suggests action should be taken: political, education, consumers; and voters, Spalding says the following: 

Political

Spalding states plainly that the US Needs a single coherent team that would manage its opposition, China. He implores that it can no longer reside in twenty agencies. China comes at the US as one force, thereby, the US Needs to be one force to oppose it. He notes that ultimately, a decision on this matter must come from the US President, but the foreign and national security bureaucracies must go in on it, too.

Education

Spalding believes that there is great value in Chinese students’ coming to the US to study, but the system has been abused and needs to be tightened. However, he notes that the point of such exchanges is to encourage the Chinese to learn our values and way of life. The Chinese government has directed many instead to maneuver into positions from which they can steal US technology. Spalding feels the US government has some leverage on this matter as China does not have the capacity or quality of schools to educate the hundreds of thousands of top students that emerge from its secondary school system each year. He reports that US universities earn billions of dollars by admitting them. He insists the universities, themselves, need to do a better job of vetting who is allowed in, and the federal government probably needs to help. Spalding believes denying Chinese students access to any Chinese apps such as WeChat in the US is one solution. Those apps, he explains, are censored and curated by the Communist Party of China. Spalding says the Communist Party of China’s controlling links to the exchange students must be broken, otherwise they will end up doing its bidding without truly understanding or appreciating democracy. Subita causa, fellitur offectue. (Upon removal of the cause, the effect is removed.) 

Spalding notes that related to this is the growing number of academic espionage cases involving professors and graduate students stealing property. Although both Spalding in War Without Rules and greatcharlie earlier here noted that that US counterintelligence and law enforcement has been following China’s activities albeit all are elements of its beyond-limits combined war strategy, alas, effort to identify and neutral Chinese operatives and their networks have not gone so well. With each successful military and civilian intelligence, industrial, and private effort, and there have been far more than a few, the Chinese learn much about the US security measures and how to penetrate government bureaucracies and private organizations from defense contractors to elite universities. Through that incrementalist approach they have enabled themselves to act at will in the US, pilfering research and development and gaining access to US policy planning, contingency plans, and decision making. Some might state derisively that Beijing now knows more about what is transpiring within many US government bureaucracies, businesses, hi-tech firms, and universities than those who have worked in them for decades. The most apparent evidence of that is when equivalents planned products of sensitive and highly classified US research and development projects are constructed and almost mockingly displayed in official parades and technology fairs and conventions as China’s latest technological achievements. China is dead wrong for stealing industrial and high-tech secrets. However, the operational elements of foreign and national security policy bureaucracies of the US and its allies and partners are wrong for failing consistently over two decades to put a halt to China’s fruitful espionage efforts. Rather than reporting goose chases to headquarters, it appears some investigating agents more often press dead ends and repeatedly sift through the same dust, creating a type of self-inflicted wound to their respective organizations’ efforts. More than yielding nothing, such practices result in further darkening their powers to make headway on new cases by using lessons learned based on failures and looking at facts from new angles. 

It is difficult to discern just how much reliance Spalding would place in the US counterintelligence services and law enforcement to thwart China’s unrestricted warfare operations against the US in the various no military realms. To that extent, he rarely mentions them in War Without Rules. Perhaps something more might be read into Spalding’s final statement in this section, “Our counterespionage efforts have improved, but I suspect there is much more that can be done.” Perhaps it is useful to mention that in Chapter 3: “The Magic Shoes of Technology”, Spalding notes that in September 2021, the director of the Federal Bureau of Investigation Christopher Wray stated before the Congress regarding threats to the US that there were more than two thousand ongoing investigations into Chinese espionage in the US. Spalding quotes Wray as saying: “We’re opening a new investigation that’s tied back to China about every 12 hours, and it covers pretty much every sector of the economy in every state in the nation.” Spalding then writes: “The colonels who wrote Unrestricted Warfare would be proud.” (For more on the efforts by US counterintelligence services and law enforcement to fend off beyond limits combined war by China, see greatcharlie’s August 31, 2021 post entitled, “Sidelights on Nicholas Eftimiades, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020))”.

Consumers

Spalding says once again here that US citizens must understand their country is at war with China. It is a war China started, and citizens must avoid doing anything that would make China stronger. He notes, given the fairly common reports in the newsmedia about human rights violations, that China”s actions must be opposed. However, opposing those violations is only one weapon to use against them. Spalding suggests boycotting Chinese products, and avoiding stores that do not sell alternatives made in the US and “democracy-friendly” countries. As War Without Rules was written before current high inflation levels were reached, Spalding suggests “paying a little more and buying a little less as long as products come from the US and reputable countries.”

Voters

Spalding makes the statement highlighted by another reviewer: “We should all be China hawks.” Out of fairness, one might better understand what Spalding meant with these words by citing added to them was a discussion of his concern over what those who seek political office have on their minds about China. He notes the governors have made all kinds of deals with China where the benefits unintended went one way. Spalding feels those whose actions support China over the US interests should be viewed as unpatriotic. That would be particularly true given China’s actions and intentions via unrestricted warfare, beyond-limits combined war. Spalding urges citizens to hold their elected representatives accountable. He albeit aggressively states that China’s actions should be presumed guilty until proven innocent, which is an idea most readers of War Without Rules who adhere to the precepts of the US Constitution, as greatcharlie, would likely feel uncomfortable with. Any pressure that the Communist Party of China can put upon political leaders through corporations that have business ties in China must be thwarted.

Spalding also has a section in this chapter entitled “What Does Victory Look Like?” In it, intriguingly, Spalding does not sound much as the warrior out for blood that some have portrayed him given what is written in this chapter. Rather than explain further, greatcharlie will allow readers to discover what he says and reach their own judgments. Ex inimico cogita posse fieri amicum. (Think that you may make a friend of an enemy.)

Nicolas Malebranche was a 17th century French Oratorian priest and rationalist philosopher. In his works, he sought to synthesize the thought of St. Augustine of Hippo and René Descartes, in order to demonstrate the active role of God in every aspect of the world. Reportedly, after Malebranche read Descartes’ Traité de l’homme, he turned towards a study of mathematics and physics. In his reaction to Descartes’ book is recounted: “The joy of becoming acquainted with so large a number of discoveries caused him such palpitations of the heart that he was obliged to stop reading in order to recover his breath.” Alas, greatcharlie will not go as far as to declare War Without Rules was the manifestation of Divine inspiration through Spalding. Still, as readers may have detected throughout this review, greatcharlie enjoyed reading every bit of the book. Thus, it should not come as a surprise that greatcharlie whole-heartedly recommends War Without Rules to its readers.

It is almost assured that after the first reading War Without Rules, one would most likely go back to the book and engage in that stimulating process repeatedly. There is no telling what insights and how many might be brewed up from within readers after they have had a chance to read through it. Hopefully Spalding will keep on writing books. While writing books may not be as enthralling to him as flying a B-2 Stealth bomber, he nevertheless, is damnably good at it. Vires acquirit eundo. (We gather strength as we go.)

By Mark Edmond Clark

Brief Thoughts from Outside the US Foreign and National Security Policy Bureaucracies on Putin and Facilitating an End to the Ukraine War

Russian Federation President Vladimir Putin (above). Optimistically, some juncture may soon be reached in the Ukraine matter at which Putin might be presented with the circumstance and space to conclude it is time to stop fighting. This may sound unrealistic. It may appear that nothing lies ahead except more death and destruction. The effort must be made to look at Putin and the Ukraine matter from different angles with the hope discovering an approach that will prove to be fruitful. Novel ways at looking at issues, recognizably up to a point, can better enable the astute to grasp what may on the right occasion be a viable line of thinking. Any thoughtful insight could become more relevant and valuable as conceivably in back rooms of Western countries’ foreign and national security policy bureaucracies, where planning and preparation for the contingency of negotiating with Putin over terms for peace in Ukraine may be underway. It is greatcharlie’s hope that the few insights presented here will have the potential to ignite a new line of analyses. Sometimes the smallest key can open the largest door. 

The opportunity to forge the best possible peace between Ukraine and the Russian Federation has long since been passed. That peace could been established before the killing began. However, Kyiv wanted the freedom to decide to join NATO and the EU. It rejected terms that it declare its neutrality. It response was a reasonable, but it could have only led to war with Russia under its current leadership. Much has been lost by both sides already but there remains the opportunity to create the framework for an evolving peace plan that will allow both sides to end hostilities. Optimistically, some juncture may soon be reached in the Ukraine matter at which Putin might be presented with the circumstance and space to conclude it is time to stop fighting. There must be a starting point for Ukrainians to rebuild, rejuvenate their country. This may sound unrealistic. It may appear that nothing lies ahead except more death and destruction. Even so, the effort must be made to look at Putin and the Ukraine matter from different angles with the hope discovering of an approach that will prove to be fruitful. Potiusque sero quam numquam. (It is better to do something late than never.)

Novel ways at looking at issues, recognizably up to a certain point, can better enable the astute to grasp what may on the right occasion be a viable line of thinking. Matters already reviewed and ostensibly settled could potentially be lifted from the region of the commonplace. Thoughtful insights could become more relevant and valuable as conceivably in back rooms of respective Western countries’ foreign and national security policy bureaucracies, where planning and preparation for the contingency of negotiating with Putin over terms for peace in Ukraine may be underway. However, as things are, insights proffered from unapproved sources outside the foreign and national security policy bureaucracies on what Putin “may think” on matter concerning Ukraine, the likely reasons for his choices, and what he sees as the way forward, are more often discounted by practicioners. Such judgments are left to the eye of the beholder. The most available justifications to mark them out are surely concerns quality and disagreement over analyses. Yet, in the foreign and national security policy bureaucracies in perhaps every country, such appraisals are not completely objective. Additionally, as much of what Putin thinks is typically chalked up by experts as an expression of an ugly chip on his shoulder, his contempt for the West, spending time and effort diving deeper on the matter would likely be viewed upon as wasteful. 

Still, individuals as Putin with often have unique reasons for their choices, and no matter how unorthodox, disagreeable, or round the bend as they might seem, they must be applied in analyzing their decisionmaking process to have a chance at accurately predicting their moves. Perhaps greatcharlie marks itself as old fashioned but it believes even analyses of “unapproved outsiders” on what Putin thinks should not be looked upon as entirely unilluminating. At a minimum, many should be docketed for consideration later in its proper context. 

Later on, they may bring analysts to an understanding of those matters they had not held before. It is greatcharlie’s hope that the few insights presented here will have the potential to ignite a new line of investigation and analysis. It briefly highlights cause and effect, the interesting associations between things, yet avoids making too many charitable assumptions. Sometimes the smallest key can open the largest door. Non enim tam auctoritatis in disputando, quam rationis momenta quærenda sunt. (In every disputation, we should look more to the weight of reason than to the weight of authorities )

Putin’s problems with the West began long before the Ukraine crisis and subsequent invasion in February 2022. Although the reality is that Russia has invaded Ukraine, for a second time in less than a decade, and taken a good portion of its sovereign territory, Putin insists Western capitals are the ones with covetous minds. He often points to what the “insidious” way in which the US and its Western friends in the EU rolled up to Russia’s border with NATO in tow despite earlier understandings reached that they would never do so. Within the foreign and national security policy bureaucracies in Western capitals, his singular perspective was likely looked upon casually as one more of Putin’s pretensions. Seeing how the situation stands, with Russian forces controlling Crimea and the Donbas, it would appear that he is grabbing parts of Ukraine to enrich Russia. Except for his two daughters, each woman formidable in her own right, the only real family Putin has in that sense is Russia. Russia is his mother, his father, his home. Perhaps in part for this reason, it should not be so hard to understand why Putin had taken such a maximalist position on Ukraine, the need to invade, the West. and NATO prior to February 24, 2022.

Putin’s Feelings About the West: Brief Meditations

For Russia, the anticipated waltz through Ukraine became a national emergency and some policy analysts and newsmedia commentators began to say the invasion would ultimately be Putin’s last act. The Ukrainians were not supposed have a cat in hell’s chance of “winning” the war.” Yet, if not for lack of just about everything needed high-speed, high-empo, high-intensity maneuver operations except good soldiers and courage, it initially appeared to many after Russia’s Kyiv debacle that Ukrainian forces might have been able to deliver a crippling blow of Napoleonic proportions to their opponent and perhaps forced Moscow to negotiate terms for peace. Putin could not turn back so easily. He certainly cannot afford to lose. Once the situation began to look unsatisfactory for Russia on the ground, one could have gathered from Putin’s statements and actions on Ukraine that he felt he was in a fight for survival for both Russia and himself. He appears to view the fight in Ukraine as a climatic stand, their present-day version of the Malakoff Redoubt, Stalingrad, or the Neva Nickel. 

Luckily for Putin, Russian Federation General of the Army Aleksandr Dvornikov, who was appointed commander of the special military operation in Ukraine on April 9, 2022, has seemingly orchestrated a regrouping of Russian forces after those relatively disastrous initial weeks of the special military operation. As of this writing, especially in the Donbas, Ukrainian forces have faced retreats, setbacks, and even surrenders as in Mariupol. A land bridge between Crimea and Donbas has been created by Russian forces. It remains to be seen whether Russian forces have truly gained the initiative, and if so  whether they can retain it. From what the international newsmedia mainly reports that with everything taken into consideration, especially military assistance from the US, the war in Ukraine could still end in either side’s favor.

Despite the many challenges encountered as a result of his Ukraine venture, Putin leaves no doubt that he is doing what he feels must done for Russia and he believes he is on the right track. As it was illustrated in greatcharlie’s preceding, May 30, 2022 post entitled, “Putin the Protector of the Russian People or the Despoiler of Ukrainian Resources: A Look at War Causation and Russian Military Priorities in Ukraine” concerning war causation, there is an intellectual foundation to his choices. (There would be plenty of disagreement with that idea among those who loathe Putin as much due to bias than to sound argument.) 

Although the reality is that Russia has invaded Ukraine, for a second time in less than a decade, and taken a good portion of its sovereign territory, Putin insists Western capitals are the ones with covetous minds. He often points to what the “insidious” way in which the US and its Western friends in the EU rolled up to Russia’s border with NATO in tow despite earlier understandings reached that they would never do so. Within the foreign and national security policy bureaucracies in Western capitals, his singular perspective was likely looked upon casually as one more of Putin’s pretensions. Seeing how situation stands, with Russian forces controlling Crimea and the Donbas, it would reasonably appear that he is grabbing parts of Ukraine to enrich Russia. Doubtlessly, that was a planned attendant outcome of each occasion when Russia marched into Ukraine but not Putin’s priority. Except for his two daughters, each woman formidable in her own right, the only real family Putin has in that sense is Russia. Russia is his mother, his father, his home. Perhaps in part for this reason, it should not be so hard to understand why Putin had taken such a maximalist position on Ukraine, the need to invade, the West. and NATO prior to February 24, 2022.

Missteps with Putin

Putin’s problems with the West began long before the Ukraine crisis and subsequent invasion in February 2022. In its January 25, 2022 post entitled, “Resolving the Ukraine Crisis: How Better Understanding Putin and the Subtle and Profound Undercurrent Influencing His Thinking on the West Might Help”, greatcharlie briefly discuss much of what was at the nub of the matter. Portions of that discussion are provided here.

The formal inclusion of the new Russian Federation in the high realms of international politics following the collapse of the Soviet Union was nobly attempted. A seat in the Permanent Five Members of the UN Security Council was inherited from the erstwhile Communist state. As important, Russia began to engage in separate meetings with leaders of the intergovernmental group of the leading economic powers, the G7, in 1994 while Russian Federation President Boris Yeltsin was in office. Russia formally joined the group in 1997 at the invitation of US President Bill Clinton and United Kingdom Prime Minister Tony Blair. This noble step was ostensibly taken in the name of international peace and security. Surely, inviting Russia to join the G7 was more than a friendly gesture and a fresh start. Membership would plug Russia into the international order, forestalling any burgeoning sense that if left isolated, control in Moscow might fall fully into the hands of organized crime groups, and so would Russia’s nuclear arsenal. Russia membership would more importantly plug the G7 countries vis-à-versa into Moscow in a structured way, creating an effective, stable line of communication and political and economic influence.

When Putin became Russian Federation President, he took the seat created for Yeltsin at what became the G8. Perhaps the other G8 leaders felt that it was important to keep Russia in the G8 for the same reasons it was brought in but also hoped that keeping Putin in their circle might stir and help sustain a great desire within him to make Russia a country “like to one more rich in hope.” Other national leaders of what became the G8 may have thought that Putin would passively acquire an appreciation of their world, imagine the potential of a rejuvenated Russia fitting into their world, and acquire similarities with them. However, their eyes appear to have been closed to what was happening with Putin and Russia and why the move was nearly doomed to fail to ameliorate East-West tension in the long run especially due to his personality then.

At the G8, national leaders would come to the big table committed to having a positive impact in not only economic affairs, but world affairs in general. The existing seven members–the US, United Kingdom, Canada, Japan, Germany, France and Italy, plus the EU–were bound by shared values as open, democratic and outward-looking societies. Russia was not a country completely devoid of desirable things, Russia possessed natural resources, particularly oil and gas which the energy industries of the other powers coveted. Certainly, Russia retained the power to destroy with its nuclear arsenal and the residue of the once powerful Soviet military. However, Russia was hardly developed enough to participate in that way as a member.

As for Putin, he had not as yet grabbed all reins of power firmly in Russia, much as he tightly grips them today. It is not inconceivable that his political qualities were not fully scrutinized by any member state. However, more pertinently, Putin was unlikely ready to manage Russia’s stake at the G8 when first began participating in leaders’ summits. Looking into Putin’s inner-being, it is possible that Putin, while in his own way appreciating the status G8 membership bestowed Russia and him, felt well-out of his comfort zone and despite his ego, felt that the manner in which Russia acquired G8 membership was counterfeit. For Putin to be satisfied at that time, Russia would need to possess membership on his terms, legitimate terms. Within G8 meetings, Putin presented himself with grace and charm befitting his position. If Putin ever got the idea then that Western leaders enjoyed observing him outside of his comfort zone or disrespected him in any way, he would unlikely be able to hide his anger in his countenance and dwell on lashing out in some big way. Perchance at some point Putin might have imagined that the other technologically advanced countries used G8 meetings as a stage to lampoon Russia. He would be seated before them as they flaunted their economic power and progress while giving the impression in occasional off-handed comments and perhaps in unconscious condescending behavior toward him, that they imagine everything about Russia being tawdry and slipshod, particularly its goods and services, and would describe its industrial centers resembling a carnival the day after the night before. Perhaps such thinking could be said to have some validity given that such was essentially the case in early post-Soviet Russia. Putin had already brought to the table a sense within himself that Russia remained vulnerable to Western plans and intentions. That sensibility seemed to stick regardless of all else good that came his way through the G8. The G8 experience overall may have left a bad taste in his mouth. It is likely other group leaders may not have imagined that would be the outcome.

As a result of Euromaidan, power changed hands in Ukraine, and a series of measures that enhanced Western influence were taken. Putin responded robustly. The escalation of a struggle between ethnic Russians in Donetsk and Luhansk with the fledgling democratic Ukrainian government was followed by the greater step of Russia’s seizing and annexing Crimea, which at time was the sovereign territory of Ukraine and most national capitals say it still is. His actions resulted in Russia being placed back into what was supposed to be isolation; it was put out of the G8 and hit with many punitive economic measures. Both Putin and Russia have seemingly survived it all. Although Russia was suspended from the G8–once again the G7, Russia delayed announcing a decision to permanently withdraw from the group until 2017. Surely, Putin had great concerns over the perceptions in Russia and around the world of the decision of the G7 countries. Putin appears to have had a morbid fear that the G7 countries were exercising power over Russia and himself. That would not do. By waiting, Putin allowed himself to retain a sense of  control over the situation, choosing when Russia would depart. He exist in the substitute reality that his country had not been pushed out of the organization and marginalized. As far as he was concerned, Russia was still a member of the club of the most powerful countries. Despite everything, that recognition remained an aspiration of his at that time. It was an odd duality. Satisfying Putin’s desire then for Russia to possess the ability to discuss world problems with the leaders of the most influential countries, was Russia’s continued membership in the G20. The Group of 20, G20, in essence is a group of finance ministers and central bank governors from 19 of the world’s largest economies, including those of many developing nations, along with the EU. While the G7 existed for the top-tier industrialized countries, the G20, formed in 1999, provided a forum for the discussion of international financial matters that included those emerging economies which at the time began to represent a larger part of the global economy. The G20’s aim is to promote global economic growth, international trade, and regulation of financial markets.

Body language can reveal plenty! Putin speaking (top left). Leaders from Canada, France, Germany, Italy, Japan, Russia, the US and United Kingdom meeting at Lough Erne in Northern Ireland for the G8 Summit 17-18 June 2013. Within G8 meetings, Putin presented himself with grace and charm befitting his position. If Putin ever got the idea then that Western leaders enjoyed observing him outside of his comfort zone or disrespected him in any way, he would unlikely be able to hide his anger in his countenance and dwell on lashing out in some big way. Perchance at some point Putin might have imagined that the other technologically advanced countries used G8 meetings as a stage to lampoon Russia. He would be seated before them as they flaunted their economic power and progress while giving the impression in occasional off-handed comments and perhaps in unconscious condescending behavior toward him, that they imagine everything about Russia being tawdry and slipshod, particularly its goods and services, and would describe its industrial centers resembling a carnival the day after the night before.

Intriguingly, Putin did not attend the G20 summit in Rome in October 2021, informing the organization that his decision was due to concerns about the COVID-19 pandemic. Not to take precaution in these times would be short-sighted, but for Putin to abstain from physically attending a G20 leaders summit could indicate that the organization, for at least that moment, may have had less meaning to him. Putin participated in the summit in Rome via videolink, but the optics were hardly favorable. Reportedly, Putin coughed quite a bit during the meeting creating questions in the minds of others about his condition. That seemed unusual for a man who exudes strength and robustness.

One must add to this story the influence of the destructive impact of the West on the Russian economy and the country’s efforts to “build back better” immediately following the collapse of the Soviet Union on Putin’s thinking. As discussed in the June 18, 2019 greatcharlie post entitled, “Why Putin Laments the Soviet Union’s Demise and His Renewed “Struggle” with the US: A Response to an Inquiry from Students,” Putin would doubtlessly explain that under Yeltsin, the Russian leadership made the mistake of believing Russia no longer had any enemies. Putin, while ascending to the top in the new Russian Federation, saw how mesmerizing “reforms” recommended to Yeltsin’s government by Western experts unmistakably negatively impacted Russia’s economy in a way referred to somewhat euphemistically by those experts as “shock treatment.” Yeltsin was unaware that Western experts were essentially “experimenting” with approaches to Russia’s economic problems. His rationale for opening Russia up to the resulting painful consequences was not only to fix Russia’s problems but ostensibly to establish comity with the West. The deleterious effects of reform recommended by Western experts’ could be seen not only economically, but socially.  In another statement made while he was acting President in 1999, Putin diplomatically explained the consequences of relying upon foreign experts for assistance. He stated: “The experience of the 90s demonstrates vividly that merely experimenting with abstract models and schemes taken from foreign textbooks cannot assure that our country will achieve genuine renewal without any excessive costs. The mechanical copying of other nations’ experience will not guarantee success, either.” Once fully ensconced as Russia’s leader, he would publicly state that the greatest danger to Russia comes from the West. He also brought that sensibility to the G7 table with him. The memoirist, popular poet, and civil rights activist, Maya Angelou for Beautifully Said Magazine (2012) stated: “I’ve learned that people will forget what you said, people will forget what you did, but people will never forget how you made them feel.”

Putin has an excellent memory. Putin believes he was treated badly, and knows he and Russia deserved better. However, at this point, Putin seems less interested in opinions of him in the West or his international audience for that matter. As far as he might be concerned, members of those organizations can have their way. Unlike the past, Putin made certain not leave the West with the ability to derail his plans, or give them the intellectually opening to disturb him. Coercive economic tools at their disposal are illusions of power that Putin would in time disintegrate by shining light on the realities they may have ignored. To that extent, indications are that Putin has instructed his officials not to tolerate any untoward behavior from those in the West with whom they may meet. It would be best for them to just walk away rather than subject themselves to mistreatment and outrageous calumny.

Dangling that which would most content the opposing party in order to compell its good behavior has been a method used to resolve disagreements and conflicts between empires, countries, city-states, and families for seemingly aeons. It can lubricate diplomatic exchanges and create favorable outcomes. It often resulted in sense of mutual tolerance and peace with honor between opposing parties. It all sounds quite transactional, because it is. Western political leaders are well-aware that Putin’s strongest interests lie in the province of developing commerce. As such, that interest could have been used as a lever in a well-considered, calibrated way the gain a handle on the Russian leader. Western powers could lend furtive or mildly acknowledged copious support that would enhance what the Russian President, himself, might recognize as weaknesses in his system in exchange for significant, immediate and long-term cooperation. Again, what would be most important is getting him to go along with whatever plan is developed. (Many might argue that this practice was used without shrewdness, without any real calibration, by the US in the construction of the Joint Comprehensive Plan on Action of 2016 concerning nuclear proliferation in the Middle East.) If lucky enough, the diplomacy of national leaders who would have engaged in such action in the earliest stages of the Ukraine crisis–pre-invasion–would have likely been able to offer a narrative in which they could have been seen as saving the day.

However, instead of any of this, awareness of that commercial interest in Western capitals has led to the targeting of it to cause his hurt, harm, and even pain and resultantly his ire and recalcitrance. (It has also been important for Putin to recognize the West is entitled to its share of ire and recalcitrance, and when a situation is moving favorably, he must also consider his actions with respect to Western reactions. There must be a commitment on all sides, including Russia,to the advancement of negotiations to secure a sustainable agreement. One might get the impression given his record that he has not reflected too much on that in recent times. Then again, perhaps he has.

It is unimaginable that Western political leaders decided to target that commercial interest unaware of its terrible importance personally to Putin, although that possibility cannot be completely dismissed. From what can be gathered, the choice to handle Putin in that way was made a while back. It was most apparent in the US when the US Congress passed the Russia and Moldova Jackson-Vanik Repeal and Sergei Magnitsky Rule of Law Accountability Act of 2012 (the Magnitsky Law) and subsequent Global Magnitsky Act of 2016, which struck a nerve with Putin not only for economic reasons, but domestic political reasons as well. The Magnitsky Law,set precedent with regard to the manner in which the West would act to modify Putin’s behavior as well as that of other Russian officials and private citizens. Omnia mala exempla ex rebus bonis orta sunt. (Also, omnia mala exempla orta sunt ex bonis initiis.) (Every bad precedent originated as a justifiable measure.)

Putin (above) at work in the Kremlin. Western countries have imposed unprecedented sanctions on Russia’s corporate and financial system since it sent troops into Ukraine on February 24, 2022. At this stage of the game, however, Russia hardly seems too deprived by coercive sanctions from the West. One might suggest the West’s moves against Putin and Russia became overplayed and predictable, and thereby anticipated and prepared for, to the greatest extent possible. Reportedly, in preparation for the US response to the invasion of Ukraine, Putin drastically curtailed Russia’s use of dollars, and thereby a degree of leverage the US might have had. Enormous currency reserves were stockpiled, and budgets were streamlined to keep the economy and government services going even under isolation. Putin also reoriented trade and sought to replace Western imports.

Western Sanctions in Response to Ukraine’s Invasion

At this stage of the game, however, Russia hardly seems too deprived by coercive sanctions from the West. One might suggest the West’s moves against Putin and Russia became overplayed and predictable, and thereby anticipated and prepared for, to the greatest extent possible. Reportedly, in preparation for the US response to the invasion of Ukraine, Putin drastically curtailed Russia’s use of dollars, and thereby a degree of leverage the US might have had. Enormous currency reserves were stockpiled, and budgets were streamlined to keep the economy and government services going even under isolation. Putin also reoriented trade and sought to replace Western imports. It is not greatcharlie’s intention spoil anyone’s appreciation of this essay by offering a regurgitation on the nuance of steps Putin has taken at home to better shield Russia from the harmful effects of Western sanctions. Economics is not greatcharlie’s area of expertise. Suffice it to say that nothing done by the West just before and following February 24, 2022 unsettled Putin.

Indeed, once the whole Ukraine crisis began in earnest, the West metaphorically began wielding an economic bullwhip of sanctions to back him up. Perhaps from the perspective of the West, all that Putin was being asked to do was to behave as a good chap on Ukraine because be knows he should, given the conventions on international law, international peace and security, and multilateral agreements Russia signed with Ukraine as the Budapest Memorandum design to preserve it from military threat. However, it is hard to see how they could ever have expected to get far with that mindset or that tack. When his invasion began in earnest, the West flailed him harder with the whip. However, no matter how hard the West lashed out, Putin would not respond. He would not even put his demands up for Dutch auction. Putin has recently declared Western sanctions have not had much impact on Russia’s economy and have done more to harm global trade and the international economic system. Putin certainly feels confident his measures to sanction-proof Russia worked to a great degree. Speaking on the state of Russia’s domestic economy on April 18, 2022, Putin explained that inflation was stabilizing and that retail demand in the country had normalzed.

In the past, Putin surely in an unintended way, would very likely have lent a helping hand to Western efforts to subdue Russia. He often allowed pride to overshadow good sense and discretion, and that often led to miscalculation and errors. It was a gross miscalculation to lash out at the US by interfering with the 2016 Presidential Elections. It is an action Putin has repeatedly denied despite the fact that direct proof of Russian meddling has been presented by US intelligence and law enforcement organizations. Going after Kyiv, to knock out the Western oriented and Western supported government, early in the special military operation was an enormous mistake. Troops that would have been invaluable to the more militarily sensible operations of Russian forces in the Eastern and Southern Ukraine were needlessly lost with no gain. The whole world could see Putin had dropped a clanger. 

It is unlikely that Putin will make many more grand mistakes during the Ukraine campaign. Even if a real opportunity is set before Putin–the tiger and the tethered goat by the waterside scenario, he will very likely pass it up. Wrestling with this issue in a preceding post, greatcharlie supposed that at this point, a course has been set, calibrated by Russia’s best military, intelligence, diplomatic, and political minds, with all available and in-coming resources taken into consideration. There is probably little to no room for any sizable deviation from that path. Still, with all that being considered, almost anything is possible when it comes to Putin. All of this withstanding, there must be an answer, a way to initiate fruitful diplomacy even at this stage. One could get the impression given the record that finding a way to work with Putin, by creating some balance with which all would be reasonably satisfied, is just not a cross any Western capital would be unwilling to bear. Non enim tam auctoritatis in disputando, quam rationis momenta quærenda sunt. (In every disputation, we should look more to the weight of reason than to the weight of authorities.)

Putin (right) gestures during a press conference with French President Emmanuel Macron (left) in Moscow on February 7, 2022. At the foundation of thinking concerning an international order and international organizations created since the end of World War II is idea that members will be answerable to the group of countries they signed up to deliberate and act collectively with. The fact is Putin does not feel answerable to anyone in the world despite Russia’s multiple membership in international organizations as the UN, where it is Permanent 5 Members of the Security Council, and G20. The easy, less than thoughtful answer might be to eject Russia from the G20 or at least keep him teed up on the idea he will be removed. However, that would more than likely make matters worse. Rather than gain a further grip on Moscow’s behavior, parties insistent on doing such would only travel further along into unknown with Putin.

Likely Impact Recent Contacts with Western Leaders Have Had upon Putin

At the foundation of thinking concerning an international order and international organizations created since the end of World War II is idea that members will be answerable to the group of countries they signed up to deliberate and act collectively with. The fact is Putin does not feel answerable to anyone in the world, despite Russia’s multiple membership in international organizations as the UN, where it is Permanent 5 Members of the Security Council, and G20. The easy, less than thoughtful answer might be to eject Russia from the G20 or at least keep him teed up on the idea he will be removed. However, that would more than likely make matters worse. Rather than gain a further grip on Moscow’s behavior, parties insistent on doing such would only travel further along into unknown with Putin.

In a May 31, 2022 New York Times guest essay entitled “President Biden: What America Will and Will Not Do in Ukraine”, US President Joe Biden reminded that  President Volodymyr Zelensky of Ukraine has said, ultimately this war “will only definitively end through diplomacy.” Conceivably, some may believe that with some tacit approval from all allied capitals, French President Emmanuel Macron and German Chancellor Olaf Scholz, have spoken with Putin, most recently on May 28, 2022, to reach some confidential arrangement for more fulsome peace talks or establish the basis for a proposa concerning a ceasefirel to present to him during their next contact. Impossible n’est pas français. They would also have likely sought to chinwag with Putin with the hope of finding and exploiting a sociability that lives in Putin that is surely part of human nature. That is what the noble Roman pagan, Tulius Cicero expressed in his discussion of the idea of commonwealth in De Republica (51 BC) with the words: naturalis quaedam hominim quasi congregation. European leaders have gone as far as to aggregate their efforts with Putin not only as a sign of unity but likely also with hope that acting together they might find the right convention, the right phrases to trigger him to respond favorably to an entreaty to talk.

Searching for some advantage by reflex, Putin might assess that the Western leaders, by acting in pairs or groups, even in their visits to Kyiv, are most concerned that if either their counterparts were to travel or make phone contact alone, they would act out of self-interest, placing the needs of their respective countries uppermost. One leader might not trust another to come toward Moscow empty handed. Some special deal particularly concerning energy resources might be sought. On the other end of their possible mutual suspicions, given what transpired with the February 10, 2022 meeting between United Kingdom Foreign Minister Liz Truss and Russian Federation Foreign Minister Sergey Lavrov, there may be a lingering fear that one might pick a fight with Putin, and all would in the end need to contend with the ramifications of that. (One might suppose Truss’ tack was likely agreed upon with United Kingdom Prime Minister Boris Johnson and foreign and national security counselors before she left for Moscow. The decision may have been to “pull out all of the stops.” Causa latet: vis est notissima. (The cause is hidden, but the result is known.)

To enlarge on that point, Truss’ heated, emotional outburst before the long-experienced Russian Foreign Minister, could be judged as being particularly inept given the need to develop some influence upon Moscow’s line of thinking during the tinderbox circumstances of the time. By her behavior, she merely advertised the limits she had. Indeed, she likely signalled to Moscow that London did not have any remarkable solutions, no good proposals to offer. She seemed to be revealing an angst that Moscow likely presumed to be prevalent among the United Kingdom’s foreign and national security policy decisionmaking officials. She appeared to express a sense of being trapped as lion in cage by the Ukraine situation. Truss’ behavior may have also indicated to Putin that there may be serious problems besetting Johnson’s Conservative Party as a whole, with cabinet members and Tory Members of Parliament feeling uncertain about their respective political futures. For the external audience, Truss may have amused some, but ultimately she did not enlighten or inspire and dismally failed move events forward in a positive way. No foreign official from any country should ever seek to do any of that in Moscow under any circumstance. Vacuum vas altius pleno vaso resonat. (An empty pot makes a deeper noise than a pot that is full.)

Putin doubtlessly feels that Western countries, other than the US, pose little real threat to Russia despite any noise they might make about the prowess of their respective armed forces. (It must be noted that the United Kingdom possesses an estimated 225 strategic warheads, of which an estimated 120 are deployed and 105 are in storage. Added to that deterrent is a total of four Vanguard-class Trident nuclear-powered ballistic missile submarines, which together form its exclusively sea-based nuclear deterrent. As of January 2019, France was said to possess approximately 300 nuclear warheads, most of which are designed for delivery by submarine-launched ballistic missiles (SLBMs) with the remainder affixed to air-launched cruise missiles (ALCMs) carried by strategic bombers.) To that extent,, Putin may believe there are many among certain foreign and national security policy circles in Western countries with a desire to emote more than do anything else such as find real answers to get Putin off Ukraine’s back and over to the negotiating table resolve matters.

United Kingdom Foreign Minister Liz Truss (left) and Russian Federation Foreign Minister Sergey Lavrov (right) at their press conference in Moscow on February 10, 2022 moments before Ivanov walked out. Searching for some advantage by reflex, Putin might assess that the Western leaders, by acting in pairs or groups, even in their visits to Kyiv, are most concerned that if either their counterparts were to travel or make phone contact alone, they would act out of self-interest, placing the needs of their respective countries uppermost. One leader might not trust another to come toward Moscow empty handed. Some special deal particularly concerning energy resources might be sought. Additionally, given the torrid exchange that occurred between Truss and Lavrov during their February 10, 2022 meeting, there may be a lingering fear that one leader might pick a fight with Putin for whatever reason, and all would need to contend with the ramifications of that.

At the same time they tried come to some point of understanding with Putin, Western leaders also have publicly mocked him during multilateral gatherings. During the June 2022 G7 Summit in Schloss-Elmau, Germany they did so publicly on June 26th with regard to shirtless photos taken of Putin while horseback riding. One might not expect Western leaders to speak idly concerning Putin when matters concerning him are now so grave. That intriguing juxtaposition of the ideas of arming Putin’s opponents and mocking him yet contacting him hoping to stoke some goodwill and desire for peace is surely not lost upon Putin and his advisers in the Kremlin. Equally intriguing to Putin was the insistence of Western leaders that they committed to resolving the Ukraine conflict with diplomacy, while also arming the Ukrainians to the extent national budgets and the largess of their citizens–their electorates–will allow or tolerate

Putin might believe many of the national leaders with whom he has been dealing so far, will unlikely keep their jobs given what is likely perceived to be the constantly shifting direction of political winds and the fickle nature of the electorate of Western countries. Remaining the flavor de jure amongst fellow parliamentarians and the electorate is becoming more and more difficult for Western leaders to do. Putin may believe that as time marches on, those remaining in office will surely have greater, more pressing domestic issues to be seen working hard on. Conditions on the ground and terms for a diplomatic solution in which Moscow would have confidence at the negotiating table will be determined by Russia alone. Presumably for now, that is how Moscow most likely views the situation. Through Putin’s lens, the actions of Western leaders, in coming to him, might be best described, in the form of a metaphor, in the chorus of Charles Aznavour’s 1962 pop music hit, Les Comédiens”,: Viens voir les comédiens / Voir les musiciens / Voir les magiciens / Qui arrivent. (Come and see the actors, / See the musicians, / See the magicians, / Who are arriving.)

Nam neque quies gentium sine armis, neque arma sine stipendiis, neque stipendia sine tributis haberi queunt (For the quiet of nations cannot be maintained without arms, nor can arms be maintained without pay, nor pay without taxation.) Whether, the Europeans might be willing to stay the course on Ukraine, Putin might say it remains to be seen. As things begin to settle from the original smash of the war’s opening, the state of the global economy will become clearer, and the Europeans, among many other political factors, may not have the desire to remain so giving if they fail to see any progress by the Ukrainian allies on the ground as they had initially. Supporting Ukraine is one thing. Subordinating ones own country’s superior interests for those of Ukraine is another. On this point, perhaps Putin’s thoughts might be best metaphorically addressed by the final verse to the aforementioned Les Comédiens” sung by Aznavour.  He sings: Les comédiens ont démonté leurs tréteaux / Ils ont ôté leur estrade / Et plié les calicots / Ils laisseront au fond du cœur de chacun / Un peu de la sérénade / Et du bonheur d’Arlequin / Demain matin quand le soleil va se lever / Ils seront loin, et nous croirons avoir rêvé / Mais pour l’instant ils traversent dans la nuit / D’autres villages endormis, les comédiens. (The actors disassembled their boards. / They removed their rostrum / And folded the calicos. / They have left in the bottom of the hearts / A little bit of serenade / And harlequin happiness. / Tomorrow morning, when the sun rises / They will be far away, and we will think it was all a dream. / But for now, the actors are travelling through the night / Across other sleepy villages.)

As for the US specifically, Putin conceivably began the Ukraine enterprise believing he had a good understanding of the way many senior Biden administration foreign and national security policy officials, many of whom had held senior posts in the administration of US President Barack Obama, would respond to a move against Ukraine. Putin had strenuously wrestled with them via diplomacy before and doubtlessly had thought about them considerably since. He possibly intuited that they hold a sense that Crimea was lost on their watch. The nature of his interactions was discussed in greater detail in greatcharlie’s February 4, 2022 post entitled, “Recherché Pieces of the Putin Puzzle That May Serve To Better Enable Engagement with Him as Either an Adversary or a Partner Regarding Ukraine”.

However, what Putin is hearing now from Washington, though far from unnerving him, has unlikely provided him with any comfort. In the same aforementioned May 31, 2022 New York Times commentary, Biden explained that the US does not seek a war between NATO and Russia, will not try to bring about his ouster in Moscow. will not be directly engaged in this conflict, either by sending US troops to fight in Ukraine or by attacking Russian forces, so long as the US or its allies are not attacked, He added: “We are not encouraging or enabling Ukraine to strike beyond its borders. We do not want to prolong the war just to inflict pain on Russia.” He also stated: “The United States will continue to work to strengthen Ukraine and support its efforts to achieve a negotiated end to the conflict.” Having rallied to Ukraine’s side with unprecedented military, humanitarian and financial support, Biden explained: “We want to see a democratic, independent, sovereign and prosperous Ukraine with the means to deter and defend itself against further aggression. Biden further explained: “Every negotiation reflects the facts on the ground. We have moved quickly to send Ukraine a significant amount of weaponry and ammunition so it can fight on the battlefield and be in the strongest possible position at the negotiating table.”

As it would be as true for Russian forces, it would be true for Ukrainian forces that well-planned offensive action by them will determine whether a favorable position for Ukraine can be established. The military principle of offense prescribes that maintaining the initiative is the most effective and decisive way to dominate the battlefield. On the offensive, there must be an emphasis on the commander’s skilled combination of the elements of maneuver, firepower, protection, and intelligent leadership in a sound operational plan. The initiative must be retained. Moving forward, firepower, the allies’ greatest strength, must be used to its maximum advantage. Firepower can serve maneuver by creating openings in enemy defenses, but also destroy an enemy’s vital cohesion, his ability to fight, and effectively act. Indeed, one of the most important targets is the enemy’s mind. The allies should engage in actions that will sway moves by Russian forces to enhance the opportunities to destroy them.

To that extent, Biden stated: “That’s why I’ve decided that we will provide the Ukrainians with more advanced rocket systems and munitions that will enable them to more precisely strike key targets on the battlefield in Ukraine. Further explaining plans for assisting Ukraine militarily, Biden said: “We will continue cooperating with our allies and partners on Russian sanctions, the toughest ever imposed on a major economy. We will continue providing Ukraine with advanced weaponry, including Javelin anti-tank missiles, Stinger antiaircraft missiles, powerful artillery and precision rocket systems, radars, unmanned aerial vehicles, Mi-17 helicopters and ammunition. 

Deep strike assets could be provided to Ukraine in order to allow its ground forces to rapidly put direct and indirect fires on Russian armor and mechanized forces inside Russia at their lines of departure, assembly areas, and follow-on units in marshaling yards, and even transport hubs as soon as Russian forces cross the border. They could target equipment and facilities. However, Putin’s commanders have will some say on their impact on the battlefield, especially if Russian forces could begin to move faster to capture territory and bring into Ukraine  systems to defeat any new weapons the US might provide. At Talavera during the Peninsular War (1809) of the Napoleonic Wars, Chestnut Troop Royal Horse Artillery attached to Brigadier General Robert Craufurd’s Light Brigade, which also included the elements of the 43rd Light Infantry, the 52nd Light Infantry and the 95th Rifles. The brigade remarkably traveled 40 miles in 26 hours, crossing mountain and river, to join the camp of then Lieutenant General Sir Arthur Wellesley (later the Duke of Wellington). Despite their outstanding feat of discipline and endurance, the guns of Chestnut Troop were unable to reach Talavera for the battle. However, even though they had just arrived, the entire Light Brigade had to march for another fifteen hours to secure the Almaraz Bridge, before French Emperor Napoleon Bonaparte’s forces could take it, thereby keeping open communications with Lisbon. US assistance in the form of firepower will certainly improve Ukrainian forces still on the defensive, help them hold on to territory tenaciously, but there is no guarantee such assistance will arrive in time in sufficient quantities to be decisive in ejecting Russian forces from Ukraine.

With regard to Biden’s statements on military assistance overall, the indications and implications of that to Putin would doubtlessly be that the US seeks to establish Ukraine and as well-armed military power on Russia’s borders. For Putin that will never be acceptable. He will work with an untrimmed fervor to prevent that even if it means the unthinkable, the use of nuclear weapons. That is a hard saying.

Putin (right) and Ukrainian President Volodymyr Zelensky (left) in Paris on December 9, 2019. Putin and Zelensky had contact on only one occasion in Paris during a multilateral meeting on December 9, 2019 with French President Emmanuel Macron and former German Chancellor Angela Merkel. The four leaders discussed what was at that time a six year fight in the Donbas between the Ukrainian government and ethnic-Russian separatists in the Luhansk and Donetsk oblasts directly supported by Russia. One might wonder if there was anything so singular about their encounter then that may have led Putin to believe Ukraine could be his for the taking militarily.

What Putin Might Have To Say on the “Zelensky Factor”

As the story goes, Samuel Bernstein, the father of Leonard Bernstein who was among the most important conductors of his time. He was also the first conductor from the US to receive international acclaim. Samuel Bernstein actively discouraged his son from pursuing music. He wanted his son to inherit the hair and beauty supply business he had created. However, Leonard Bernstein became a professional musician. A few months following his famous Carnegie Hall last-minute debut on November 14, 1943, which made him famous overnight, a journalist asked Samuel Bernstein if it was true that he had refused to pay for his son’s piano lessons. Sam famously replied: “Well, how was I supposed to know he’d turn out to be Leonard Bernstein?” No one knew Ukrainian President Volodymyr Zelensky would turn out to be Volodymyr Zelensky when the comedian and actor took office in May 2019. One might suggest that as an experienced stage artist, performing under pressure in center stage, reaching his audience, capturing their attention, is his metier. Nonetheless, he is burning more refulgently than any could have expected, and to a degree,, displaying the qualities often ascribed to great leaders. Aux innocents les mains pleines.

Indeed, likely due to the conviviality he displayed prior to the Russian invasion, Western officials were apparently caught surprised by the fact that Zelensky would be such a lion of a man, stalwart of the Ukrainian cause, and a force to be reckoned with during the actual invasion. To say the least, Western government officials and news media commentators alike would viewed Zelensky as having galvanized the Ukrainian people to resist Russia’s effort to swallow up their country. Zelensky also impressed with his entreaties to the world to come to the aid of his fellow countrymen in the best ways that they could. One might safely assume that his efforts influenced how countries with the wherewithal to respond to the Ukraine in its time of need, worked with him, and rapidly developed and implemented plans to provide considerable support for his country. Indeed, such positive perceptions of Zelensky, his impact, that brought aid groups, humanitarian volunteers, foreign fighters, helpful weapons, and financial support to Ukraine. Although Zelensky, spelled a variety of ways in the international newsmedia, is his name, it is one that to people around the world now know singularly refers to the resilient leader of Ukraine. To that extent, it has become a mononym similar to but not as familiar as Beyoncé or Adele

What Putin thinks of Zelensky is important just for the fact that it surely has some part in the development of his aims and objectives. Surely,at least in part that opinion shaped his concept and intent for the Ukraine campaign. Certainly understanding how Putin feels about Zelensky would determine how a negotiated peace would reached. Rather than have the two presidents talk one-on-one, as with their previous meeting in 2019, a multiparty approach, with presidents, prime ministers, and chancellors, could be utilized. Stepping out on shaky ground, greatcharlie hypothesizes on how Putin may view Zelensky and what has been dubbed the Zelensky factor. The thoughts of Putin suggested here are constructed in the abstract. There is no acid test for what is theorized. One can only wait to hear what Putin says and see how Putin acts. At the same time, each suggestion should prove to be more than something akin to the top five ideas of a brainstorming session. Each has the quality of being most likely. 

None of what is presented should be taken too much to heart by the Ukrainian government and its supporters. Lest we forget an apposite quote, used by greatcharlie previously, from F. Scott Fitzgerald’s essay, “The Crack-Up”, published in the ”February 1936 edition of Esquire magazine: “Before I go on with this short history let me make a general observation—the test of a first-rate intelligence is the ability to hold two opposed ideas in the mind at the same time, and still retain the ability to function. One should, for example, be able to see that things are hopeless and yet be determined to make them otherwise. This philosophy fitted on to my early adult life, when I saw the improbable, the implausible, often the “impossible” come true.”

Putin and Zelensky are oil and water as leaders of adversarial countries at war, but also oil and water intrinsically as people. Given what is understood about Putin’s thinking, his assessment of this novice adversary would hardly charitable. The world heard a bit of that view in Putin’s February 24, 2022 address on the special military operation when he stated the following: “I would also like to address the military personnel of the Ukrainian Armed Forces. Comrade officers. Your fathers, grandfathers and great-grandfathers did not fight the Nazi occupiers and did not defend our common Motherland to allow today’s neo-Nazis to seize power in Ukraine. You swore the oath of allegiance to the Ukrainian people and not to the junta, the people’s adversary which is plundering Ukraine and humiliating the Ukrainian people. I urge you to refuse to carry out their criminal orders.” 

It  could not be said that Putin has a penchant for the abstruse. There were many lurid suggestions about Zelensky, with emphasis on his life-style, circulating long before the invasion that likely undecertainlyrlied Putin’s somewhat Delphic remarks with regard to how “the junta” was “humiliating the Ukrainian people.” Putin may be many things but he is not an anti-Semite. However, at the risk of casting aspersions upon Putin with regard his possible attempt to exploit intolerance toward the LGBTQ+ community in Ukraine, it may be fitting to note that upon taking office,  Zelenskiy promoted a tolerant culture, saying he stands for all people’s equality and freedom. A month after taking office, LGBTQ÷ Community in Ukraine celebrated “Pride Month” on Sunday, June 23, 2022 with a march in Kyiv. That celebration was unlikely widely approved of in Ukraine. According to a survey published six month beforehand by the independent think-tank Democratic Initiatives in which 1,998 people were interviewed, almost 47 percent of Ukrainians think that rights of sexual minorities should be limited while 37.5 percent are against restrictions, and 15.6 percent do not have an opinion. Perhaps Putin had information, maybe simply FSB 5th department pokery-jiggery, that attitudes had not softened or Ukrainians actually had become more intolerant over the last three years.

Interestingly, it was reported first in the Western newsmedia and later in more detail in Russia that much of what Putin was told about Zelensky and the government in Kyiv was the product of fabrications and falsehoods from some the Russian intelligence services, Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU, and Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB. When asked to provide assessments on the situation there, it would appear some in those services sought to simply placate Putin, responding to his sentiments on Ukraine. In the reports of the FSB foreign intelligence department, the organization’s 5th department, there were allegedly many unproven torrid statements on the nature of Ukrainian society made concerning the destructive impact of the West on the culture, morality, spiritually, self-image of the people, ultranationalists, and the leadership in Kyiv, and the Ukrainian people’s willingness to stand fast against an invasion. Conceivably, the information provided in those reports on Zelensky was so satisfying to Putin that it managed to stick with him. 

Putin and Zelensky had contact on only one occasion on December 9, 2019 in Paris during a multilateral meeting with French President Emmanuel Macron and former German Chancellor Angela Merkel. The four leaders discussed what was at that time a six year fight in the Donbas between the Ukrainian government and ethnic-Russian separatists in the Luhansk and Donetsk oblasts directly supported by Russia. One might wonder if there was anything so singular about their encounter then that may have led Putin to believe Ukraine could his for the taking militarily.

Zelensky (on screen) addresses the UN Security Council by video on April 5, 2022. Zelensky has become a bona fide superstar in the West, and as such, the main hope of his Western managers would likely be that his words grip audiences of the powerful and star-studded personalities in their respective societies. After gaining their support for the actions of their respective governments to assist Ukraine, those government would have an easier time convincing ordinary citizens their actions on the matter were all very necessary regardless of expense. Zelensky has moved from one high place to another, the US Congress, the United Kingdom Parliament, the French Parliament, the Italian Chamber of Deputies, the Bundestag along with other European national legislatures. He addressed the NATO Summit, the G7 Summit, the UN Security Council and even venues such as the 75th Cannes Film Festival.

Putin Likely Looked Upon Zelensky’s Recent Effort To Determine What Aid Ukraine Would Recieve with Some Fascination

From Putin’s lens, Zelensky has been allowed the chance by Western powers to be seated, at least temporarily, at their high tables to gain an even firmer handle on Zelensky’s fealty. Putin might say that Zelensky succumbed quickly to trappings of it all much as he would have expected of him. Putin knows the drill all too well as once the effort was made by the West to draw him into such a cabaret. As aforementioned, he was once the dernier cri and darling of Western powers. He at one time was entertained in similar ways as Zelensky by the West. That effort was ultimately unsuccessful.

Zelensky has become a bona fide superstar in the West, and as such, the main hope of his Western managers would likely be that his words grip audiences of the powerful and star-studded personalities in their respective societies. After gaining their support for the actions of their respective governments to assist Ukraine, those government would have an easier time convincing ordinary citizens their actions on the matter were all very necessary regardless of expense. Zelensky has moved from one high place to another, the US Congress, the United Kingdom Parliament, the French Parliament, the Italian Chamber of Deputies, the Bundestag along with other European national legislatures. He addressed the NATO Summit, the G7 Summit, the UN Security Council and even venues such as the 75th Cannes Film Festival. 

Doubtlessly from Putin’s lens, Zelensky behaved as if he had become a new member of the club of Western leaders, and was enjoying every minute of it. Of course, that is exactly how Western capitals want Zelensky to feel. Intriguingly from the start, Ukrainian political leaders oddly expressed an impression that something akin to what young people call a “ride or die” relationship exists between the West and their country. Yet, Putin would likely insist they have erred as the inexperienced would. He would surely suggest that enthusiasm over Zelensky’s popular appeal, interest in Ukraine’s fate, should not be mistaken for some newly established brotherhood between Ukraine and the West, especially now that Russia has made its interests and intentions absolutely clear. If the Russian forces can shape things in their favor, Putin likely believes that will take the shine off Zelensky and Kyiv significantly. Western support of Ukraine continue in considerable measure, but Zelensky, himself, might become quite passé; so Putin would surely predict and hope.

Putin might posit, cynically, that after Zelensky spoke to all of those grand audiences, more support was gained for the Ukrainian cause than might have been achieved without it all. Putin would insist that the West was the true engine behind everything the West had accomplished. He would perhaps say that Zelensky’s heightened image was an aspect of a Western directed, US led, political warfare campaign regarding Ukraine. A Russian intelligence doyen, Putin knows the routine. He doubtlessly could explain forensically exactly how that image by reviewing piles of newsworthy fabrications. some have been exclusives. Moscow has produced its fair share during the war. All in all, Putin would need to accept that if such a political warfare campaign, as he might allege, is being waged by the West, it has been very successful.

Putin could not have missed the fact that Zelensky, more than being just pleased, appeared a bit too confident and too comfortable interacting with Western capitals. There was something to that. When Western leaders deigned to ask him what Ukraine needed–they surely had their own assessments prepared by their respective military, intelligence, diplomatic, and international aid bureaucracies, Zelensky perhaps misconstrued respect and approbation for submissiveness. Recognizably not just to Putin but presumably to all involved at a certain point, Zelensky began behave somewhat spoiled. Most apparently, Zelensky moved a few octaves off the mark and began very publicly offering his “informed” suggestions on what the Western powers should be doing for him then making demands for a line of action to Washington. As part of an effort by officials in Kyiv to be as creative as possible when the war was in its initial stage, two novel ideas were birthed of establishing a no fly zone and obtaining Soviet era MiG-29 fighters from Poland for use by pilots trained to fly them. It is a relatively forgotten issue, but nonetheless very pertinent. The jets would not be excess articles, therefore, to restock the Polish arsenal, the US would provide F-16 fighters. Poland has suggested the re-training of Ukrainian pilots and absorption in their forces would be arranged in Germany. Zelensky’s behavior brings to mind the “Le Misanthrope ou l’Atrabilaire Amoureux” (“The Cantankerous Lover”) (1666), known popularly as The Misanthrope, one of his best-known dramas of 17th century French actor and master of comedy in Western literature, Jean-Baptiste Poquelin, known as Molière. In Act 1 Scene 1, Alceste a disgruntled older aristocrat speaking to his friend Philinte on authenticity, courtesies, and the good of adhering social norms, states: “Non, vous dis-je, on devrait châtier, sans pitié, / Ce commerce honteux de semblants d’amitié. / Je veux que l’on soit homme, et qu’en toute rencontre / Le fond de notre cœur dans nos discours se montre, / Que ce soit lui qui parle, et que nos sentiments / Ne se masquent jamais sous de vains compliments.” (No, I tell you. We ought mercilessly to punish that shameful interchange of hollow facilities. I like a man to be a man, and on all occasions to show depth.of his heart in his words. Let him speak openly and not hide his feelings beneath vain compliments.)

There are certain expectations in interactions, exchanges between countries. Convention requires a certain etiquette. courtesy, expression of respect when asserting ones opinions and beliefs and concerns and priorities. Whatever is discussed must be communicated with the aim of preserving and if possible enhancing the relationship. Zelensky has had learn about such by crash course. He did not have any experience equivalent to working alongside Western capitals at such a level, could hardly had little idea of what was appropriate or what things looked like from their lens or their intentions. Admittedly in the role of apologist in this case, greatcharlie suggests the former comedian and actor, being a novice in politics and on the world stage, had not been up in such rarified air long enough to understand a few important things. His advisers were unlikely much help in that regard. Zelensky could only respond as he knew how. He likely saw nothing but green lights everywhere. 

A tactless approach of a national leader, even of a novice, warrants reproach and rebuff. For Zelensky to believe that he was in any position to determine how other national governments should spend taxpayer dollars, pounds, and euros on Ukraine was daylight madness. Washington doubtlessly recognized that Zelensky has been given attention and has been both supported and admired. However, he should not have felt, as a result of thm respect and courtesies shown to him, entitled to dictate anything to Western governments. Surely, one might say the exigent circumstances that had beset his country made him desperate, even aggressive in his effort to garner as much assistance as possible from those he believed could help. Being 44-years-old at the time, Zelensky was still relatively young. Perhaps he had something to prove to himself or to the Ukrainian people. Interestingly enough, in Molière’s Misanthrope, in the same aforementioned act and scene, Philippe responded to Alceste’s remark by stating: “Il est bien des endroits où la pleine franchise / Deviendrait ridicule et serait peu permise; / Et parfois, n’en déplaise à votre austère honneur, / Il est bon de cacher ce qu’on a dans le cœur. / Serait-il à propos, et de la bienséance / De dire à mille gens tout ce que d’eux on pense? / Ét quand on a quelqu’un qu’on hait on qui déplait, / Lui doit-on déclarer la chose comme elle est?” (There are many circumstances in which plain speaking would become ridiculous, and could hardly be tolerated. And, with all due deference to your austere sense of honour, it is well sometimes to conceal our feelings. Would it be right or becoming to tell thousands of people what we think of them? And when there is somebody whom we hate or who displeased us, must we tell him openly that this is so?)

A couple of Polish Air Force Russian made MiG 29 fighter jets fly above and below two Polish Air Force US made F-16 fighter jets during the Air Show in Radom, Poland, on August 27, 2011 (above). As part of an effort by officials in Kyiv to be as creative as possible when the war was in its initial stage, two novel ideas were birthed of establishing a no fly zone and obtaining Soviet era MiG-29 fighters from Poland for use by pilots trained to fly them. It is a relatively forgotten issue, but nonetheless very pertinent. The jets would not be excess articles so to restock the Polish inventory, the US would provide F-16 fighters. Poland has suggested the re- training of Ukrainian pilots and absorption in their forces would be arranged in Germany. Surely, one might say the exigent circumstances that had beset his country made him desperate, even aggressive in his effort to garner as much assistance as possible from those he believed could help. Zelensky’s comments were not viewed as helpful in Washington.

Perhaps Putin considered Zelensky’s choice to approach the rich and powerful West in such a demanding way was impelled by something bubbling up from his subconscious. He likely Zelensky being what he always has been, a humorist, who by reflex, was making satire of the West and its wherewithal. Putin has a keen eye and taste for dry humor and crni humor. Zelensky may very well have given Putin cause to chuckle in the midst of all the bad that was happening on the ground in Ukraine for Russian forces. Putin probably imagined it all would eventually come to a head sooner than later.

Moreover, Putin perhaps viewed Zelensky’s behavior as being useful, distracting Western capitals, creating the primary narrative concerning Western support for Ukraine while he worked on getting Russian forces away from the horrid meat grinders in Kyiv and Kharkiv in redirected his forces in Eastern and Southern Ukraine. Putin would likely go as far as to call Zelensky a convenient nuisance. As far as Putin was likely concerned, any attention and time placed on Zelensky’s behavior was time not spent increasing the strains they were trying to place on Russia. Zelensky, just as Putin, was willing to exploit any advantage he could find at that point. One aspect which is quite noticeable is that Zelensky seems to comfortably expect something for nothing as if it were the norm in this world. (Perchance Zelensky feels his country self-defense against Russia is the something in return for Western munificence.)

Washington surely was not amused at all by Zelensky’s no fly zone idea or his jet swap plan. Clearly, taking Zelensky’s proposed ideas would mean would only result in exchanging one bad situation for a worse one. Options such as Zelensky’s proposed no-fly zone and Polish MiG-29 transfer, supported by Warsaw, looked real, but they were nothing more than illusions. All illusions disintegrate when confronted by the light of reality. The possibility that US Air Force fighter jets might clash with Russia Federation fighters or bombers and invariably shoot down several of them put the whole matter out of court. Zelensky had to know the Biden administration has been emphatic about avoiding any violent exchanges between the US and Russia that could ignite a full-blown shooting war. It was unclear how the jets would enhance the defensive capabilities of the Ukrainian Armed Forces. The Ukrainians already had MiG-29 fighters and others in its possession that were not being effectively utilized. It was unclear what would be the survivability of the MiG-29 over Russian controlled airspace and whether Ukrainian pilots would be able to contend with the Russians. Further any financial resources needed to bring such a plan into reality had already been earmarked for weapon systems that US military experts had determined would better suit Ukraine’s needs. Zelensky is receiving intelligence from the US and other Western powers. That intelligence has had a multiplier effect on the battlefield. It has lent confidence to decisionmaking in Kyiv. Still, Zelensky would never have all the facts, the big picture, to the extent western capitals do.

As experience, acumen, and the interests of the US dictated, Washington apparently moved fast to reign him in a bit via conversations with their respective countries senior officials and certain legislators. On April 24, 2022, US Secretary of Defense Lloyd Austin and US Secretary of State Antony Blinken visited Zelensky in Kyiv. The trip by Blinken and Austin and Blinken was the highest-level US visit to the Ukrainian capital since Russia invaded. In the meeting, Zelensky may have complained about feeling supervised as a president of a sovereign country. In response to such a likely perception and complaint, Austin and Blinken would surely make the greater point that the plans of the US must not be interfered with. Surely, they spoke without savaging him. An indication that Austin and Blinken likely set Zelensky straight was the fact that Zelensky did not engage in similar behavior concerning US assistance afterward. One can only imagine what might have come next from Zelensky if such a likely agreeable exchange might not have taken place.

The mood of Zelensky and his advisers during the visit by Austin and Blinken was doubtlessly uplifted when they were informed that the US would provide more than $300 million in foreign military financing and had approved a $165 million sale of ammunition. Despite the stresses that may have placed on Ukraine’s relationships in the West, he was fortunate none his benefactors handed him his hat, or turned to very blatantly using military assistance and training as a locus of control. Likely given their heavy focus on Putin they did not give up on the partnership, if they ever would have–which was presumably a card Zelensky felt he held. The true focus of the West was Putin and gaining a firm handle on him and his behavior. Zelensky was, and still is, a means to that end.

US Secretary of Defense Lloyd Austin, left, and Secretary of State Antony Blinken, right, meet with Ukrainian President Volodymyr Zelensky (center), April 24, 2022, in Kyiv. The juxtaposition between Zelensky’s “Sonny Jim” visage and the smiling faces of Austin and Blinken is stark and seemingly speaks volumes about the nature of the interaction and his attitude toward meeting his very important guests. Washington surely was not amused at all by Zelensky’s no fly zone idea or his jet swap plan. Clearly, taking Zelensky’s proposed ideas would only result in exchanging one bad situation for a worse one. The possibility that US Air Force fighter jets might clash with Russia Federation fighters or bombers and invariably shoot down several of them put the whole matter out of court. Zelensky had to know the Biden administration has been emphatic about avoiding any violent exchanges between the US and Russia that could ignite a full-blown shooting war. It was unclear how the jets would enhance the defensive or offensive capabilities of the Ukrainian Armed Forces.

Putin’s Likely View of Zelensky’s “Popular Appeal” in Ukraine

While Western analysts, officials, and news media commentators express the view that Zelensky has rallied his people despite what Ukainians themselves at best might say, it has worked out okay for Ukraine, Putin might argue that he has not actually gained their admiration. Putin’s statement about Zelensky’s government in his February 24, 2022 address on the special military operation was aforementioned. Still, Putin would need to admit that many Ukrainians appreciate the tireless efforts of Zelensky in the face of what is an existential crisis for their country. He can still distinguish between fact and the fanciful. Yet, with all intention to slight the Ukrainian President, Putin would likely state, and imaginably with some asperity, that the people of Ukraine more so view themselves as masters of their own will, independent and girded by their own sense of patriotism, of course inculcated from preceding decades as a society nurtured under the Soviet system. That sense of patriotism was transferred when they were presented, in Putin’s view errantly, with idea that they were living sovereign country, that  Ukraine was a real country. Further, the essence of their will and the spirit behind their sense to remain and defend what they were told was their country does not reside in one man. Such ideas about Ukraine being a country were repeatedly outlined by Putin well-before the February 24, 2022 address. C’est une idée bizarre, un peu folle.

Putin would possibly note somewhat accurately on this occasion tha in contemporary times, it is more difficult through news media reporting to distinguish popular leadership from celebrity and novel amusement. While Zelensky continues to say the right things–there creative suggestions–and is trying to do the right things for the Ukrainian people, the Russian Federation likely feels only time will tell whether he will take a place among the pantheon of great national leaders. Putin is aware that many men and women similar to Zelensky have fallen short and have already been forgotten.

Breaking Zelensky Down

From what is known publicly, it would not be accurate or appropriate to suggest Zelensky in any way at all has come round the twist. Nevertheless, Putin may be wondering what will be the breaking point for Zelensky. He has likely calculated from observing and intelligence reports ordered prepared by the SVR and the Ministry of Foreign Affairs, how much can the former actor stand and how long can he do his job before succumbing to chronic stress, the pressures and loneliness of leadership, how long he can he live with all that has transpired and the horrors he has witnessed, and how is he coping with the reality that his name is inextricably attached to every order that has resulted in lives being lost in the tens of thousands on both sides. When Zelensky sneezes, the SVR likely counts the decibels. A number of newsmedia outlets have pondered this issue, too, making comparisons between Zelensky and US President Abraham Lincoln during the Civil War. 

Though Putin is aware that the prosecution of the war is Zelensky’s priority, there remain countless political, economic, social, and other concerns on the domestic front that require his attention. Many of those concerns may pre-date the war and even transcend it but nevertheless are being impacted by it. Western advice and assistance has doubtlessly helped but it all has a cumulative effect on Zelensky who is harnessed in the seat of the presidency. Putin would certainly know about the many challenging aspects of national leadership as such has been his patch for the most part of two decades. Putin also knows tired presidents can make big mistakes. He might imagine one of Zelensky’s acolytes from the more aggressive security bureaucracies could find advantage in that at some point. An over-wound watch requires repair and Putin may suspect that the West has not been tending to Zelensky with diligence as the focus is on other priorities. Putin perhaps would like to know what he could do to bring him over the line. Maybe he has already been working hard on that front furtively

Despite all of the deficiencies he may very likely detect in Zelensky that make him something in his eyes far less than a force to be reckoned with, Putin would likely admit that it would be better if someone with less of a stage presence ascended to the top in Kyiv. Surely, if Zelensky left the helm in Kyiv, Putin would believe a big hitch would be put in the plans of the West. It was widely reported at one point that Putin sought to have him called to higher service. Perhaps he is still trying, but if so, he must have his people moving at deliberate speed. Ukrainian security services have surely sussing out the tiniest of rumors of a threat. Woe betide those in Ukraine who make a habit of telling the wrong sort of jokes or just uttering negative things about Zelensky. On this matter, there may be some pertinence in Falstaff’s utterance near death in Act 3, scene 3 of William Shakespeare’s play The First Part of Henry the Fourth: “Company, villanous company, hath been the spoil of me.” All of that being said, Putin’s threat to Zelensky’s well-being is a point upon which greatcharlie has no desire to enlarge. Its fervent hope is that this suggestion above all others is unlikely and no plan of the kind outlined is in play. Overall, if what is suggested here about Putin’s larger view of Zelensky proves to be true, one-on-one peace talks between the two leaders would be out of the question. At a minimum, It might be best to include a third party, a leader representing countries able to lend the type of support that could gird an agreement.

Zelensky’s expression (above) is not one of an actor using his talent harnessed by technique. It is the expression of a man managing torment, anguish, fatigue and chronic stress, pushing himself to the utter limit. Though Putin is aware that the prosecution of the war is Zelensky’s priority, there remain countless political, economic, social, and other concerns on the domestic front that require his attention. Many of those concerns may pre-date the war and even transcend it but nevertheless are being impacted by it. Western advice and assistance has doubtlessly helped but it all has a cumulative effect on Zelensky who is harnessed in the seat of the ppresidency. Putin would certainly know about the many challenging aspects of national leadership as such has been his patch for the most part of two decades. An over-wound watch requires repair and Putin may suspect that the West has not been tending to Zelensky with diligence as the focus is on other priorities. Putin perhaps would like to know what he could do to bring him over the line. Maybe he has already been working hard on that front furtively.

The Way Forward

Postea noli rogare quod inpetrare nolueris. (Don’t ask for what you’ll wish you hadn’t got.) Hopefully, political leaders and officials in not one Western capital believe that, if things go their way and fortune goes against Russian forces on the battlefield, Putin will reach out to the West, humble and conciliatory, and seek terms for a full, unconditional withdrawal from Ukraine. Indeed, as a result of defeat, there would not be some gross retardation of Putin’s aggressive instinct. As any form of acquiescence by Putin to Western demands would be very, very unlikely, it becomes more difficult to understand what the genuine objective of the West is in Ukraine. It is hard to imagine what Putin and his advisers–inarguably better aware of Putin’s authentic nature and intentions than anyone outside Russia–make of it all. Suffice it to say, even in the best case scenario for the West in which Ukrainian forces reclaim the overwhelming majority of territory taken by Russian forces, problems of great magnitude will very likely be encountered. This is not a situation that lends itself to the attitude of debrouillez-vous (“We’ll muddle through somehow”), which was the attitude of the the Supreme Command of the French Imperial Army in 1870 which failed to discern and act upon signals that the Prussian Army would move via the Ardennes Forest through Belgium into France. 

In Yours Faithfully, Bertrand Russell: A Lifelong Fight for Peace, Justice, and Truth in Letters to the Editor (Open Court Publishing, 2002), there is passage by Bertrand Russell that explains: “And all this madness, all this rage, all this flaming death of our civilization and our hopes, has been brought about because a set of official gentlemen, living luxurious lives, mostly stupid, and all without imagination or heart, have chosen that it should occur rather than that any one of them should suffer some infinitesimal rebuff to his country`s pride.” Rebuffing the reality that their time on Earth is inconstant, they seek in conceit to shape it with a view to not just leaving their mark but to transforming the world so its will conform with their idea of what is best. As is the pattern, they would declare that they are using national values and interests as a yardstick. The degree and manner in which those respective national values and interests are applied is dependent on the nature of the officials involved in the drama. In a few years or less, their “high-minded” notions, as they generally appear in contemporary timeshare, are now and then rebuked by the reality of the impermanence of actions taken by them. Their deeds often fail the test of time. They may even hold success for a little moment, but fail ultimately to really change the course of anything as successfully as fate does. After they move on from their high offices, the ascent to which they skillfully navigated over a number of years, more often than not their names are forgotten or rarely spoken anywhere except in seminars and colloquiums at universities and respective family gatherings of their antecedents. It should be enough to do the right thing and appreciate the collateral effects of that. 

Still in all, these aforementioned decisionmakers are indeed only human, and must not be judged by idealistic or super-human standards. Admittedly, harshly judging the competencies of those in the foreign and national security policy bureaucracies is the old hobbyhorse of those watching from the outside. Whether this essay for some inside will cause a journey from a lack of clarity or curiosity to knowledge remains to be seen. Harkening back one last time to Molière’s Misanthrope, he writes pertinent to this matter in Act V, scene i: “Si de probité tout était revêtu, / Si tous les cœurs était francs, justes et dociles, / La plupart des vertus nous seraient inutiles, / Puisqu’on en met l’usage à pouvoir sans ennui / Supporter dans nos droits l’injustice d’autrui.” (If everyone were clothed with integrity, / If every heart were just, frank, kindly, / The other virtues would be well-nigh useless, / Since their chief purpose is to make us bear with patience / The injustice of our fellows.) Memores acti prudentes futuri. (Mindful of what has been done, aware of what will be.)

Recherché Pieces of the Putin Puzzle That May Serve To Better Enable Engagement with Him as Either an Adversary or a Partner Regarding Ukraine

US President Joe Biden (right) and Russian Federation President Vladimir Putin (left). “What is your substance, whereof are you made, . . . .” Many Western governments view working with Putin on the Ukraine crisis, which they say he caused, as an undesirable task. Still, like it or not, that is the job at hand, and it can be successfully handled. Putin has some grievances, and says he wants to get them resolved. Standing strong and fast, assured of the correctness of one’s positions, is a fine thing. On the other hand, posturing, pride and ego, do a poor job at concealing insecurities. In this crisis, the elimination of insecurities on both sides will be central to its resolution. What needs to be created is a sustainable balance of power that advances US, United Kingdom, EU, Ukrainian, and the better parts of Russian interests to promote peace and security and foster collaboration. It would be most beneficial and virtuous for all parties involved to work together to construct clear agreements, improve ties, and accomplish even more. Here greatcharlie hopes to assist those in US foreign and national security bureaucracies seeking to get a better handle on the Ukraine crisis, and gain greater clarity about Putin and his thinking.

With imaginable strain upon the national budget, Russian troops for the moment lie snug in the Winter weather in their homeland, still close enough to its border with Ukraine to unnerve those on that side. They are ostensibly the cudgel meant to induce the minds of leaders in Western governments–the US, United Kingdom, and the EU countries–to think Putin’s way on NATO’s “ceaseless” expansion toward its border. Putin’s demand to the West boils down to “Get out of my tree and stay out!” Things have not gone exactly his way so far, but perhaps to his satisfaction he has bathed in the sound of Western government voices and broadcast newsmedia, expressing shear terror and prognosticating war and doom in the meantime. Indeed, most Western governments believe that Putin intends to do a lot more than just build up military forces defensively and induce Western thinking to his like. Reportedly, multiple analyses of Western foreign and national security policy bureaucracies have concluded that he will definitely invade Ukraine. 

Surely, this has been a beast of an episode for the relatively fledgling, democratic government in Kyiv. One might posit that Putin’s presidency is the general misfortune of all countries neighboring Russia. The threatening, aggressive atmosphere is intolerable. They must reconcile to the universal order of nature. They have knowingly, comfortably organized middle grade armies to face a first class multidimensional military force, and they have left themselves in a state in which they could never see themselves winning without the US by their side. What beats the brains of decisionmakers in Western capitals is how to mitigate the danger in a sustainable way without disturbing the status quo much or at all. Concerns expressed in conference rooms on the top floors of the US foreign and national security bureaucracies might reasonably be that relaxation of the atmosphere may require taking Putin to the limit hoping he will choose peace and avoid the massive loss that would result from even a successful push into Ukraine. There is also the possibility that relaxation of the contentious atmosphere will not reverse ambitions in Moscow regarding Ukraine. Nevertheless, at some point after applying fears to hopes and hopes to fears, both sides will need to be flexible and to compromise, if either really wants to get anything out of the diplomatic process. New calculations must be made now on both sides if the aim is peace and stability. Qui totum vult totum perdit. (He who wants everything loses everything.)

To possibly assist the efforts of the US, and its allies also, to peer in on the other side to better understand Putin’s actions and intentions concerning Ukraine by stimulating ideas in others, in this essay, greatcharlie offers a few new ideas. They were inspired while preparing greatcharlie’s preceding January 25, 2022 post entitled, “Resolving the Ukraine Crisis: How Better Understanding Putin and the Subtle and Profound Undercurrent Influencing His Thinking on the West Might Help”. That post also offered suggestions for optimizing US-Russia diplomacy regarding the Ukraine crisis that matched the importance, enormity of the situation. Making the effort to stimulate new ideas sometimes requires stepping onto shaky ground. A few thoughts on possible steps and schemes of Putin, the course of things and thinking that may be hidden or most often excluded from analyses, are presented here. They were developed primarily in the abstract from evidence provided by official statements and newsmedia reporting. To an extent, thoughts offered might more aptly be described as intimations. Some facts uncovered and presented may appear odd, recherché, but nevertheless they were all gleaned from credible, often official sources made available to the public. Hopefully, that will not be a distraction for readers. To hold only to existing thinking on Putin is to cut oneself off from roads to understanding him and his decisions that might result through further examination. Facilius per partes in cognitionem totius adducimur. (We are more easily led part by part to an understanding of the whole.)

Putin (left) being interviewed by Le Figaro in the Russian Cultural Center in Paris on May 29, 2017. Reportedly, within the Russian government, there are varied theories held about the level of power US presidents have and theories that US presidents are under the control of groups of individuals in the background, some allege they are shadowy figures. To the extent this relates to US President Joe Biden, some of Putin’s advisers have also apparently been informed by stories from the US that say others act as a hammer to shape him into the instrument they want. During a June 11, 2022 interview in Moscow with NBC News, Putin again referenced, albeit vaguely,, unknown parties who he believes are iInfluencing perspectives of Russia’s bilateral relationships and himself. Putin stated: “Well, I don’t know. Somebody presents it from a certain perspective. Somebody looks at the development of this situation and at yours truly (THROAT CLEARING) in a different manner. All of this is being offered to the public in a way that is found to be expedient for the ruling circles of a certain country.”

Putin’s View of “Who Is in Charge” in Washington

If readers would bear with greatcharlie through these initial points, they will discover there is a method to what on the face of it recognizably appears as madness. Reportedly, within the Russian government, there are varied theories held about the level of power US president have and theories that US presidents are under the control of groups of individuals in the background, some allege they are shadowy figures. To the extent this relates to US President Joe Biden, some of Putin’s advisers have also apparently been informed by stories from the US that say others act as a hammer to shape him into the instrument they want. (That view nearly parallels the impression previous US administrations once held on Putin’s situation in Russia.) Without judgment from greatcharlie, claims of such an arrangement have been proffered by conservative commentators, particularly those appearing on Fox News. Reportedly, Fox News pundits have repeatedly pushed the theory that Biden is president “in name only” and that a group of progressives–initially said to be led by Vice President Kamala Harris and including former US President Barack Obama and former US Attorney General Eric Holder–are actually in control in Washington. How comments so outré expressed on Fox News, as well as others concerning the US administration found on online celebrity gossip magazines, blogs, websites, and YouTube channels, could find acceptance in Moscow is a curious thing. Perhaps the original hope among Russian officials was to sift through them to pick-up faulty scraps of “palace intrigue” with the correct degree of discernment was absent. Once such ideas are caught, despite all that is wrong about them, they often worm their way into analyses. They may appear as trifles, made imperceptible by the fact that they are notions too commonplace in the mind to raise concern. Nonetheless, they are damaging much as the microscopic virus that can fell a person in good health..

Russian theories concerning the power of the US President tend to be equally off-kilter. In an August 1, 2017 article, a journalist for Time, Simon Shuster, who served a stint in Russia, explained that “confusion over the limits on executive authority goes back to the early years of Putin’s presidency, when he established control over the Russian media and began to assume that his Western counterparts could do the same in their countries.” Pointing to the memoir of former US President George W. Bush, Decision Points, Shuster noted that during a discussion at a summit in 2005, Putin refused to believe that the US commander-in-chief does not have the power to muzzle journalists in the US. Bush quotes Putin as saying: “Don’t lecture me about the free press.” Referring to Dan Rather, formerly of CBS News, Putin continued, “Not after you fired that reporter.” Shuster further explained: “In Russian officialdom (and among the public generally) people often assume that the West functions a lot like Russia, with a tame judiciary, a subservient media and a ruling clique that pulls all the strings.”

However, the most shocking theory concerning “shadowy powers the run the US is that the ones who actually run the administration are more than simple advisers in the background receiving federal government salaries supposedly. On the official website of the Kremlin is the transcript of a May 29, 2017 interview Putin provided the French publication Le Figaro. In it, Putin depicts those who, in his view, pull the strings of US presidents. He states: “I have already spoken to three US Presidents. They come and go, but politics stay the same at all times. Do you know why? Because of the powerful bureaucracy. When a person is elected, they may have some ideas. Then people with briefcases arrive, well dressed, wearing dark suits, just like mine, except for the red tie, since they wear black or dark blue ones. These people start explaining how things are done. And instantly, everything changes. This is what happens with every administration.” Putin went on to say concerning US presidents: “Changing things is not easy, and I say this without any irony. It is not that someone does not want to, but because it is a hard thing to do.” During a June 11, 2022 interview in Moscow with NBC News, Putin was told Biden viewed him as a leader of autocrats, who is determined to undermine the liberal democratic order. The interviewer asked Putin if it was true. In response, Putin vaguely referenced unknown parties who he believes are iInfluencing perspectives of Russia’s bilateral relationships and himself. Putin stated: “Well, I don’t know. Somebody presents it from a certain perspective. Somebody looks at the development of this situation and at yours truly (THROAT CLEARING) in a different manner. All of this is being offered to the public in a way that is found to be expedient for the ruling circles of a certain country.”

Concerning thoughts in the West on Russian views of how the US President in handling the Ukraine crisis, there was a considerable uproar heard worldwide, particularly in the newsmedia and expectedly from his political adversaries in the US, over how Putin might perceive and respond to a statement Biden made during his January 19, 2022 press conference at the White House. To many ears, Biden appeared to suggest that the US and its allies may not act strenuously to what he called a “minor incursion” into Ukraine. In fairness to Biden, presented here are comments in some detail to a question concerning the Ukraine crisis and whether the US and its allies were willing to put troops on the line to defend Ukraine, whether the US and its allies can agree on a sanctions package, and whether the threat of new sanctions would give Putin pause. BIden explained: “Well, because he’s never seen sanctions like the ones I promised will be imposed if he moves, number one. Number two, we’re in a situation where Vladimir Putin is about to–we’ve had very frank discussions, Vladimir Putin and I.  And the idea that NATO is not going to be united, I don’t buy.  I’ve spoken to every major NATO leader.  We’ve had the NATO-Russian summit.  We’ve had other–the OSCE has met, et cetera. And so, I think what you’re going to see is that Russia will be held accountable if it invades.  And it depends on what it does.  It’s one thing if it’s a minor incursion and then we end up having a fight about what to do and not do, et cetera. But if they actually do what they’re capable of doing with the forces amassed on the border, it is going to be a disaster for Russia if they further ingra–invade Ukraine, and that our allies and partners are ready to impose severe costs and significant harm on Russia and the Russian economy.

Damnant quod non intellegunt. (They condemn what they do not understand.) It was determined on the face of it that with those words, “It’s one thing if it’s a minor incursion,” Biden opened the door to a Russian incursion into Ukraine. There was alarm over how Putin would react. The newsmedia in the US and worldwide laid it on thick, denouncing and condemning Biden for doing far more than giving away the store. Reporters and commentators put their art of communication into providing drama, much as Rembrandt in his works, to convince that Biden somehow worsened the crisis. That was hardly valid thinking. Their forecasts did not bear out. Russian forces did not move a jot in Ukraine’s direction en masse or piecemeal, nor was the deployment of them dramatically increased. Biden would not speak idly on such a grave matter. Recognizably, Biden erred to the extent that he offered a trifle, a glint from the discussion in the backroom, that turned out to be too much information for a world ready to react with opinions on what most appear to know too little about. Even the most experienced can learn lessons on matters they have known well for a long-time. Yet, in fairness to Biden, he may have had good reason to say what he did.

While satellites and other technical means are providing streams of intelligence on the day-to-day activities of their presumed opposition Ukrainian forces, there have no doubt been occasions when Russian intelligence units have gone on forays into Ukraine to take a good look, a “shifty,” to confirm what is known or find out if anything has not been discern imagery or other information. Special reconnaissance missions are likely being performed by the Generalnogo Shtaba Glavnoje Razvedyvatel’noje Upravlenije (Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation) or Glavnoje Razvedyvatel’noje Upravlenije (Main Intelligence Directorate) or GRU Spetsnaz (special operations units), Spetsnaz of the 45th Independent Guards Reconnaissance Brigade of the Vozdushno Desantniye Voyska (Russian Airborne Forces) or VDV, and even reconnaissance units of Russian Federation Army formations. Special reconnaissance missions typically include penetrating deep behind opposition lines to engage in the covert direction of air and missile attacks, place remotely monitored sensors, and prepared the ground for other special operations troop who might engage in direct action against the opposition and unconventional warfare, to include guerrilla operations and counterinsurgency operations. On special reconnaissance missions in Ukraine, Spetsnaz might be tasked to move a little bit deep into the country to determine what activities are being conducted at certain highly secured military facilities, locate new weapon systems that have been deployed, locate and assess newly constructed defenses, monitor troop movements, locate and monitor foreign military advisers possibly operating in the Donetsk and Luhansk and Ukrainian military officers and other foreign military officials of interest.

Scouts from Russian Federation Army reconnaissance units at a minimum would do the following: investigate the quality and size of enemy units; report on all activities of opposition units observed; report grid coordinates of opposition units. (If opposition units are moving, determine whether they are advancing of withdrawing and what routes they are using; determine which opposition military units or civilians are performing an activity, collecting information on uniforms, patches, any unit designations and features of civilians; report which opposition units were engaged in a particular activities; and, collect specifics about opposition units and their activities, detailed information with descriptions of tactics used, equipment and gear involved and all other noticeable aspects.

As suggested in greatcharlie’s January 25, 2022 post, one could conceive that concerning Western military assistance, a special task force has been organized and assigned in advance, among other things, to: monitor the delivery, stockpiling of stinger, javelin, and other weapons systems to Ukrainian forces; maintain real-time knowledge of the distribution and location of those weapons; destroy those weapons systems; and, destroy or support actions by other Russian military units to destroy Ukrainian military units to which those weapons were distributed. That hypothetical task force would also likely be tasked to monitor–covertly monitor the intelligence activities and military operations of–Western countries as they relate to supplying Ukraine with special military capabilities.

Russian Federation Army reconnaissance scouts in training in the Western Military District (above). During his January 19, 2022 press conference at the White House. To many ears, Biden appeared to suggest that the US and its allies may not act strenuously to what he called a “minor incursion” into Ukraine. It was determined on the face of it that with those words Biden opened the door to a Russian invasion of Ukraine. There was alarm over how Putin would “react.” There reality is that there have doubtlessly been several occasions when Russian intelligence units have gone on forays into Ukraine to take a good look, a “shifty,” to confirm what is known or find out if anything has not been discern imagery or other information. Special reconnaissance missions are likely being performed by GRU Spetsnaz (special operations units), Spetsnaz of the 45th Detached Reconnaissance Regiment, and even reconnaissance units of Russian Federation Army formations. Surely, it was easier for many to launch into hysterics about his words than to think of a technical alternative. If the episode were docketed at all by Putin, he would most likely have done so in recognition of how the matter supported his thinking on the weakness of the US president versus the unseen forces.

Additionally, Russian military advisers are very likely present, “covertly”, in the Donetsk and Luhansk, recognized in Kyiv and by the  majority of governments in the world as the sovereign territory of Ukraine, engaging in a range of military assistance activities to separatist force the two regions to include some of the following: supplying weapon systems; resupply ammunition; provide training on new weapon systems, provide training separatist in small unit tactics and larger unit operations, support the operation of air defense systems; support the operation of intelligence, surveillance systems; support the operation of rocket systems (Interestingly enough, the Minsk Agreement requires Russia to maintain knowledge on all of these types if weapon systems, their capabilities, locations, and numbers deployed.); support air traffic control; support separatist command, control, and communications, supporting separatist operations and strategy; and support the collection of intelligence; and, provide separatist commanders with technical intelligence from Russian sources.

Finally, according to the US and the overwhelming majority of governments in the world, Crimea remains the sovereign territory of Ukraine. There is currently a rather large Russian force on that territory which moves troops and equipment in and out of it daily. The presence of those Russian forces in Crimea is a serious problem, yet the regular movement of troops in and out of the province at this point is a relatively minor matter.

In “Il Penseroso” (1631), published in his Poems (1645), the great John Milton quips: “Where more is meant than meets the ear.” With respect to Biden’s statement, it would appear more was meant than met the ear. The minor movement of Russian military personnel into Ukraine most likely for reasons outlined here would certainly not be worthy of a nuclear confrontation. Still, more pertinent is the fact that Putin, himself, unlikely believed Biden was suggesting hypothetically that Russia could move into Ukraine with a battalion sized force to capture some border territory in Donbass to establish some permanent Russian military presence or even more fanciful, land paratroopers at Kyiv’s Airport, reinforce them with tanks, create a well-defended corridor to the border along the most direct highway. Misunderstanding that says much about what the majority understands about Putin. Surely, it was easier for many to believe that Biden was suggesting such a thing and the launch into hysterics about his words than to think of a technical alternative. There was nothing that Biden or his aides could have said publicly about actual minor incursions by Russian forces into Ukraine as described here without making matters far worse. If the episode were docketed at all by Putin, he would have done so because Biden’s comments indicated the US and its allies were aware of Russian intelligence, surveillance, and reconnaissance activities inside Ukraine. He would most likely have docketed the event also in recognition of how the matter supported his thinking on the weakness of the US president versus the “shadowy forces.” 

To make one last point concerning Putin’s view on the relative impotence of the US President versus the unseen power in Washington, one must cast one’s mind back to the time when everything negative imaginable was said about US President Donald Trump in the newsmedia and elsewhere by his detractors and political adversaries. Given the sort of visceral reactions that typically ensue with the mere mention of Trump’s name, greatcharlie feels it is going out on shaky ground to remind how official action was regularly undertaken against him–in the Congress, through multiple hearings on alleged wrongdoings and two impeachment and through the appointment of a Special Counsel. All of that and more was done seemingly with a blindness to the interests of the US as it concerned the presidency as an office and US foreign and national security interests. No matter which side one might fall on this matter, it might be recognized that even to some small degree, on international matters, the new administration is reaping the bitter fruit of those negative efforts.

Conceivably, Putin (above) began the Ukraine enterprise believing he had a good understanding of the way many senior Biden administration foreign and national security policy officials, many of whom had held senior posts in the administration of US President Barack Obama, would respond to a move toward Ukraine, real or feigned. Putin had strenuously wrestled with them via diplomacy before and doubtlessly had thought about them considerably since. He possibly intuited that they hold a sense that Crimea was lost on their watch. It was a move made in tandem with his enhanced support of ethnic Russian separatist movements in Ukraine’s Donetsk and Luhansk provinces. As an element of his current gambit, Putin may have  urged Russian foreign and national security policy officials and political leaders to deliberately seek to aggravate, frustrate, and provoke US officials by denying a threat to Ukraine. Ostensibly, enough confusion might be created by Russian officials in talks and communications with what Putin may perceive as their overly sensitive US counterparts that they might stoke emotional responses from US decisionmakers on Ukraine, To the degree that they would be led to miss advantages, make big mistakes, Putin could desire an outcome in which US officials might possibly provide a provocation in words and actions that would allow him to green-light an invasion.

A Possible Manipulation of Great Conception

In greatcharlie’s January 25, 2022 post, it is noted how Putin so surprisingly has gone through some lengths to signal that he is considering a move into Ukraine. Everything done to date appears designed to ensure the US and its allies know exactly what Russian forces are doing. Putin’s experiences as an intelligence officer in the field, political leader, and national leader have no doubt given him a mighty understanding of human nature and human interactions. However, equally pertinent is the fact that he is a judoka and well-experienced tournament competitor. In this respect, he is an expert in assessing competitors’ responses and reactions to forced falls and defeat. 

Conceivably, Putin began the Ukraine enterprise believing he had a good understanding of the way many senior Biden administration foreign and national security policy officials, many of whom had held senior posts in the administration of US President Barack Obama, would respond to a move toward Ukraine, real or feigned. Putin had strenuously wrestled with them via diplomacy before and doubtlessly had thought about them considerably since. He possibly intuited that they hold a sense that Crimea was lost on their watch. They were caught flat-footed when Russian forces moved in by the thousands. They were dubbed the “green men.” It was a move made in tandem with supporting ethnic Russian separatist movements in Donetsk and Luhansk, oblasts (provinces) which border Russia. Donetsk and Luhansk are still inhabited by somewhat large populations despite the heavy fighting between Ukrainian forces and separatists within them. According to the World Population Review, in 2021, the population in Donetsk was 899,325 and in Luhansk was 398,505. Fighting in both areas was exceedingly heavy. Eventually both movements declared their provinces independent, sovereign republics. 

Despite their best efforts short of military action, Obama administration officials could not put together a response that could pry Russia out. Bonjour les dégâts! Not to offend those in power now, but on Crimea,  as on a few other issues, senior Obama administration officials would habitually underestimate Putin. Putin then added figurative insult to injury by formally annexing Crimea. His latest build up of forces, several miles distant, yet near enough to the border of Ukraine, has caused sufficient anxiety in Washington and teasingly offer the opportunity for former senior Obama administration officials in the Biden administration to have a return engagement with him, and as he might hope, an opportunity to settle an old score. Perhaps in such a way Putin, too, might be revealing his desire too for a return engagement in which he could get even more of what he wants from Ukraine. Consuetudinis magna vis est. (The force of habit is great.)

Surely, in Washington, officials would claim what happened in the past with Russia on Crimea has not colored their new reactions on Ukraine. Subconsciously, perhaps it is a different story. As Putin had strenuously wrestled with them via diplomacy before and doubtlessly had thought about them considerably since. To that extent, Putin may feel he has seen them straight, and seek, possibly as a side project, to stimulate their attitudes and behavior and calculate, even influence their moves successfully. As an element of his current gambit, Putin may have  urged Russian foreign and national security policy officials and political leaders to deliberately seek to aggravate, frustrate, and provoke US officials by denying a threat to Ukraine. Through their statements, it is clear that US administration officials believe the threat of Russian invasion is real. To enhance that sense of alarm, Putin would intermittently move a modicum of his forces in very observable ways, guaranteed to catch the attention of the US and its allies and heighten the sense of alarm, even though nothing  significant was really happening. As for the Ukrainians, every movement would hopefully serve to emphasize the defenseless condition in which the US and its allies have left them in. Putin might hope that would stir a sense of extreme vulnerability and anxiety, anguish and despair, among them. Ostensibly, enough confusion might be created by Russian officials in talks and communications with what Putin may perceive as their overly sensitive US counterparts and panic among the Ukrainians that an emotional response might be stoked from US decisionmakers on Ukraine, to the degree that they might make big mistakes or even miss considerable advantages that are right before them.

To enlarge on this point on forced mistakes, Putin could desire an outcome in which US officials might provide a provocation in words and actions that would allow him to green-light an invasion. Alternatively, depending how the wind blows, he would seek to check US decisionmakers, leaving them without any good options that would allow the successful support of US interests and only holding the choice to make compromises, even furtively, on his main demands, that  would allow Ukrainians to live in peace in some satisfactory way. No one is infallible. As Putin knows, logic sometimes fails us. Reacting out of emotions rather than logic and wisdom could only result in missteps. Perhaps US decisionmakers might not even recognize any errors were made until they witnessed Putin exploiting their choices to the fullest. This may all sound like a mad-capped scheme, However, it is all hardly beyond Putin. His thinking in formulating such a scheme would likely be informed, bolstered by the aforementioned shambolic US pull-out from Afghanistan in 2021.

Without any intention to be offensive, greatcharlie states that one top US official that Putin would seek to influence most by his actions would be the Secretary of State Antony Blinken. Putin is quite familiar with Blinken as he played a prominent role in all of the rather rough approaches taken toward him and Russia during the Obama administration–he was Obama’s National Security Adviser. He likely sees him as a real foe. Blinken is a professional, with experience in the high realms of government in the Obama administration, surely seeks only to be unwavering in his pursuit of US interests and not to be distracted by emotions toward Ukraine and its people. He is absolutely loyal and patriotic to the highest degree possible as his country’s top diplomat. In addition to being handsome and débonnaire, Blinken has a strong intellect and is strong-minded. Yet, he is mindful and very appreciative of his ethnic Ukrainian heritage. One might imagine that in a very human way, he would hope to make the land of his parents, grandparents, and ancestors very proud of his intercession in Ukraine’s time of crisis. On May 5, 2021, Blinken made his first visit to Ukraine as Secretary of State. Blinken visited Ukraine numerous times as a senior official in the Obama administration. Blinken’s great-grandfather, Meir Blinken, emigrated from Kyiv in 1904. He was accompanied by his wife Hanna and sons Solomon and Maurice Henry, Blinken’s grandfather. For Blinken, it was a cracking visit, during which his Ukrainian heritage was emphasized. At events, he often spoke the national language as taught to him by his family.

Etiam sapientibus cupido gloriae novissima exuitur. (The desire for glory is the last infirmity to be cast off even by the wise.) A shark can smell blood a mile off when he is hungry. That first Ukraine visit as Secretary of State in May 2021 meant much personally to Blinken. That visit very likely meant much to Putin, too! He no doubt, closely analyzed moments of it, to better understand Blinken and to uncover some advantages gleaned from it all. Exploiting someone’s meaningful personal event in some dark way is an unprincipled, reprehensible business, and a practice that was polished and honed within the erstwhile intelligence organization in which Putin spent his first career, the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. Needless to say, intelligence work was his metier. 

To go a little further on this point, also as explained in greatcharlie’s February 28, 2018 post, individuals as Putin can have a different context for learning about people. When Putin asks about an interlocutor’s family, home, office, even capabilities, it is not small talk or the result of friendly interest. Rather, he may be signalling, warning, that he has already evaluated an interlocutor as a potential target. He may be confirming information or collecting more. He may also be testing one’s vulnerability to falsehoods or how one might respond to unpleasant information. He is creating a perceptual framework for his interlocutor. Such tactics, techniques, procedures, and methods truly match those of a predator. Predators often use deflection, social miscues, and misinformation to provide cover for themselves. “Predatory humans” can use a contrived persona of charm and success to falsely engender trust. They have an exit plan in place, and are confident with regard to the outcome of their actions. Boiled down, they accomplish their deception using three steps: setting a goal; making a plan; and, compartmentalizing. By setting a goal, they know what they want and what it will take to get it or achieve it. They have no inhibitions about causing damage or harm. They stay focused. By making a plan, they not only determine ways to get what they want, but also develop exits if needed. By compartmentalizing, they detach themselves emotionally from attachments that might be embarrassing or be a liability if their plans are found out. They train themselves to give off no tells, so they can pivot easily into a different persona. While some might acquire this skill as Putin likely had while working in the intelligence industry, others may not have any natural sense of remorse.

US Secretary of State Antony Blinken (left) and Russian Federation Foreign Minister Sergei Lavrov (right) meeting in Geneva in January 2022. It is possible that as an element of his current gambit, Putin and Russian Foreign and national security policy officials and political leaders would likely deliberately seek to aggravate, frustrate, and provoke US officials by denying a threat to Ukraine. Through their statements, the US administration believes the threat is real. One top US official that Putin would seek to influence most by his actions would be the Secretary of State Antony Blinken. He played a prominent role in all of the rather rough approaches taken toward him and Russia during the Obama administration. Without being present, it is impossible to know if Russian Federation Foreign Minister Sergey Lavrov, perhaps obedient to possible directions from Putin, may have tried to push Blinken’s buttons so to speak in the way aforementioned. The likely consonance of Lavrov claiming there was no intent to drive Russian troops into Ukraine, yet lacking any authority to guarantee that his superior, Putin, would not order such, would imaginably be unsettling for Blinken. Perchance Lavrov would use his diplomatic acumen to artfully speak in a way to hint at compromise, to thoroughly turn Blinken’s ear in his direction, and then make a half-turn away from the correct side enough to frustrate, to perturb. In the end, it was revealed publicly that Lavrov doubled down on the demand for guarantees on NATO expansion.

Revenons à nos moutons. Without being present, it is impossible to know if Russian Federation Foreign Minister Sergey Lavrov, perhaps obedient to some possible directions from Putin, may have tried to push Blinken’s buttons so to speak in the way aforementioned. The likely consonance of Lavrov claiming there was no intent to drive Russian troops into Ukraine, yet lacking any authority to guarantee that his superior, Putin, would not order such, would imaginably be unsettling for Blinken. Perchance Lavrov would use his diplomatic acumen to artfully speak in a way to hint at compromise, to thoroughly turn Blinken’s ear in his direction, and then make a half-turn away from the correct side enough to frustrate, to perturb. In the end, Lavrov doubled down on the demand for guarantees on NATO expansion. Deeper and more subtle than what is on the surface for Blinken in such a circumstance would likely be the thought that Ukrainians at the end of all his diplomatic effort could find Russian troops sitting their laps. For him, that will not do. No prospective thought of Blinken on the whole matter would likely be more offensive than that to the extent US military units would not be involved on the ground. Ira furor brevis est; animum rege. (Anger is a brief madness; govern your soul)

Although the vicissitudes of fortune in foreign affairs and war–friction in battle–have been described many times and in many ways by statesman, commanders, and scholars over millennia, greatcharlie chooses to quote Polybius (c. 204-122 B.C.), the Greek “pragmatic historian.” As presented in Book II, Ch. 4 of The General History of Polybius [Books 1-17] Tr. by Mr. Hampton 5th Ed. (TheClassics.us, 2013), he states: “In all human affairs, and especially in those that relate to war, . . . leave always some room to fortune, and to accidents which cannot be foreseen.” Whatever position Blinken may have developed concerning his ancestral homeland’s protection, perhaps its current citizens might be seeking to recast it a bit in what they deem would be a more helpful way. During a televised speech to the nation on January 25, 2022, Zelensky urged Ukrainians not to panic. It was the second such speech on the crisis in two days. The speeches were not only in response to the situation the country faced, but also in response to what Zelensky appears to perceive as ad nauseum and unhelpful comments about an imminent threat of a Russian invasion of Ukraine heard from US and other Western officials. Depicting a very trying situation facing Ukraine in a graceful way, he told Ukrainians, “We are strong enough to keep everything under control and derail any attempts at destabilization.” 

Zelensky also explained that the decision by the US, the United Kingdom, Australia, Germany and Canada to withdraw some of their diplomats and dependents from Kyiv “doesn’t necessarily signal an inevitable escalation and is part of a complex diplomatic game.” He went on to say tactfully, “We are working together with our partners as a single team.” Speaking in the Ukrainian Parliament also on January 25th, Ukrainian Defense Minister Oleksii Reznikov said that, “as of today, there are no grounds to believe” that Russia is preparing to invade imminently, noting that its troops have not formed what he called a battle group that could force its way across the border. He sought to comfort the parliamentarians by stating: “Don’t worry–sleep well,” He continued by sardonically saying: “No need to have your bags packed.” 

The indications and implications of these statements for Blinken may have been that repeatedly sounding the alarm that the “Russians are coming,” more than stoking fears of invasion among Ukrainians, was garnering considerable disfavor and rebuke from them. In this wise, it clearly appears to be the preference of his ancestral homeland to counter and handle Putin by stimulating an authentic atmosphere of cooperation. To that extent, the Ukrainian officials would surely like to douse the “madding fever” consuming its proud son over Russian moves with a bucket of ice cold water. Faber est suae quisque fortunae. (Every man is the artisan of his own fortune.) (Note as aforementioned, thoughts as these are intimations, developed in the abstract from evidence provided by official statements and newsmedia reporting.)

Ukrainian President Volodymyr Zelensky (left) and US Secretary of State Antony Blinken (right). During a televised speech to the nation on January 25, 2022, Zelensky urged Ukrainians not to panic. It was the second such speech on the crisis in two days. The speeches were not only in response to the situation the country faced, but also in response to what Zelensky appears to perceive as ad nauseum and unhelpful comments about an imminent threat of a Russian invasion of Ukraine heard from US and other Western officials. Depicting a very trying situation facing Ukraine in a graceful way, he told Ukrainians, “We are strong enough to keep everything under control and derail any attempts at destabilization.” The indications and implications of these statements for Blinken may have been that repeatedly sounding the alarm that the “Russians are coming,” more than stoking fears of invasion among Ukrainians, was garnering disfavor and rebuke from them. On this wise, it would surely be the preference of the people leading his ancestral homeland to counter and handle Putin by stimulating an authentic atmosphere of cooperation.

Putin’s Understanding of “the US Within”

In his parsing of US policy construction before engaging in the current Ukraine enterprise, Putin doubtlessly concluded societal attitudes in the US toward himself, Russia, and military action must be considered. He likely would assess that Ukraine is a country unimportant or of no-account in their day-to-day lives. He may further assess the true level of investment with what is the vague goal of halting Russia from taking control over territory in a distant country who most would not be able to locate on a map is unknown to the US public.  With regard to the more pertinent matter of committing the US in strenuous ways to Ukraine’s defense against Russian aggression, support from the US public would reasonably be decidedly low. Most apposite, there would certainly be no drum roll for  committing US troops for that purpose either. If this parsing of Putin’s line of thinking at all hits the mark, certainly polling, would support any of the analysis hypothesized as being held by him. According to a Pew Research poll published on January 26, 2022 overall, 49% of US adults perceive Russia a competitor of the US. Only 41% view it is an enemy, and oddly 7% see Russia as a partner of the US. Despite evidence of increased political polarization in recent years, Republicans and Democrats apparently hold similar views of Russia’s bilateral relationship to the US. Among Republicans and Republican-leaning independents, about 50% believe Russia as a competitor to the US, and 39% call it an enemy. About 9% of Republicans feel Russia is a partner of the US. Among Democrats and Democratic leaning independents, 49% see Russia as a competitor, while 43% view it as an enemy. About 6% of Democrats say Russia is a partner of the US.

Putin would also conceivably posit that at best what is known in the US public as the great East-West geopolitical struggle begun long-ago during postwar years and the unstemmed, unsatiated predilection of dividing up the world and deciding which country stands in which bloc, for most part is the stuff of school studies where the average Joe was concerned. If anything, they are viewed as matters in the province of government officials, policy officials. The January 26, 2022 Pew Research poll also finds that about 26% in the US public perceive the Russian military buildup near Ukraine to be a major threat to US interests. Only 33% in the US public believe Russia is a minor threat to US interests. About 7% of those polled say it is not a threat at all. As it is hypothesized here about Putin’s likely assessment, 33% of the public, a noticeably large share, are unsure whether Russian actions toward Ukraine affect US interests. Impressions of Russia’s military buildup near Ukraine also do not differ much by political affiliation. Republicans 27% of Republicans consider Russia a major threat to US interests, while 36% of Republicans view it as a minor threat in that regard. A somewhat large portion, 28% of Republicans, say they are unsure how the military buildup will have an impact. Among Democrats, 26% consider Russia’s build-up a major threat to US interests, while a greater 33% view it as a minor one, despite the position of the current Democrat-led US administration. Surprisingly, despite numerous public statements made about Ukraine by the administration, about 34% of Democrats stand slightly unsure how Russia’s military buildup will affect US interests. It would seem that for the US public, Ukraine is nothing to signify. They would do nothing to discover more about the situation. Even for those somewhat interested, doing so would hardly be worth the candle.

In his parsing of US policy construction before engaging in the current Ukraine enterprise, Putin (above) doubtlessly concluded societal attitudes in the US toward himself, Russia, and military action must be considered. He likely would assess that Ukraine is a country unimportant or of no-account in their day-to-day lives. He may further assess the true level of investment with what is the vague goal of halting Russia from taking control over territory in a distant country who most would not be able to locate on a map is unknown to the US public. With regard to the more pertinent matter of committing the US in strenuous ways to Ukraine’s defense against Russian aggression, support from the US public would reasonably be decidedly low. Most apposite, there would certainly be no drum roll for committing US troops for that purpose either.

Memores acti prudentes futuri. (Mindful of what has been done, aware of what will be.) Perhaps the worst episode of his experiences with State Department diplomats during the Obama administration was over Ukraine. Some diplomats stationed in Kyiv–names purposely excluded here–had made some very disturbing statements concerning Putin and Russia that likely seared a negative impression of State Department officials upon the Russian President. From that, one might imagine that still today, Putin may judge US foreign and national security policy officials as seeing the world strictly through the filter of their comfort. They take a high and mighty attitude toward all others. Publicly they tell the world how their interests are amplified by their values, and express concern over human rights, diversity, and global warming. Yet, privately, they are most frantic about US power and prestige, economic power foremost, and the aesthetics of its power in the world which translates into its geopolitical stance. Putin would expect them to put the US national interest first and foremost, but he may feel they take that tack with a blindness to the interests of others. On Ukraine and Taiwan, Putin hopes it will lead them down blind alleys to deadends.

To enlarge on this point, as it would concern US public opinion, State Department officials in Putin’s view, act in a world of their own, and drag the US public in directions that they for the most part are unaware of, and may disagree with, if ever consulted. As far as Putin might see, there are types in the US foreign and national security policy bureaucracies who look upon members of the US public as “Hottentots,” who could hardly fathom the complexity of the policy issues, situations their high offices contend with. Putin might imagine they would hardly believe the US public could understand what kind of skill and experience is required to maneuver against, to supplant, and to negate the interests of other countries and secure that of their own. That would closely equate to what Putin might project of his sense of the condescending attitude and behavior taken toward him during the Obama administration.

Surely, Putin would enjoy aggravating any gap between what the current US administration is doing on Ukraine and what the US public presently knows about it. If the US position could be better defined for the US public, Putin would want to be the one to do that. What would lead Putin to believe he would have a chance now at Influencing US public opinion would be his likely assessment that the Biden administration, as he may perceive has been pattern in the US administrations he has dealt with over two decades, would not want the US public to be fully aware of what is happening, what is being done about Ukraine ostensibly in their interests. Putin would certainly be following polls of the US public, too. Data directly on the point of public attention in the US to the Ukraine crisis from the January 26, 2022 Pew Research poll confirms that public interest has been very limited. While 23% of those from the US public surveyed say they have heard a lot about the deployment of Russian troops near Ukraine, a greater 45% have heard a little about the military build up, and 32% say they have heard nothing about it.

Using whatever medium might be made available and capitalizing on any popularity he may retain as an international figure, he may again seek to pitch his facts, his perception of the realities of the Ukraine matter to the US public. To be a bit more specific, Putin might express why Russia feels as it does about the situation, and what it feels it must do without security guarantees. Surely, it would be loaded with history from the Russian perspective, that any citizen living in Russia would dare not disagree with. Putin would hold out hope that the right choices will be made by the political leaders in the US. His hope would be that he will, using a diplomatic tone and soft phrases, stealthily scare the US public straight and make a lasting impression upon them, albeit a decidedly frightening one. Responding in a manner that he would doubtlessly suggest in his communication, he would hope the public will contact their Congressional Representatives and Senators, and repeat the facts and views he would have supplied them with. The ultimate hope for Putin would be to have encouraged Members of Congress to contact the White House and State Department to suggest “a better course” to Biden and top foreign and national security policy officials.

Recall that Putin attempted to reach the US public to shape opinions on Russia more than once. In a September 13, 2013 New York Times editorial entitled “A Plea for Caution,” Putin reached out to the US public concerning what he then perceived as the problematic nature of Washington’s policy approach to Syria and problems that could have been expected or possibly might have been avoided if a better path would have been chosen. He apparently believed then,  as very likely does now, that because of a perceived disinterest and disregard of public opinion in the US in foreign affairs, there was space for him to jump in to insinuate his views among the people. Misreading or miscalculation, he actually made the attempt. (See greatcharlie’s August 31, 2014 post which analyzes Putin’s 2013 editorial.) Prior to that editorial, Putin published November 14, 1999 op-ed in the New York Times, justifying Russia’s military action in Chechnya which at great cost re-established government control of the breakaway province. Putin was so concerned with shaping opinions in the US that doing so apparently in part impelled his efforts to interfere with the 2016 US Presidential Election. 

When he became Russian Federation President in 2000, he was mistakenly viewed in the West as shy, self-effacing despite his willingness to give interviews, make speeches, and publish writings, including a book entitled, First Person. An experienced national leader and well-practiced speaker, he seems more eager than ever to offer his views in public. Data directly on the point of public attention in the US to the Ukraine crisis from a January 26, 2022 Pew Research poll confirms that public interest has been very limited. While 23% of those from the US public surveyed say they have heard a lot about the deployment of Russian troops near Ukraine, a greater 45% have heard a little about the military build up, and 32% say they have heard nothing about it. Surely, Putin would enjoy aggravating any gap between what the current US administration is doing on Ukraine and what the US public knows about it. If the US position could be better defined for the US public, surely Putin would like to be the one to do that.

The Way Forward

Ita durus eras ut neque amore neque precibus molliri posses. (You were so unfeeling that you could be softened neither by love nor by prayers.) No senior Western official has publicly made the argument that Putin has lost his mind, nor has any provided evidence, even circumstantial evidence, that would lead one to believe some dramatic change in his mental health has occurred. To that extent, one might conclude no matter how disagreeable, deplorable his actions may be, it is accepted that he is behaving in a logical, quite sane manner. Moving comfortably in the reality of a leader as Putin is no mean feat. Few national leaders have had an authentic, natural rapport with him. That was not a shortcoming on their part, simply a reality as a result of their respective life experiences. Many Western governments view working with Putin on the Ukraine crisis, which they say he caused, as an undesirable task. Still, like it or not, that is the job at hand, and it can be successfully handled. Putin has some grievances, and says he wants to get them resolved. 

Standing strong and fast, assured of the correctness of one’s positions, one’s righteousness, is a good thing. On the other hand, posturing, pride and ego do a poor job at concealing insecurities. In this particular crisis, the elimination of insecurities on both sides will be central to its resolution. 

What needs to be created is a sustainable balance of power that advances US, United Kingdom, EU, Ukrainian, and the better parts of Russian interests to promote peace and security and foster collaboration. It would be most beneficial and virtuous for all parties involved to work together to construct clear agreements, improve ties, and accomplish even more. Superficial approaches to achieving an agreement, mere appearances of taking action that lack materiality, that are elaborate and useless, must be avoided. Such fruitless efforts will end up aggravating the situation. This episode may have actually opened the door to healing wounds, to solving problems that have only been bandaged to this point. Opportunity is not easily offered, but it is easily and easily lost. Hopefully, the parties involved will make the most of this opportunity. Casus ubique valet, semper tibi pendeat hamus. Quo minime credas gurgite piscis erit. (There is scope for chance everywhere, let your hook be always ready. In the eddies where you least expect it, there will be a fish.)

Book Review: Robert Spalding, Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019)

A B-2 “Spirit” Stealth Bomber (above). Though Robert Spalding’s Stealth War: How China Took Over While America’s Elite Slept bears the name of the exquisite machinery depicted, the book actually concerns something different. Stealth War refers to how China has quietly waged a six-front war on the economy, military, diplomacy, technology, education, and infrastructure of the US, and has been winning. Spalding provides piercing judgments, a novel-like reporting of actual events, and a clarity that allows him to cast a cold eye on China policy analysis and intelligence analysis both past and present. He has interestingly taken his own dissatisfaction, disappointment, and anger over how badly the US has handled China, placed the country in some danger, and safely expressed it on paper, turning it into a positive force to better understand how things have taken shape and how events are unfolding before the eyes of every US citizen.

As of late, there has been an altogether different spring in Beijing’s step. Without a shadow of doubt, Beijing now has a broader attitude towards Asia, a broader attitude towards the world, than it ever had before. Very convinced men and women in China awake each day invigorated with the idea that their country will soon be the dominant power in the world. Some might say it has been a long-standing perspective held among Chinese Communists. However, it would appear this view is being clinged to stronger now than ever. Long ago, Beijing formulated a long-term plan to eventually become the world’s dominant power. That plan has been underway without pause for decades. Few who planned it, lived to see the type satisfying results that have blossomed in recent years. Surely, People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping hopes that under his leadership, the long sought goal of dominance will be achieved. In statements and speeches, he has often assured the Chinese people that the hopes and dreams of the Party and the people will be manifested. Though the idea of China being the world’s dominant power may be a pleasurable thought in Beijing, the moral and ethical implications are remarkably overwhelming. The notion of China achieving that goal is a frightening prospect, terrifying leaders in other countries whether its friend or foe.

US President Joe Biden recently reminded before a Joint Session of the US Congress that “Our greatest strength is the power of our example, not just the example of our power.” Perhaps many Asia observers and analysts would agree that such is not the case for China. Despite having the structure, a perceptible veneer to those unfamiliar with its ways, of being a multiparty system at the national level, for all intents and purposes, China is a single party, Communist, authoritarian state. The course of its leadership of the world might follow the same pattern as China’s censorship approach. Whatever China wanted would be dictated and punishment would closely follow behind its threats to those who disobey Beijing. The dynamics of relationships with cautious allies as the Russian Federation, for instance, would change, as China would likely want it at least to be tacitly understood that it was the “senior partner,” the leader. Discussion about China and its moves toward becoming the dominant world power is no longer outside the realm of even everyday conversation among the US public. If the people were provided with the full facts on China’s rise in competition with the US it would likely take the breath away of many. China stands convinced of the correctness of both its points of view and its actions.

The subject of this review, Robert Spalding’s Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019), has been promoted as a book which discusses how China has quietly waged a six-front war on America’s economy, military, diplomacy, technology, education, and infrastructure, and has been winning. It might be enough for greatcharlie just to describe Spalding’s exceptional achievement with Stealth War as providing piercing judgments, a novel-like reporting of actual events, and a clarity that allows him to cast a cold eye on China policy analysis and intelligence analysis, both past and present. However, Spalding, even more, has interestingly taken his dissatisfaction, disappointment, and anger over how badly the US has handled China, placed the country in some danger, and safely expressed it on paper, turning it into a positive force to better understand how things have taken shape and how atrocious events are unfolding right before the eyes of every US citizen.

Although packed with excellent suggestions, the book is not about moving from choppy waters to calmer times. It is about preparing the US, using all tools of its power, military, diplomatic, economic, political, and information (media) power, to best handle what is happening with China and the worst that will most likely, or will eventually, come from its direction. Have no doubt that as a retired US Air Force Brigadier General, Spalding is well up on how the US could take on China militarily, and win. Spalding has presented his findings and judgments in such a way to plant good, well-thought out, seeds with the hope they will take root well. It is difficult to see how policy analysts and policymakers in the US, Democrat or Republican, would not recognize that Spalding is largely in the right.

In this review of Stealth War, greatcharlie hopes it can demonstrate how those reading the book for the first time will be provided a full picture on the matter. Hopefully the review will spark their exploration of the book to see what they can draw from Spalding’s meditations. For those who have already read Stealth War, this review hopefully will provide an opportunity to consider perspectives not thought of during their first look. In this review, greatcharlie will not run through Stealth War chapter and verse as it typically has in preceding book reviews. While still offering what it may humbly call its well-considered opinions and commentary, greatcharlie will discuss what it feels is the essence of the work, how Spalding stirs the development of perceptions and insights through the manner in which he presents his facts. Admittedly, being somewhat assiduous over facts in reviews, greatcharlie has often been somewhat prolix. A conscious effort has been made by greatcharlie to avoid again presenting what one reader acidulously, and lyrically, described as “a typical edifying, yet verbose greatcharlie review.” There is no desire to create a challenge for some readers to stay onboard with a post until the end of the ride. (Despite our deeming it necessary to do so, greatcharlie apologies to all readers for severely curtailing the discussion of the text of Stealth War in this review. It is recognized that Stealth War is a book of such quality that some readers might view taking such a step as a sort of malfeasance.)

Acknowledged as the master of the heroic couplet and one of the primary tastemakers of the Augustan age, British writer Alexander Pope was a central figure in the Neoclassical movement of the early 18th century. In “An Essay on Criticism,” a didactic poem first published anonymously in 1711 when the author was 23 years old, in greatcharlie’s humble view superbly gets to heart of the reviewer’s mission, explaining: “But you who seek to give and merit fame, / And justly bear a critic’s noble name, / Be sure your self and your own reach to know, / How far your genius, taste, and learning go; / Launch not beyond your depth, but be discreet, / And mark that point where sense and dulness meet.”

The author of Stealth War, Robert Spalding (above), is by no means an outsider with special access, looking in on the situation. He is an erstwhile insider, who worked within the deepest points, most grave points, of the US military and other national security bureaucracies. It must be noted that being a former US Air Force brigadier general, B-2 Stealth bomber pilot and unit commander, among many other accomplishments, Spalding was a member of an unique, elite caste of military officers who are not quick to speak out, do not lightly show emotion, at least publicly or react because of it, never fret over a perception without the full facts, would hardly speak idly, and whose views when expressed should be taken very seriously. Spalding spoke truth to power at the Pentagon and the White House, and speaks of only what he knows to be the truth in Stealth War. His scruple does him much honor.

The Author

Robert Spalding retired from the US Air Force as a brigadier general after more than 25 years of service. If US Air Force officers were listed by achievements–perhaps they are somewhere in the Pentagon, Spalding would surely be among the luminaries. His Air Force biography provides the best picture of the experience and knowledge he possess. Minus his list of educational accomplishments, it reads as follows: “General Spalding received his commission through Fresno State University’s ROTC program in 1991. He earned his doctorate in economics and mathematics from the University of Missouri at Kansas City in 2007. The general attended undergraduate pilot training in 1993, and was subsequently assigned as a B-52 Stratofortress co-pilot in the 5th Bomb Wing at Minot Air Force Base, North Dakota. He subsequently transitioned to the B-2 Spirit at Whiteman Air Force Base, Missouri. In 2001, he was selected as one of three Air Force Olmsted Scholars, and was a distinguished graduate of Mandarin Chinese language training at the Defense Language Institute in Monterey, California. Afterward, the general attended Tongji University in Shanghai as a graduate research student. He then returned to Whiteman Air Force Base as a B-2 evaluator pilot and assistant director of operations for the 393rd Bomb Squadron. The general was then assigned to the Office of Secretary of Defense’s Prisoner of War Missing Personnel Office as the military assistant for the deputy assistant secretary of defense. During the Iraq surge in 2007, General Spalding deployed to Baghdad and directed the Personal Security Coordination Center. After a stint at the Air War College at Maxwell Air Force Base, Alabama, he was reassigned to the B-2 at Whiteman Air Force Base. While at Whiteman Air Force Base, he was the chief of safety, operations group commander and vice wing commander. He was then selected as a Military Fellow at the Council of Foreign Relations in New York. General Spalding then served as the chief China strategist for the chairman of the Joint Chiefs, the Joint Staff at the Pentagon, Washington DC. His next assignment led him back to China as the Senior Defense Official and Defense Attache to China in Beijing, China. Prior to his current assignment he served at the White House as the Senior Director for Strategic Planning at the National Security Council, Washington D.C.”

Spalding is by no means an outsider, with special access, looking in on the situation. He is an erstwhile insider, who worked within the deepest points, most grave points of the US military and other national security bureaucracies. It must be noted that being a former US Air Force brigadier general, B-2 Stealth bomber pilot and unit commander, among his many impressive accomplishments, Spalding was a member of an unique, elite caste of military officers who are not quick to speak out, do not lightly show emotion, at least publicly or react because of it, never fret over a perception without the full facts, would hardly speak idly, and whose views when expressed should be taken very seriously. Spalding spoke truth to power at the Pentagon and the White House, and speaks of only what he knows to be the truth in Stealth War. His scruple does him much honor.

As of this writing, Spalding is set to publish a new book with Sentinel in April 2022, War Without Rules: China’s Playbook for Global Domination. In War Without Rules, readers are again presented with the perspectives and insights on US-China relations through the lens of a man with years of experience on such matters. Resolved that the Communist Party of China’s leaders believe that there is no sector of life outside the realm of war, Spalding illustrates how they have gone about that by use corporate espionage, global pandemics, and trade violations to achieve dominance. The ultimate goal of the Party is world dominance. Spalding provides insight into how US citizens can be made better aware of China’s tactics in order to mitigate its creeping influence.

Polybius (c. 204 B.C.-122 B.C.), the Greek “pragmatic historian,” and intriguingly an eyewitness to the siege and destruction of Carthage accompanying none other than Cornelius Scipio Aficanus as one of his commanders. In his noted work, The Histories, Polybius covers the period from 264 B.C. to 146 B.C., focusing primarily on the years 220 B.C. to 167 B.C., and detailing Ancient Rome’s conquest of Carthage, which allowed it to become the dominant force in the Mediterranean. Additionally in The Histories, Polybius offered what he believed were the process and traits required of a good historian. Among all things enumerated, he emphasized: “All available evidence must be collected, thoroughly sifted, soberly weighed, and, lastly, the historian must be animated by a sincere love of truth and a calm impartiality.”

Spalding’s book is far from a dispassionate clinical study of US-China relations. Spalding is not presenting Stealth War at any point in the book as an intermedial. If one is looking for a book written by such an author, Stealth War would be the wrong choice. Being that he is in every way a patriot, Spalding’s position concerning the US interests versus China or any other country for that matter is vigorously partisan for the US. Moreover, he is not reluctant to confide his thoughts on such matters either. Readers should expect his relative partisanship to be the dominant tone of the text. However, Spalding’s patriotic tone does not degrade into anything akin to jingoism or chauvinism. His partisanship does not impact the quality of Spalding’s analysis. He is in fact very critical of US decision making on China. To the extent that he vigorously engaged in the process of collecting relevant evidence and sought to present the absolute truth, Spalding demonstrates all of the traits that Polybius would likely agree qualifies him as a solid reporter of past events.

While Spalding puts readers in the full picture, at the same time, he does not attempt to squeeze every issue dry so to speak. What he does present, however, provides enough to leave no doubt as to China’s actions and intentions. It is his book, and his prerogative to preclose as his present the facts as he knows them.

As a read, the book is presented in a way by Spalding as not to be too heavy going. Often, analysis becomes more uncertain as it becomes more sophisticated. His examination admirably allows for safe passage on each occasion to the very heart of the matter. There are no exaggerated claims. There is nothing to debunk. Surely, China would insist and seek to create the impression that statements made by Spalding regarding election interference, cyberattack, espionage, theft of intellectual property are simply Innuendo and insinuation. The notion of a misunderstood China offends all of Spalding’s reasoning.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above) celebrating the Centennial of the Communist Party of China. Long ago, Beijing formulated a long-term plan to eventually become the world’s dominant power. That plan has been underway without pause for decades. Few who planned it, lived to see the type satisfying results that have blossomed in recent years. Surely, Xi hopes that under his leadership, the long sought goal of dominance will be achieved. In statements and speeches, he has often assured the Chinese people that the hopes and dreams of the Party and the people will be manifested. Though the idea of China being the world’s dominant power may be a pleasurable thought in Beijing, the moral and ethical implications are remarkably overwhelming. The notion of China achieving that goal is a frightening prospect, terrifying leaders in other countries whether friend or foe.

A Courageous Act by Spalding

Spalding speaks independently with his own points of view. It should be reminded that when he published Stealth War in October 2019, few from the ranks of his fellow military commanders with his experience had effectively and successfully reached an audience with such perspectives on China. Much as the man standing on high rock in the painting, Der Wanderer über dem Nebelmeer (The Traveler Contemplating a Sea of ​​Clouds) (1818) by the 19th century German Romantic painter Caspar David Friedrich. The “Dean of Cold War Historians” and Professor of Military and Naval History at Yale University, John Lewis Gaddis, suggests that the position of the character above the precipice and in front of a tormented landscape is contradictory because “evoking the domination over a landscape but at the same time the insignificance of the individual who is included in it.” In greatcharlie’s interpretation, Spalding could be represented by the man standing as he sees dangers that his country faces at the present and tries to imagine and consider responses to those unknown that it may face in the future. He fiercely desires to mitigate them, and thereby allow the US public to rest more easily. 

The practice of understanding the competition between powers and the clashes that result in the establishment of a dominant power was well-demonstrated more than two millennia ago by the Athenian historian and general, Thucydides (c 460 B.C.– c. 400 B.C.)  . The primary focus of Thucydides’ studies was the burgeoning competition and eventual clash of Athens and Sparta. Sparta was the superpower in the region, particularly militarily. As the Athenian empire rapidly grew with determination, to Thucydides, it clearly was just a matter of time before the two powers would clash.

In his book, Greek Political Thought from Homer to the Sophists (Cambridge University Press, 1995), Michael Gagarin presents Thucydides explanation for the Peloponnesian War which states the following: “I will first write down an account of the disputes that explain their breaking the Peace, so that no one will ever wonder from what ground so great a war could arise among the Greeks. I believe, however, that the truest reason for the quarrel, though least evident in what was said at the time, was the growth of Athenian power, which put fear into the Spartans and so compelled them into war, while the explanations both sides gave in public for breaking the Peace and starting the war are as follows.” 

There is a sense, a feeling, within the pages of Stealth War that Spalding believes the unwanted crisis, war between the US and China, will come. To that extent, he wants the US to be best prepared to fight that war and to win. There is a definite materiality in what he presents. Specific points of China’s attack on the US and suggestions on responses are clearly laid out by Spalding in the 11 chapters of his book’s 256 pages They are organized and titled as follows: Chapter 1: “Unrestricted Warfare”; Chapter 2: “How We Got Here”; Chapter 3: “Economy”; Chapter 4: “The Military Crisis”; Chapter 5: “The Digital Battlefield”; Chapter 6: “Modern Warrior 5.0: The 5G Future”; Chapter 7: “Politics and Diplomacy”; Chapter 8: “Stealing Intellectual Property”; Chapter 9: “World Domination via Infrastructure”; Chapter 10: “Sino Solutions: How to Combat and Stop China’s Stealth War”; and, Chapter 11: “Beating China at Its Own Game”. In his discussion of each issue, Spalding first looks from within, taking a deeper dive into impressions of the situation that he has developed over years of immersion in all aspects of the matter. His discussion of issues reflects the realist, the pragmatic thinker that he is. 

Support for Spalding’s pragmatic approach to examining China’s behavior vis-a-via the US, and the world, appears to have been provided more than two millennia ago by the aforementioned Thucydides. Thucydides is sometimes credited with founding of what is known as”political realism.” It is unknown to greatcharlie whether Spalding actually does or does not associate himself with the world of political realism, and it would go out on shaky ground to claim either was the case. Yet, Spalding’s discussion of China’s ambitions appears to manifest aspects of that theory. Central to political realism is the assumption that humans, deep down, are selfish, fearful, ambitious, and self-interested. As for countries, they are driven to safeguard national interests. To that extent, the tragic choice to go to war stand as indispensable tools in the management of state affairs and diplomacy: statecraft. As a result, the world has become a place in which each country may find themselves in conflict with competitors with similar interests, ambitions, and goals (targets charted by time).

In his search for a reason, a rationale, a purpose, for the current state of relations with China, Spalding, led by data available to him, explains it was the errant policy positions of former US administrations. At the core of those policies pursued, according to Spalding, was the misguided belief that economic development would lead the way to China’s transformation to a more democratic form of government and away from Communism. Given the manner in which he explains it, readers are left to contemplate how such a horrifying blunder could continue on for so long.

Even when the First Chairman of the People’s Republic of China Mao Zedong (left) was offering his olive branch to US President Richard Nixon (right), he reportedly regarded the US as the enemy, and that Chinese documents “likened it to Hitler.” Spalding notes Pillsbury recounts how People’s Republic of China Foreign Minister Zhou Enlai, during a meeting with US Secretary of State Henry Kissinger, proclaimed “America is the ba.” The Chinese interpreter rendered this statement as “America is the leader.” That was a blatant mistranslation: “ba,” as used in most political language, means “tyrant.” When the translator was later asked why he softened Zhou’s language to Kissinger, he said, “It would have upset him.” At the time, US policymakers and decisionmakers were too interested in embracing a policy of helping China in order to destabilize the Soviet Union to concern themselves with the Communust Party of China’s hostile attitudes toward their country.

China Well Exploited Pro-China Policies of the Past

Providing some framework for understanding the approach China took toward the situation, Spalding explains that war between countries in the 21st century looks much different than war in the 19th and 20th centuries. He notes that instead of bombs and bullets, it is about “ones and zeros and dollars and cents: economics, finance, data-information, manufacturing, infrastructure and communications.” He insists that today if one controls those fronts, “you can win a war without firing a shot.” Spalding calls it a simple logical strategy that leaders in the West have been very slow to grasp. To provide a taste from the text, Spalding elaborates further on matter in Chapter 1: “Unrestricted Warfare” on page 14: “Military might is only one way to express aggression, only one of many ways to attain power. In China’s view, economic power strengthens all the fields of potential engagement. In other words, money bolsters the military but also bolsters every other sphere of engagement imaginable. It can be used to influence and sway political leaders in foreign countries, silence ideas, and purchase or steal technology. It can be used to manufacture goods at dirt cheap prices and drive competitors out of business, or weaken rival economies. It can be used to create an army of academics, who fan out to gather scientific, technological, and engineering intelligence that can be used to further other goals.” 

To that extent, Spalding goes on to clarify the matter by stating that perhaps one of the most important and revealing documents of the Communist Party of China is a 1999 work entitled Unrestricted Warfare. Written by two senior colonels in the PLA, Qiao Liang and Wang Xiangsui, it discloses a number of prospective strategies that could possibly shift the balance of power throughout the world in China’s favor. Spalding insists that Unrestricted Warfare should be required reading for all branches of the US government and for business leaders because it outlines the strategy at the root of China’s policies in the world. He quotes a passage of the document that states: “The new principles of war are no longer ‘using armed force to compel the enemy to submit to one’s will,’ but rather are ‘using all means, including armed force and non-armed force, military and non-military, lethal and non-lethal means to compel the enemy to accept one’s interests’.”

Past US Administrations: Blind as Beetles

Given what Spalding reports, it seems at one point, opinion in nearly all foreign policy circles in the US were adverse to the suggestion of an aggressive China that would challenge the US position as a the world’s leader, or as Chinese government spokespersons and Communist Party of China leaders refer to as US dominance in the world. It is to go out on shaky ground to ask readers to remember that sentiment was heard during the 2020 US Presidential Campaign when then Presidential candidate Joe Biden referring to China stated: “I mean, you know, they’re nice folks, folks. But guess what? They’re not competition for us.”

Spalding notes that in The Hundred-Year Marathon: China’s Secret Strategy to Replace America as the Global Superpower (Henry Holt and Co, 2015), China observer Michael Pillsbury discloses that even when the First Chairman of the People’s Republic of China Mao Zedong offered his olive branch to US President Richard Nixon, he regarded the US as the enemy, and that Chinese documents “likened it to Hitler.” Spalding notes Pillsbury recounts how People’s Republic of China Foreign Minister Zhou Enlai, during a meeting with US Secretary of State Henry Kissinger, proclaimed “America is the ba.” The Chinese interpreter rendered this statement as “America is the leader.” Pillsbury said that was a  blatant mistranslation: “ba,” as used in most political language, means “tyrant.” When the translator was later asked why he softened Zhou’s language to Kissinger, he said, “It would have upset him.” At the time, US policymakers and decisionmakers were too interested in embracing a policy of helping China in order to destabilize the Soviet Union to concern themselves with the Communust Party of China’s hostile attitudes toward their country.

US President Bill Clinton (left) and General Secretary of the Communist Party of China, Jiang Zemin (right). From 1993 and 1998, there were several meetings between Clinton and Jiang. One the surface, US-China relations were mostly positive, a situation Spalding would explain was due to a desire in Washington to satisfy Beijing. Clinton signed a law passed by Congress establishing permanent normal trade relations with China. With the relationship codified, US investor confidence soared, as did business. China’s economy roared forward, too, due to a confluence of events: China was then accepted as a member of the World Trade Organization, Apple unveiled the iPod, and an eruption of digital goods turned into a stampede of international investment. Spalding makes the acidulous remark that many policy makers and business investors then, as well as years before, seemed to assume capitalism has special powers that could melt away authoritarianism and totalitarianism. Yet, despite China’s exponential growth, Spalding notes, as predicted by James Mann in his book, The China Fantasy: Why Capitalism Will Not Bring Democracy to China, the Communist Party of China only honed its brand of authoritarian capitalism.

Spalding remarks acidulously that many policy makers and business investors of the past seemed to assume capitalism has special powers that could melt away authoritarianism and totalitarianism. He goes on to discuss James Mann’s book, The China Fantasy: Why Capitalism Will Not Bring Democracy to China (Viking Adult, 2007), in which the author calls the West’s idea that China will morph into a liberal democratic society “the Soothing Scenario,” Mann summarizes the logic this way: “The country’s rapid economic growth will lead to far reaching political change as well. Eventually, increasing trade and prosperity will bring liberalization and democracy to China.” Spalding also points to Mann’s discussion of the opposite of the Soothing Scenario: “The Upheaval Scenario,” in which doubters envision China collapsing as a result of economic chaos or some kind of mass revolution. The result is turmoil and chaos. Spalding explains that Mann was way ahead of the curve when he wrote his book in 2007–a time when China was literally exploding with commerce and manufacturing. Six years earlier, then US President Bill Clinton signed a law passed by Congress establishing permanent normal trade relations with China. With the relationship codified, US investor confidence soared, as did business. China’s economy roared forward, too, due to a confluence of events: China was then accepted as a member of the World Trade Organization, Apple unveiled the iPod, and an eruption of digital goods turned into a stampede of international investment. Yet, despite China’s exponential growth, Spalding notes, Mann did not adhere to either the Soothing or Upheaval scenario. For Mann, all signs indicated that the Communist Party of China would continue to hone its brand of authoritarian capitalism.

There was not simply a gap between a perception of Chinese actions and intentions with a perception exemplar of the political realism school of thought as that of Spalding. Moreover, there appeared to be a gap between perception and reality on China among US political leaders and policy makers. They saw no urgency in responding effectively to what Beijing has been doing. The reality was hardly missed in Beijing that it would not be possible to simply rise to the mantle of the world’s dominant power. In order to possess the title of the world’s dominant power, China had to dispossess the US of it.

Spalding presents the subtle differences between logic and lunacy in expressing the actions of US political leaders and policymakers coddling a China determined to surpass the US, a thought many within policy circles and the general public in the US might still find difficult to wrap their heads around. Yet, Spalding curiously manages to forge an intriguing link for the US public, and imaginably the world at large, to what once quietly resided in the hearts and minds of senior military decision makers on China as well as what may generally reside in them now.

To that extent, the book has become, and will likely remain for some time, a stimulus to the discourse on US-China relations for a broader audience than other books on the subject. As awareness increases on the realities of that relationship, there has been an albeit gradual shift in perspectives on China. In foreign policy circles, it has been a gradual turn. In business circles, it has been an even slower transition, but somewhat steady. As he insists upon immediate change in response to developments, Spalding, himself, notes that “Some critics will accuse me of being alarmist or sensationalist.” Perhaps it will turn out in the end that the necessary change in thinking occurred too slowly.

Though not felt within the society as a whole but more so among a finite set of those in the national security bureaucracies whose responsibility is to keep an eye on China, there is a sense of foreboding similar to that which characterized the Cold War era when it was in full gallop during the 1950s and 1960s. Indeed, they are plenty worried. Many are worried enough to express their own concerns, if able, if permissible, in books after leaving the respective services, military, diplomatic, intelligence, sounding the klaxon loudly on China’s moves much as Spalding had already done with Stealth War. In Graham Greene’s The Ministry of Fear (Penguin Classics, 2005) is found the line: “He had been frightened and so he had been vehement.”

Indeed, since the time Spalding published Stealth War, more have joined him in shining increased sunlight China’s activities, not just on the coronavirus disaster or in the realm of national security, but a multitude of other actions, all, nonetheless, malign. Included among those actions would be: predatory investment scams directed against trusting governments of often small and less industrialized countries; intrusion of sovereign waters for mass fishing; intellectual property theft from companies and research labs that have invested millions in research and development into that which was stolen; and, demands of censorship insisted upon of those in any arena who have received funding from, or are doing business with, China, concerning anything the Communist Party of China does not want discussed. Beijing must accept that as a result of such actions, impressions of China have not exactly been positive worldwide.

The Key Chapter at the Moment: Chapter 4: “The Military Crisis

Spalding states on page 43 in Chapter 4: “The Military Crisis”, “Fortunately, for the moment, China has no interest in engaging in a ground war, or any kind of war that entails actual violence and physical destruction.” Nevertheless, it is a coming war between the US and its allies against China which haunts the story that Spalding tells and has kept many readers turning the book’s pages to find clues as to why and how it will all come about. Though Spalding admirably discussed the issue of a possible war between the US and China, he explained the situation as it existed at the time he wrote Stealth War. It appears that the problem has metastasized a bit on the diplomatic and economic front since. 

No doubt, the Communist Party of China is not expending enormous financial and material resources only to pose a potential threat to Taiwan’s self-rule and somewhat attenuated sovereignty out of academic interest or worse, some banal amusement; far from it. It is not Spalding’s message, but after aggregating what he explains with more recent events, what becomes clear can be stated in simple words for political leaders in Washington and Taipei: “The Red Chinese are coming!” If this assessment is in error, and upon greatcharlie proved, better news could not be reported for the sake of international peace and security, and humanity itself.

In the top senior policymaking offices of the civilian leadership of US and its Western and Eastern allies, officials surely believe uniformly that a show of force is the most effective option to respond to and deter: China’s territorial ambitions particularly regarding Taiwan and the waters of the Western Pacific, China’s displays of naval and air power and China’s threatening words in rebuff to US leadership and dominance in the region and the world. The most formidable show of force policymakers have used is joint exercises between US Navy aircraft carrier battlegroups and aircraft carriers of its allies and having US warships transit the Taiwan Straits. In addition to being a show of force, such deployments also serve as an excellent opportunity for the US and its allies to project joint power and demonstrate their commitment to collective defense, rehearse cooperation, and particularly allow allies to appreciate the benefits of US leadership. Based on what Spalding explains, some readers might conclude that such displays of force by the US and its allies more satisfy the need for some ostensibly strong action and serve more to soothe international concerns, provide a display of leadership, and domestic consumption. In reality, the aircraft carrier battlegroups, as mighty as they are, present themselves as easy prey for Chinese missiles.

Spalding explains that China has thousands of precision warheads tied to a sophisticated command and control system. He expounds on this by pointing out that the Dong Feng-26 (DF-26) ballistic missile–46 feet long, 44,000 pounds, and built to carry both conventional and nuclear warheads–was designed to obliterate aircraft carriers. The DF-26 has a range of 2,500 miles, which means it can strike US warships in the western Pacific Ocean, including ships based in Japan. In the specific context of defending Taiwan, he gets across the idea that in order to deploy a carrier’s bombers on a mission in the South China Sea, the carrier would have to come within the range of DF-26 and other missiles that would destroy it. Though noting that the US Navy has SM-6 interceptor missiles, thought to be capable of destroying the DF-26, Spalding leaves no doubt that the sheer amount of smaller, long-range ballistic missiles at China’s disposal and the blazing speed with which these weapons travel–six thousand miles in thirty minutes–pose, at the moment, an enormous threat to US warships. To that extent, he writes: “It is conceivable that an undetected conflict might end in thirty seconds. Game over.” That is a hard saying.

Gnawing on the subject a little bit more, Spalding explains that assessed from an economIc standpoint, the PLA constructed a $1 billion dollar missile system designed to destroy a $30 billion ship. Spalding says that there is no doubt our carriers are valuable and powerful machines. However, in plain English he also states that “their effectiveness in policing the Pacific is now extremely limited.” To that extent, ironically, having US and allied aircraft carriers sail within the range of the DF-26 may repeatedly send the wrong message at an exorbitant cost. In terms of deterring China regarding Taiwan, the move may have repeatedly demonstrated that the US and its allies would be unable to act in a way to halt an assault on the island while at the same time avoiding unacceptable losses. No greater support could be provided to the cluster of expressive hawks the leadership in the Communist Party of China under Xi, clamoring for an assault on Taiwan sooner than later.

China’s Dong Feng-26 (DF-26) ballistic missile (above) was designed to obliterate aircraft carriers. The DF-26 has a range of 2,500 miles, which means it can strike US warships in the western Pacific Ocean, including ships based in Japan. So do the math: in order to deploy a carrier’s bombers on a mission in the South China Sea, the carrier would have to come within the range of DF-26 and other missiles that would destroy it. The sheer amount of smaller, long-range ballistic missiles at China’s disposal under a sophisticated command and control system, and the blazing speed with which these weapons travel–six thousand miles in thirty minutes–pose, at the moment, an enormous threat to our ships. Spalding says It is conceivable that an undetected conflict might end in thirty seconds. Game over. It is a hard saying.

Following up on Spalding’s statement in Chapter 4 that the US cannot fight a ground war with China, he expounds on that point by stating products from China are crucial for the production and operations of much of the US military’s weapon systems and gear. He states directly that “the amount of goods that have been shipped and continue to be shipped from China for military use is mind-boggling.” Spalding goes into detail somewhat by offering examples of the daunting amount of military equipment that contain components made in China. He says the propellant that fires out Hellfire missiles, which are launched from helicopters, jets, and drones, is imported from China. He points the glass in night-vision goggles contains a metal called lanthanum, a large majority of which comes from China. He also points to computers that US military and naval officers write plans and reports and print them on come from China predominantly. Instructional videos are watched on screens made in China.

Spalding reminds that there are laws mandating that the US military buy goods that are made in the US. However, he believes that the US has gone too far with outsourcing and has reached a point where it is unable to defend itself and its interests without Chinese manufacturing and logistical support. If supply lines were cut from China, or even if a trade war broke out with embargoes, Spalding predicts the US military would have a nightmare sourcing its needs and getting them to the battlefield. Spalding quotes a 2015 essay by retired US Army General John Adams which states: “Our almost complete dependence on China and other countries for telecommunications equipment presents potentially catastrophic battlefield vulnerabilities.”

The Nuclear Dimension

On China’s nuclear capabilities, on page 201 in Chapter 10: “Sino Solutions: How to Combat and Stipop China’s Stealth War”, Spalding revealed that his greatest concern was that as the US seeks to balance our economic relationship, the PLA will continue to be left unrestricted. Spalding explains that unfortunately as a consequence, the US needs the threat of its nuclear arsenal as a deterrent. Spalding says the assumption is if course that these bombs will never be used. Nevertheless, he feels that “invoking fear of the unthinkable–the madman or Wildman theory of negotiation–often works.”

Delving a bit into the realm of conjecture, it is conceivable that warplanners in China may assess that they do not have the time to develop nuclear parity with US in order to offset the massive advantage the US has with its nuclear arsenal and that Washington would likely use as leverage to impact China’s choices in a conflict  However, they may have assessed that it might be feasible to create a sufficient nuclear counterbalance to threaten a rapid response retaliatory nuclear strike or sufficient first strike to convince the US that some resolution might be best to avoid incurring unacceptable losses of people and property.

From background to foreground: USS Carl Vinson (CVN-70), (Japanese Maritime Self-Defense) JS Ise (DDH-182), HMS Queen Elizabeth (R08), and USS Ronald Reagan (CVN-76). Spalding explained that from an economIc standpoint, the PLA with the DF-26 constructed a $1 billion dollar missile system designed to destroy a $30 billion ship. Spalding says that there is no doubt our carriers are valuable and powerful machines. However, he also states that “their effectiveness in policing the Pacific is now extremely limited.” To that extent, ironically, having US and allied aircraft carriers sail within the range of the DF-26 may repeatedly send the wrong message at an exorbitant cost. Other than providing the US and its allies the opportunity to rehearse cooperation, display joint power, and appreciate benefits of US leadership, in terms of deterring China, the move may have demonstrated that the US and its allies are unable to act in a way to halt an assault on Taiwan while at the same time avoiding unacceptable losses. No greater support could be provided to the cluster of expressive hawks within the Communist Party of China’s leadership, clamoring for an assault on Taiwan sooner than later.

Other Thoughts That Billowed Up in This Reader on Taiwan Via Spalding’s Dialectic Ladle

In the end, central to the argument to take military action to gain and retain control of Taiwan, is what was central to arguments on how the US managed to place itself in such a challenging position with Beijing: the character of US political leaders. That is stated not to put into question the personal qualities of the men and women who have honorably and admirably chosen to dutifully serve the people to the best of their abilities.  Rather, it is to suggest that fighting the type of war that the US might be required to prosecute, defeat China, thwart China’s ambitions, drive it off and forever away from Taiwan might not be characteristic of certain leaders. In taking that course, there would be the potential for millions to die in China, unacceptable losses on the side of the US and its allies, and as grotesque as the thought may be, China could potentially level an unexpected, crippling blow to US naval and air forces could also result. What might be hoped in Beijing to be a limited lighting war launched in the name of protecting China’s sovereignty, could become total war, a war of national survival. The nature of the one who would make the decision in the US on how to respond to China’s aggression will make all of the difference. Perhaps in Washington, a decision has already been made on how to proceed in such a contingency. Perhaps the decisions on the defense of Taiwan have been established as protocols. In defense of its ally, US political leaders may be obliged to comply with them. In the end, it boils down to what the US political leaders want from the situation, a war ending in a type of Pyrrhic victory with losses or a struggle resulting in some acceptable or tolerable new paradigm that allows for an Irenic victory, in which the two opposing sides find some resolution and at least a modicum of satisfaction.

Post factum nullum consilium. (Counsel is of no effect after the fact.) To race well, a jockey and horse must be one animal. The horse must be superbly harnessed. When a horse does not run well, it is typically considered that it may have a poor jockey. On China, military capabilities and resources, state diplomacy to include economic and public diplomacy, and policymaking must also function together as one figurative animal. The expectation is for senior policymakers to master the situation through their management of it. When this is the case, they can often be more precise, to an extent exact, in policy planning , formulation, and implementation. Evidence of that can be found in the fact that their figurative brush strokes will appear finer.

Policies that seem to be too far off from the realities of military capabilities and resources, military power, and awkward diplomatic exchanges and pursuits of inconsequential inroads may evince to competitors and opponents that policymakers are out of touch with the real situation and acting on mere perceptions and perhaps surmisal. Parsing out such concerning the US must be an ongoing process, an obsession, in Beijing at the moment. It would be part of the effort to determine how the US might react when presented with a situation as an assault on Taiwan.

In the US, producing the very best answers to situations is made more difficult because there are a variety of views and interests within the national security bureaucracies that must be balanced when policy is being made. if decisionmaking were directed, controlled by a single source, as in China under the Communist Party of China, under the command of Xi, a magician may seem to be somewhere in the mix who is clearly aware of what to do and how to do it in a way that keeps China a step or more ahead of its main competitor or opponent. Perhaps that is Xi, himself. On the other hand, some policy analysts perceive that for too long there has been a blindness to the best interests of the US that borders on madness. A sense is given off by them–to include Spalding it seems–that it may be too late to really change the course of things by implementing new approaches.

What might be hoped in Beijing to be a limited lighting war launched in the name of protecting China’s sovereignty, could become total war, a war of national survival. The nature of the one who would make the decision in the US on how to respond to China’s aggression will make all of the difference. Perhaps in Washington, a decision has already been made on how to proceed in such a contingency. Perhaps the decisions on the defense of Taiwan have been established as protocols. In defense of its ally, US political leaders may be obliged to comply with them. In the end, it boils down to what the US political leaders want from the situation, a war ending in a type of Pyrrhic victory with losses or a struggle resulting in some acceptable or tolerable new paradigm that allows for an Irenic victory, in which the two opposing sides find some resolution and at least a modicum of satisfaction.

At the outset of the review, greatcharlie explained that the book would not be broken down to the fullest extent possible, but hopefully enough so to raise interest in readers to take a look at the book. There is so much more to discover in Stealth War. The book is a steady flow of information, data, and expressions from beginning to end. Spalding is the purveyor of a foundation upon which an honest discussion can be had on US-China relations or simply the China Threat at all levels, from the senior government policymaker to the average US citizen.

There nothing that greatcharlie appreciates more than a book that stirs the readers curiosity, inquiry into the author’s judgments, greater consideration of their own views on the matter, and elicits fresh insights based on what is presented. That is exactly the type of book that Stealth War is. It is assured that after the first reading Stealth War, one would most likely go back to the book and engage in that stimulating process again and again. There is no telling what insights and how many might be brewed up from within readers after they have had a chance to read through it. Too much pleasure has been lost whilst abstaining from this delightful book. As greatcharlie suggested earlier here, those reading this review who have already read Stealth War would do well to go through the book again. 

Perhaps needless to say but it is nonetheless stated, with absolute conviction and relish, greatcharlie unequivocally recommends Spalding’s Stealth War to its readers.

 

By Mark Edmond Clark

Sidelights on Nicholas Eftimiades, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020)

China is currently engaged in a very aggressive, massive espionage, cyber, and covert action assault on the US with the goal of catching up with it technologically, militarily, and economically as quickly as possible. China hopes to eventually become the world’s dominant power. Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Victories on the intelligence front have likely most satisfied People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, as under his leadership, China’s intelligence capabilities have been greatly enhanced and have evolved. In his monograph, A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that will shock its readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined.

Since the era of the People’s Republic of China’s Second Chairman Deng Xiaoping, from 1976 to 1994, the Communist Party of China’s leadership has lived in optimistic expectation of better fortune for the Chinese people in terms of economics and their standard of living. Party leaders covet the position the US holds as the dominant power in the world. In accordance with that thinking, long range plans were formulated. Such really should have been the expected response of Chinese national leaders who were first and foremost dedicated to a very aggressive revolutionary movement. It was determined in Beijing that espionage offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. At that time, many of China’s largest companies were state owned, or had close linkages to the government. From all accounts, China thereby embarked on what has become a very aggressive and massive espionage, cyber, and covert action assault on the US with the ever-fixed goal of catching up with it technologically, militarily, and economically as quickly as possible.

Atrocious thefts are now occurring right before everyone’s eyes. Penetration by Chinese officers, operatives, and informants appears to be successfully carried out almost anywhere China desires in the US or worldwide. Chinese intelligence officers have experienced innumerable satisfactions in the spy war. According to a former chief of Counterintelligence for the Central Intelligence Agency (CIA), James Olson, in his superb book, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), China is presently in a class by itself in terms of its espionage, covert action, and cyber capabilities. (The January 31, 2021 greatcharlie post is a review of Olson’s To Catch a Spy.) The struggle on the intelligence front impacts the whole climate of the relations with China. Even when China is engaged in bilateral or multilateral talks, whether on trade, security, or the environment, Chinese intelligence services never cease engaging in robust espionage. Imaginably, victories on the intelligence front provide a most satisfying opportunity for People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, to cock-a-doodle, about how, under his leadership, China’s intelligence capabilities have evolved to the point at which the intelligence services can carry the battle to the home ground of the US itself and win. Senior executives and managers in US counterintelligence services doubtlessly stand exasperated over regular disappointments.

In A Series on Chinese Espionage, Vol. I: Operations and Tactics (Vitruvian Press, 2020), Nicholas Eftimiades shares information and data that, although well-known within the US Intelligence Community and within other intelligence services worldwide, will shock nonpracticioners among his monograph’s readers. They will discover that China’s spy activity is of far greater conception than they might have ever imagined. As might be expected, Chinese intelligence services target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. The revelation will be that Chinese espionage activity is not the exclusive purview of China’s civilian and military intelligence services. In addition to government organizations, commercial entities, academic institutions, and private individuals, entrepreneurs are heavily engaged in espionage against preferred targets in highly industrialized countries. Chinese firms have proved themselves to be quite capable at performing such work. Surely, if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

Eftimiades examination is based on his study on the nature of Chinese espionage worldwide and in-depth understanding developed through decades of experience in the intelligence field. He reviews intelligence processes, setting objectives and tasking, organizations that engage in espionage, looks at their efforts through case studies and analysis of them. He also discusses how China’s espionage activities worldwide has had an impact on US national security, international security, the international political economy, and geopolitics. Eftimiades delves into the practical matters that concern intelligence officers of government organizations and employees of commercial entities and academic institutions as they engage in espionage, and how the Chinese government manages the hybrid government and “independent” civilian intelligence system it has created. While Series on Chinese Espionage, Vol. I: Operations and Tactics is the actual title of Eftimiades’ monograph, the monograph is listed on Amazon.com as Chinese Espionage Operations and Tactics (Vitruvian Press, 2020). The monograph is heretofore referenced in this essay by the latter title. (It might be best for those who may wish to possess a copy to research the text under the latter title. The publication date is September 3, 2020).

A sidelight, as defined by the Oxford English Dictionary, is a piece of information usually given by accident or in connection with another subject, that helps one to understand somebody or something. The goal of sidelights offered in this essay is to present Eftimiades’ monograph in a way that will give our readers a good sense of both what is in it and sort of ideas and insights they might draw from it. In effect, it is a review. For those who may excavate through the monograph and thoroughly and consider points of exposition concerning specific malign activities conducted by China, his work will prove to be substantially edifying. What is most impressive to greatcharlie about the monograph is the manner in which it stimulates thought on a grave issue concerning China. As stated in prior posts, greatcharlie prefers to review texts that can stir a fire inside a reader, and transmit the author’s passion for a subject. Those writings are the most memorable and most enjoyable to sit with. Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.)

The role of reviewer, an unsolicited intermediary between a text’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a work then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil. It is greatcharlie’s preference to provide reviews, sidelights here, that readers of the blog can enjoy and from which they may edify themselves. Nothing greatcharlie states in this essay is intended to give Eftimiades some stick–perish the thought. In greatcharlie’s view, he is brilliant, and works such as his monograph educate nonpracticioners as greatcharlie. They are very much appreciated. This review is not an inquiry into facts presented. All that is being presented here are insights greatcharlie birthed while parsing out the text. Although important details of Eftimiades monograph are discussed here, not everything is revealed. This is greatcharlie’s hard and fast rule on reviews, whether books, or as in this case a monograph. Plenty is left for readers to discover and draw their own insights upon.

Nicholas Eftimiades, the author (above), among other high level positions in the US government, was formerly the Director of Counterintelligence at the Central Intelligence Agency. He is highly regarded for his expertise on China and national security space issues. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. Eftimiades holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University.

The Author

Eftimiades, among other high level positions in the US government, was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. The Intelligence Community awarded Eftimiades with its highest honors to include the National Intelligence Council Achievement Award and DIA Director’s Intelligence Award. As of this writing, Eftimiades holds appointments on the National Intelligence Council as an Intelligence Community Associate, Homeland Security Advisory Council, Economic Security Subcommittee, and the Defense Science Board. Although he has left the CIA, one does not get the impression that Eftimiades has left the fight yet! Eftimiades has testified before several US Congressional and Presidential Commissions concerning National Security issues, future technology development, and the future of the US space program. 

Among several high level positions, Eftimiades was formerly the director of Counterintelligence at CIA. He is highly regarded for his expertise on China and national security space issues. For over two decades, senior government officials and Members of the US Congress relied on Eftimiades to provide in-depth expertise and cogent analysis on China and other national security issues. As a former senior intelligence executive, he has considerable experience in managing intelligence programs, strategic security issues in Asia, and emerging threats/disruptive technologies. Currently, Eftimiades is a professor at Pennsylvania State University, working in the Homeland Security Program. He holds an MS Strategic Intelligence, National Defense Intelligence College; and a BA East Asian Studies, George Washington University. He has lived and studied in Asia. He once served as a senior research fellow at King’s College, War Studies Department in London. During that period, Eftimiades authored books, reports, and a number of articles on China’s intelligence methodology, national security, technology, and space issues. Currently, Eftimiades is a professor at Pennsylvania State University, Homeland Security Program. He is a member of the graduate faculty, teaching homeland security, intelligence, and national security policy. He conducts research on China’s economic espionage, intelligence, and emerging threats. 

As Eftimiades possesses such formidable credentials, it seems needless to say that readers should approach all matters of fact presented by Eftimiades as true to the best of his knowledge and belief. Eftimiades spoke truth to power within halls of the US national security bureaucracies and in the White House. He presents the monograph’s discussion essentially in that same mode, discussing only what he knows to be the truth on Chinese Intelligence Operations. His proceeding publication, Chinese Intelligence Operations is regarded as the seminal work in the field. In the period surrounding its publication in 1994, greatcharlie’s editor did not have the pleasure to read Nicholas Eftimiades, Chinese Intelligence Operations (CreateSpace Independent Publishing Platform, 1994) and in fact was not even aware of its existence. Having read through it in preparation for this review, the book impressed as being a damnably good breakdown of the organization departments, the missions, guiding concepts and intent of its leaders, and the tactics, techniques, procedures, and methods of each service of the “Chinese Intelligence Community” during what could now be called a bygone era. 

To the extent that it has relevance other than by mere subject matter with regard to Eftimiades Chinese Espionage Operations and Tactics. The preceding enables one, through comparisons of assessments of the work performed in varied operational and functional areas, to observe how far Chinese intelligence services have evolved, among many things, as organizations, within the country’s foreign and national security policy bureaucracy, and as vital tools in the hands of the leadership of the Communist Party of China. Interestingly, by examining both Chinese Espionage Operations and Tactics and Chinese Intelligence Operations, one is also provided the opportunity to examine an evolution in the experience, education, thinking and type of insights developed on Chinese intelligence services.. Perhaps readers will discover, much as greatcharlie did, that Chinese Espionage Operations and Tactics takes the reader to a higher level of understanding of the topics and raises the level of discourse to a seasoned intelligence analyst on China. For China watchers in particular, the monograph provides a loom from which new understandings and fresh insights can be crafted. Of course, for those who have not read or do not plan to read Eftimiades, Chinese Intelligence Operations, the opportunity still exists to prosper intellectually by plotting Chinese Espionage Operations and Tactics as the start point on the figurative charts of their respective learning curves on Chinese Intelligence.

Make no mistake, Eftimiades worked at the sharp end of intelligence work and knows the true value of each bit, even trifles, emphasizing in the text what is important to know in order to get the counterintelligence job done. Indeed, through his monograph, readers get a small taste of the discourse between intelligence officers within the bureaucracies in which Eftimiades served, and the flavor of its tone. One might as far as to say that by reading Eftimiades monograph, one gets a sense of the thinking within key US national security bureaucracies on Chinese intelligence activities in the US in the current climate.

Previous Reviews

Among reviews of Chinese Espionage Operations and Tactics published on Amazon.com are a few from former and current US senior executives and intelligence officers of the US Intelligence Community. Their glowing expressions of satisfaction and appreciation,reviews attest to the value, positive impact the monograph had on their thinking and their work. One such review was by Maryann Fialdini, Former Chief, Counterintelligence Operations of the US Defense Intelligence Agency (DIA). She explained: “Mr Eftimiades has broken new ground on his closely researched series on Chinese Espionage Operations and Tactics. His work on Chinese espionage spans 30 years in the intelligence community. In the 90’s he sounded the alarm on China’s rising espionage activities directed against US corporate and government entities. His current series on Chinese Espionage identifies for the reader China’s massive “whole of Society” approach to espionage activity and offers the exceedingly rare combination of insight and judgement from a professional who has a wealth of firsthand experience. Eftimiades work fills an important gap in US literature as it relates to Chinese intelligence. I highly recommend this book!” Another fine review was from David Tsai, formerly of the Library of Congress. He stated: “Most up-to-date comprehensive and detailed treatment of the subject based on the author’s objective analysis of close to 600 cases! An intelligence practitioner as well as academic scholar Mr. Eftimiades has given his readers a clear picture of Chinese espionage doctrine and tradecraft, based on a combination of his experience and scholarship. This excellent and insightful book is highly recommended for both professionals and novices who are interested in this subject.” A review from Nicholas Kikis, former Director of the DIA’s Defense Clandestine Service and Chief of East Asia Division, that appears on the back of the monograph, proffers: “A must-read for professionals in Counter intelligence, security and government affairs. The author has crafted the most detailed account ever published on China’s espionage operations and tactics . . . The USA is loosing its secrets and technology to China’s “whole of society” approach . . . Our Nation’s need for good counterintelligence has never been greater . . . Mr. Eftimiades is the real deal, a veteran of the Intelligence Community who describes the challenges and provides recommendations on how to do a better job in protecting America.”

Interestingly, Eftimiades does not mention anything about having to submit his monograph to the Publications Review Board of his former employer, CIA, for review. For security reasons, it is a requirement for officials from the US Intelligence Community with backgrounds as his. One might expect his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any of that information could possibly provide some important bit, some nuance on what the US knows about China’s espionage operations and tactics in the US. Surely, the Publications Review Board stopped anything from going into the text if in its view it even approximated classified information. Hypotheses and arguments are a bit more challenging to judge for security reasons. Certain facts, even if left out hypotheses and arguments, can be assessed as being confirmed by some clever sorts in an adversaries camp seeing that those facts might alone be the sole solid basis upon which a particular inference might logically be made.

Sidelights

Eftimiades’ monograph is divided into 12 sections. They are entitled as follows: Section1: “Preface”; Section 2: “Key Findings”; Section 3: “Introduction”; Section 4: “Analytical Methodology”; Section 5: “China’s Legal Framework for Espionage”; Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; Section 9: “Analysis of Espionage Tradecraft”; Section 10: “Impact”; Section 11: “Summary”; and, Section12: “Link to video Analysis of China’s Economic Espionage Tactics.” Since the monograph is only 56 pages in total, it seemed apropos for this review to condense the discussion of 8 of its 12 sections, highlighting from each what might be its most intriguing elements/aspects for our readers. For 9 of the monographs sections, to include one not précised, greatcharlie provides sidelights.

Section 1: “Preface”

From the outset, Eftimiades makes it clear that the focus of his monograph, although there is some emphasis on espionage activities against the US, is on China’s worldwide human intelligence operations. The monograph does not include a discussion of China’s intelligence analysis capabilities, technology collection, not domestic operations against perceived internal threats. He indicates that cyber espionage is only addressed in select cases which were enabled by humans providing insider access. Eftimiades notes that he brings his own experiences and perceptions into his interpretations of those cases.

Eftimiades also gives notice to readers that the monograph only reflects known Chinese intelligence operations. Even with a review of hundreds of espionage cases, he recognizes that certain matters are left open such as the number of individuals engaged in espionage activities worldwide for China, and whether the cases he analyzed represent as much as 90 percent of the total or as little as 10 percent. (The word “worldwide” qualified the former statement of the two. Perchance the number operating in the US is known!) Eftimiades insists that even the Chinese government does not know the precise number of individuals spying on its behalf. He suggests that uncertainty about that total would be due to China’s decentralized “whole of society” approach to intelligence collection. Still, he felt enabled due to the volume of cases and careful–experienced, astute–analysis of operational details, he could draw certain conclusions about China’s espionage operations and tactics.

Eftimiades’ statement about Chinese intelligence operations and tactics practiced in the US is a very bold one to make starting off from scratch in his “Preface”. Writing in that manner, Eftimiades was sure to create more questions than anything else. Reading what was stated by a number of reviewers of the monograph from outside the US national security bureaucracies, this point could perhaps be deemed as the metaphorical low-hanging fruit for criticism. Given the strength of the mind of a man as Eftimiades, it could be the case that he has dangled this statement on the number of Chinese officers and operatives around the world, aware that it would draw a strong reaction among close readers and light the fire that would ignite a lively discourse within and among them. He is a former director of CIA Counterintelligence, which makes him a member of a rather unique caste of singular individuals who would hardly do anything without considerable forethought. To go a bit further, given Eftimiades background one might think perhaps there is some counterintelligence benefit in refusing to confirm publicly, not allowing an adversary to discover what the accepted size and strength of its espionage operations are. Imaginably that information might aid them in planning around US thinking, potentially finding some advantage if the estimated figures are too high, too low, or spot on. 

The likely first impression of readers resulting from Eftimiades’ “declaration of nescience” on the numbers of would be Eftimiades could not have managed to effectively consider the ends, was, and means of Chinese organizations engaged in espionage if an important leg of the three leg “strategy stool”, means, which includes the resources, size and strength of those organizations, was unknown to him. Unaware of that it was harder to see how he could delve into a more elaborate discussion of their operations and tactics. Curiosity over how Eftimiades managed everything would surely compel the many readers to push forward into the text. However, it would very likely be regularly done with some reservation. To the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US, to be both above board and fair, are only proffered in the abstract.   

Readers looking at the matter on their own might wonder what is the average caseload for a Chinese intelligence officer from either the civilian or military service If it is more than one, let one surmise three or four, then one might begin to believe the espionage crisis is much greater in magnitude. One might consider that given likely number of Chinese intelligence officers and operatives in the field, the true number of Chinese personnel involved increases exponentially when the number likely needed to provide logistical support for such a grand number of officers and operatives in the field and their operations which appear to vary in size and scope, are considered. One might not only infer from the number and size of known operations, their intensity and tempo, and apparent effective level of support for each the totality of Chinese intelligence officers and operatives in the field, but a close approximation of their number might be reached by considering just how much has been stolen, usually detected well after the fact. Later, in the “Summary” section, Eftimiades notes that although he may not be certain of the true number of Chinese intelligence officers that are on the ground in the US but himself surmised it must be in the thousands.

There have been claims that the number of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field. The issue of numbers of Chinese spies in the US is not limited to debate within the US Intelligence Community. It has been widely reported by the mainstream newsmedia in the US that China’s intelligence services have established espionage networks throughout the country. Guo Wengui is a billionaire businessman who claimed to have close ties to China’s civilian and military intelligence services and broke with the regime. Guo revealed in his first interview in the US that those espionage networks reportedly include up to 25,000 Chinese intelligence officers and more than 15,000 recruited operatives. Guo explained that he learned about Chinese spy activities from Ma Jian, a former vice minister of the civilian intelligence service and Ji Shengde, a former military intelligence chief. As that figure, 25,000, was put forward nearly 5 years ago, the number of Chinese intelligence officers who have essentially strolled into the US and are now operating clandestinely and successfully on the ground now may be much higher. Surely, there is an officially estimated number of Chinese intelligence officers and operatives in the US Intelligence Community. Whether it will ever be made public remains to be seen, but surely, even without that figure, there is some general acceptance that what is coming toward the US is à la débandade.

People’s Republic of China Minister of State Security, Chen Wenqing (above). Chen studied Law and Political Science at Southwest University in Chongqing, and joined the Ministry of Public Security in 1984, where he worked for a decade. In 1994, Chen was assigned to the Ministry of State Security (MSS), becoming Deputy Director at the Sichuan provincial state security department. In 1998 Chen took over leadership of the State Security Department in Sichuan. He held that position until 2002, when he was appointed Chief Prosecutor at the Sichuan Provincial People’s Procuratorate. In 2006, Chen transferred to Fujian, serving as Deputy Party Secretary and concurrently head of the provincial Commission for Discipline Inspection (CCDI) until 2012. Following the 18th National Congress of the Communist Party China, Chen was brought to Beijing to serve as a Deputy Secretaries of the CCDI. He was appointed Party Secretary of the MSS in October 2016 and Minister in November 2016.

Section 2: “Key Findings”

In the section, “Key Findings”, Eftimiades provides a list of judgments supported by the information and data in his monograph. For readers, especially students, they may provide some guidance on an academic inquiry concerning Chinese intelligence. Right out of the gate, he notes that his “Key Findings” section is the product of his earlier analysis of 595 documented cases of China’s worldwide collection efforts. Thereby, they stand here independent of, but a primary feature of what is discussed in the monograph. In the monograph’s “Preface”, Eftimiades plainly states that “the focus of this work is on [China’s] worldwide human intelligence (HUMINT) operations.” Yet, in his key findings, he seems to indicate that the true focus of the monograph’s discussion, rather than being the aggregate espionage efforts of government organizations and commercial entities, academic institutions, and independent individuals in the US, is Chinese government civilian and military operations. Imaginably for some, Eftimiades may appear to shortshrift readers on any findings developed through the study of the totality of China’s espionage in the US. Perhaps in Eftimiades’ defense, his omission may very well have been more of an issue of editing and oversight.

To the extent that his key findings are limited to government espionage activities, some might readily assert that rather than opening up new territory, his findings were nearly all well-trodden ground. Indeed, at first blush, one might view what Eftimiades presents as his findings as a somewhat prosaic enumeration of highlights from his examination of the 595 cases. However, greatcharlie assures that they are much more as there are some striking elements among them. Eftimiades 10 key findings were a follows: 1) Chinese espionage activity  has greatly expanded in the past 20 years; 2) Chinese entities conducting espionage include government agencies, the People’s Liberation Army, State Owned Enterprises, private companies, individuals, and several universities; 3) Approximately half of China’s worldwide intelligence collection efforts target military and space technologies; 4) Over 90 percent of China’s espionage activities are performed by ethnic Chinese and males perform more than 80 percent of it; 5) The Ministry of State Security, China’s main civilian intelligence service, exploits social media to target foreigners with access to sensitive information. Those recruitment efforts vary in quality considerably; 6) The Ministry of State Security make use of China’s visa and border control system to identify potential recruitment and manage clandestine assets; 7) Ministry of State Security espionage tradecraft has improved over the last four years, due in part to pressure against it from US counterintelligence services; 8) Nearly half of China’s traditional espionage efforts–pursuing political and military secrets–and covert action campaigns are targeted against Taiwan; 9) China’s foreign science and technology collection efforts correlate closely to the priority technologies identified in government strategic planning documents; and, 10) China’s “whole society approach” to espionage has a harmful effect on the US economy, diplomatic influence, and military capabilities. Furthermore, China’s actions threaten European national and economic security through espionage and coercion against government entities and business decision making.

What sparked greatcharlie’s interest considerably was Eftimiades finding concerning non-ethnic-Chinese recruitment, that more ethnic Chinese recruits are used than nonethnic ones by Chinese government organizations and commercial entities engaged in espionage in the US. Multum in parvo. (Much in little. (Small but significant.))

He makes an impressive statement, but regrettably, he does delve deeper into this issue at any point later in the monograph allowing readers to understand how he got there.  His “Analysis of Espionage Tradecraft” section would have been taken to even greater heights. Useful at some point of the monograph’s discussion also would have been some background on the evolution of Chinese intelligence practices to recruit nonethnic Chinese as well as ethnic Chinese as operatives. With regard to greatcharlie’s aforementioned presumption concerning Eftimiades somewhat likely effort to stoke debate on the monograph, perchance once again he is providing more grist for the mill on this score. Perhaps a set plan regarding the monographs page length did not allow him to expound on the matter.

Perhaps it would be enough for some to say in this case that Chinese intelligence services may have recognized they can achieve their respective goals more efficiently and effectively by working mainly with ethnic Chinese recruits. Yet, surely, Chinese espionage in the West has evolved from pursuing ethnic Chinese sources alone. All things considered, such a limited effort by Chinese government organizations and commercial entities would hardly be the case. It stands to reason that the number of nonethnic recruits with which they have been successful is far higher than the few he has enumerated. To an extent, in Eftimiades own examples there is evidence that a number of nonethnic Chinese operatives were targeted and successfully recruited. Chinese intelligence services clearly have the interest and capabilities to bring in such recruits presumably as would Chinese commercial entities engaged in espionage in the US.

As discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” it was once generally understood in the West that the standard approach to human intelligence collection by MSS has been to co-opt low-profile Chinese nationals or Chinese-American civilians to engage in the acquisition of mid-level technology and data. Travellers, businessmen, students, and visiting researchers are often approached to undertake intelligence tasks, and the MSS maintains control of them through inducements and personnel connections, and the potential threat of alienation from the homeland. Members of the Chinese diaspora residing in Western countries, especially new émigrés, who possessed the requisite expertise and appropriate positions in a public or private organization and family members remaining in China, would be compelled to perform tasks and to steal information of interest that they came across for the intelligence services. This method of intelligence collection also followed the concept of keeping things simple. It is still being put to use. However, while ostensibly being a satisfactory solution, MSS found itself simply working on the margins targeting ethnic Chinese as a priority. It proved too reserved, too limiting. Not wanting to confine themselves to a small set of targets for recruitment, the logical next step was to attempt the recruitment of operatives and agents from a variety of ethnic backgrounds. According to William C. Hannas, James Mulvenon, and Anna B. Puglisi in Chinese Industrial Espionage: Technology Acquisition and Military Modernization (Routledge, 2013), cases at the time of the book’s writing suggested that was exactly what Chinese intelligence services did as a whole. Tradecraft was observably broadened to include the recruitment non-ethnic-Chinese assets as well. MSS still uses this method.

Guo Wengui, aforementioned here as the billionaire businessman who broke with the regime and revealed information from highly placed sources in the Chinese intelligence services that China’s espionage networks reportedly include up to 25,000 officers and 15,000 operatives, also spoke on the matter of non-ethnic-Chinese recruitment. Guo said Ma Jian, who recall was the vice minister for the civilian intelligence service, told him that a major shift by the Chinese was expanding the scope of agent recruitment from Asians to other ethnic groups.

One might argue that if Chinese government organizations and commercial entities engaged in espionage in the US were running only a few nonethnic operatives in the field, an idea Eftimiades’ statistics would apparently support, those few nonethnic operatives were doing a colossal amount of work alone to collect the loads of information from institutions where ethnic Chinese may not necessarily have been well represented or significant at all. In the abstract, and not to cast aspersions on any employees anywhere in which the erstwhile spies worked, but it may have been the case that other nonethnic Chinese employees were involved in espionage in those same institutions who went undetected and whose work was completely unknown to those who were caught.

Imaginably from a counterintelligence standpoint, if Chinese government organizations and commercial entities engaged in espionage in the US were running merely two or a few more nonethnic operatives in the field, trying intercept so few well-concealed individuals from a field of dozens of potential spies would conceivably be rather challenging. Finding them all during the past few years would be nothing less than spectacular accomplishment. C’est chercher une aiguille dans une botte de foin.

Chinese government organizations and commercial entities engaged in espionage in the US go after whomever might be best suited to meet their needs. For the accomplished services in the intelligence industry, espionage is a results focused business, not an ethnocentric one. It was noted earlier that Eftimiades insists that no one really knows how many officers and operatives working for China are on the beat in the US, but later in his “Summary” section suggests that they may very well number in the thousands. Aforementioned, too, were claims that the numbers of Chinese intelligence officers in the US was at least 25,000, meaning the number of their operatives in the field would be enormous. If those high numbers are accurate, it would likely mean those officers would be going after greater numbers of recruits. Surely, along with increased ethnic Chinese recruiting, nonethnic Chinese recruiting numbers would see far more than a nominal increase as a result.

Incidentally, Eftimiades mention of the balance between ethnic and nonethnic Chinese recruitment by Chinese government organizations and commercial entities engaged in espionage in the US, determined as a product of his analysis of the 595 cases, somewhat flies in the face of what he boldly asserted earlier in the discussion on the general on the unawareness of numbers of officers and operatives working on the ground there for China. As stated earlier, to the extent that Eftimiades does not have the actual figure of Chinese intelligence officers and operatives or numbers of Chinese espionage operatives from commercial entities, academia, as well as individuals engaged in such activity at his fingertips, anything he discusses that offers some picture of the totality Chinese espionage in the US is in the abstract.   

People’s Republic of China PLA Major General Chen Guangjun (above), Chief of Central Military Commission (CMC) Joint Staff Department Intelligence Bureau. The 54 year-old Chen currently serves as chief of Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau as well as an Assistant to the Chief of the Joint Staff. Chen joined the Rocket Forces of the PLA in 1984. In the mid-2000s, he earned a Ph.D. from Northwestern Polytechnical University. The PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. Chen achieved some notoriety prior to taking over the Joint Staff Department Intelligence Bureau. Through 2007 and 2008, Chen was the focus of several newsmedia reports chronicling his role in improving levels of education in his unit.

Section 3: “Introduction”

Eftimiades begins his Introduction by stating that while espionage is often employed to support foreign policy, a country’s clandestine activities rarely become the subject of foreign policy. However, despite how rare it might be, he says that is the case for the People’s Republic of China with its massive “whole of society” approach to conducting espionage. Eftimiades believes its approach is creating a new paradigm on how intelligence activities are conducted, viewed, and addressed by countries. He notes that a key element in the US-China trade war and downward spiral in relations–a matter the received much attention from the US newsmedia at the time he penned his monograph–is Washington’s demands that Beijing cease stealing US intellectual property and trade secrets. Despite China’s denials, Eftimiades stressed that “hundreds of recently prosecuted espionage cases” prove otherwise. China’s espionage activities are changing the global balance of power, impacting the US and foreign economies, and providing challenges to domestic, national security, and foreign policy formulation.

Not to be an apologist, but rather, to be fair-minded, Eftimiades notes that there are otger governments, companies, and individual entrepreneurs that violate US laws in the drive to possess or sell US technology, government and corporate secrets. He states: “Violating a country’s laws is common practice in the murky world of espionage. According to Eftimiades, almost every time an intelligence service conducts espionage in another country, it violates that country’s laws, and that includes US intelligence operating overseas.” However, he insists that the difference is that the US and other countries engage in espionage to determine and counter hostile or potentially hostile adversaries. The purpose of espionage is not to develop their countries’ own industries or transfer foreign wealth which is a main focus of China’s activities.

There is little doubt that the public affairs departments of nearly every bureaucracy under the State Council, and Propaganda Department and Foreign Affairs section of the Communist Party of China would chomp at the bit to enthusiastically and gloatingly state in response that the US space program was developed through the employment of scientists and engineers from Occupied Germany. The resettlement of the professionals and all of their research and development was facilitated by intelligence elements of the US national security bureaucracies. The Chinese would doubtlessly assert that US activities on that matter essentially established the model for acquiring foreign capabilities through national security bureaucracies to support their technological needs and channel down to large industries mostly related to defense and intelligence to support their advancement. Chinese public affairs spokespersons would surely go on to state, likely with the pretension of lamenting, that as a result of depriving Germany of its own citizens best efforts in aerospace technologies, the country was denied trillions in revenue from potentially providing the world the fruit of their expertise. Indeed, Germany could have become the epicenter of aerospace technology development and research in the world. (Mind readers this is a presumed argument of the Communist Party of China, not at all the position of greatcharlie.) Mayhap, the counterpunch would be that Werner Von Braun and the other German scientists and engineers sought to to the US and if they were left to their devices in Occupied Germany, the Soviet Union would have surely grabbed them up to use for Soviet Premier Joseph Stalin’s sinister purposes. Germany as a whole benefited immensely from postwar reconstruction due to the US Marshall Program. German industries were given an excellent restart as a result of their rebuilding and retooling under that program.

Section 4: “Analytical Methodology”

Eftimiades explains that for purposes of this study, all of the legal definitions of criminal acts in the statutes and administrative regulations found in the export violations–International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), International Emergency Economic Powers Act (IEEPA), as well as covert action, and research violations, are categorized as espionage. Eftimiades again explains that over a period of 10 years, he compiled and analyzed 595 cases of Chinese espionage that have occurred worldwide. He notes that over 450 of those cases occurred after 2000. He states again that through the analysis of these cases, sufficient evidence provided on espionage by the Chinese government, Beijing’s promotion and support of organizations outside of the government responsible for the same, and the information objectives, determines gaps in their knowledge, and operational “tradecraft” techniques of those organizations.

There is perhaps an argument to be made that once Eftimiades decided upon the definition of espionage mentioned in this section, he shaped his discussion of what Chinese non-government entities, institutions, and individuals would be viewed as engaging in espionage. One could hardly find fault with his decision. After all, his choice was not without precedent as certain bureaucracies of the US government involved in the 595 cases he studied made the same decision based on the law. However, from the lens of the accused Chinese non-government entities, institutions, and individuals, it may be the case that they were stealing trade secrets and intellectual property, but they may not have viewed their actions as espionage, rather just theft and just a part of business. One could imagine individuals of elements involved with such thefts saying with acidulous humor that if those, who possess information that they desired to purloin, really wanted to prevent theft, they would do a far better job at securing that information. Those with such larcenous instincts might go on to insist that those possessing the information would need to look deeper within to find the answer as to why they have so often left themselves wide open to theft. This thought, on the perception of thieving Chinese non-government entities, institutions, and individuals on whether their actions are a matter of espionage or “merely” grand larceny, is developed further in this essay in the “Analysis of Espionage Tradecraft” section.

The monograph’s following four sections on Chinese operations and tactics were meat and drink for greatcharlie and will likely be for like-minded souls. They are: Section 6: “PRC Organizations Conducting Espionage”; Section 7: “Intelligence Collection Objectives”; Section 8: “Analysis of Espionage Cases”; and, Section 9: “Analysis of Espionage Tradecraft”. Only three of the four are fully discussed in this review.

Section 6: “PRC Organizations Conducting Espionage”

The espionage effort by Chinese government organizations and commercial entities, as explained by Eftimiades, has features that are entirely its own. From an analysis of his 595 cases, Eftimiades explains espionage activities correlated to their sponsoring organization (the “customer” receiving the information or technology) showed five distinct clusters of organizations engaging in espionage. The governing Communist Party of China uses government, quasi government, academic, and commercial entities as mechanisms to conduct all forms of espionage abroad. Most interesting of these are China’s “non-traditional collectors”, which include State Owned Enterprises, universities, and private companies. He confirms that the employment of such a broad set of entities for intelligence collection evinces China’s “whole of society” approach to espionage. The list of includes: 1) the Ministry of State Security, the Guojia Anquan Bu, China’s preeminent intelligence agency, responsible for overseas espionage and counterintelligence both at home and abroad; 2) the Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau of the People’s Liberation Army (PLA), responsible for collecting and analyzing foreign military intelligence, including technology; 3) State Owned Enterprises (SOE), include the 50,000 aerospace and defense companies, subordinate research institutions, and technology transfer organizations owned by the central government; 4) Private Chinese companies or individuals acting unilaterally for commercial benefit only were engaged in espionage in approximately 22 percent of cases Eftimiades analyzed, and in nearly 30 percent of those cases, there was a clearly identifiable Chinese government, SOE, or university as the ultimate customer for illegal exports or trade secrets; and, 5) Other Chinese government elements that collect intelligence (information) and technology include the PLA Political Department Liaison Office (targeted against Taiwan), the United Front Work Department (UFWD), and many universities under the State Administration for Science, Technology, and Industry for National Defense (SASTIND). 

Most intriguing to greatcharlie was Eftimiades’ discussion of the PLA Political Department Liaison Office, the UFWD, and SASTIND. Beginning in reverse with SASTIND, Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Clearly put by Eftimiades, as the start point of a virtual wheel of information exchange, SASTIND assigns projects to ministries with military production responsibilities. Those ministries pass the work to the research institutes under their auspices. The associated research institutes send their information and technology gaps back to SASTIND. There are two departments within SASTIND,responsible for developing and tasking technologically related intelligence requirements and for collecting intelligence against those requirements.They are the Comprehensive Planning Department and the International Cooperation Department. The Comprehensive Planning Department tasks collection to the MSS and most likely to the PLA Joint Intelligence Bureau. The International Cooperation Department has its own independent collection capability. Members of this department travel with China’s scientists to collect information against specific requirements.

Eftimiades reports that SASTIND also has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. Some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. That list includes: Beijing Institute of Technology; Beijing University of Aeronautics and Astronautics; Beijing Engineering University; Harbin Engineering University; Harbin Institute of Technology; Northwestern Polytechnical Institution [University]; Nanjing University of Aeronautics and Astronautics; and, Nanjing University of Science and Technology. As of the monograph’s writing, over 35 Chinese universities (or professors from those universities) have been identified in US federal court documents as having some role in China’s overseas espionage cases, according to Eftimiades.

Eftimiades explains that the distribution of Chinese espionage cases worldwide illustrates the magnitude of Communist Party of China controlled businesses, research entities and business organizations involved in espionage activities. Providing superb graphs and charts for readers to examine while following along with his discussion, he shows that there is a near equal distribution of espionage activities between the four major organizational clusters (MSS, PLA, SOEs, and Private Companies). Eftimiades explains that the distribution indicates a concerted effort to use all mechanisms of government and the economy to collect foreign information and technology. To date, the Communist Party of China and the Chinese government have not taken steps to impede illegal activities (according to foreign countries laws) of their state corporations, private businesses, universities, and citizens. Eftimiades says China, referring to it once again as a “digital authoritarian state”, is clearly capable of doing so. He suggests that the Communist Party of China sees the appropriation of foreign innovations and technology as part of a policy aimed at developing domestic technology and increasing production.

In addition, his statistical breakdown of the 595 espionage cases illustrates that Chinese private companies have an aggressive posture in conducting espionage, resulting in 136 cases or approximately 23 percent of all activity worldwide. Similarly, SOEs were surreptitiously examining or collecting information or technology in 121 cases or 20 percent of the total. The SOEs are primarily collecting advanced military technology and associated research. Private companies and individuals primarily pursue commercial technologies, intellectual property and military technologies. Espionage activities conducted by the PLA Joint Intelligence Bureau give primacy to defense information, armaments, and military (or dual use) technology. The PLA was involved in 122 instances of espionage or 19 percent of all cases. Eftimiades reports that the MSS was involved in 95 instances of espionage or 16 percent of all cases. Preferred MSS targets included political or defense information, foreign policy, overseas dissidents, military capabilities, too, and foreign intelligence services. The final category of entities conducting espionage on behalf of China were Chinese universities and the UFWD. The universities generally targeted foreign technology to support advanced military weapons systems development and commercial endeavors.

Regarding the PLA Political Department Liaison Office, Eftimiades, in a markedly  unadorned way, explains that it is targeted against Taiwan. However, some confusion may befall those readers who perhaps may think of the Communist Party of China’s International Liaison Department when they come across the title, International Liaison Office. Among the pertinent facts, as part of Xi’s military reforms, in November 2015 the General Political Department of the Central Military Commission was abolished and was replaced with the Political Work Department. In January 2016, the Political Work Department became official. Its primary role as the chief political organ under the Central Military Commission is to integrate the Communist Party of China and its ideology and propaganda into the People’s Liberation Army. In that role, its responsibilities include: preparing political and economic information for the reference of the Political Bureau; conducting ideological and political work on foreign, particularly adversarial armed forces, by promoting China’s policies among their ranks, and disrupting unit cohesion within adversarial forces by withering their morale. It also has the duty to incite descension and rebellions particularly within the Taiwan army and other foreign armed forces. The Political Work Department’s Liaison Department controls a united front organization called the China Association for International Friendly Contact (CAIFC) that is active in overseas intelligence gathering and influence operations. Reportedly, the International Liaison Office has dispatched agents to infiltrate Chinese-funded companies and private institutions in Hong Kong. Their mission is also counter-espionage, monitoring their own agents, and preventing their recruitment of Chinese personnel by foreign intelligence services.

The International (Liaison) Department of the Communist Party of China is a very different organization. It stands as one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three include the UFWD, the Chinese People’s Political Consultative Conference (CPPCC), the Propaganda Department. Founded in 1951, International (Liaison) Department is the party’s diplomatic arm, handling relationships with more than 600 political parties and organizations as well as individual, primarily political, elites. The department previously handled the Communist Party of China’s relationships between fraternal Communist parties and cultivated splinter factions of Moscow-dominated Communist parties after the Sino-Soviet split. The activist bent of the International Department disappeared as the department began re-establishing itself from 1970 to 1971 following the tumultuous early years of the Cultural Revolution. Indeed, in the 1970s, as Anne-Marie Brady explained in Making the Foreign Serve China: Managing Foreigners in the People’s Republic (Rowman & Littlefield Publishers, 2003), the International Liaison Department’s intelligence efforts often surpassed and even outmatched those of regular Chinese intelligence services. It became deeply involved in inciting and assisting international revolution by moving weapons, financial support, and other critical resources to numerous Communist and non-Communist insurgencies and guerrilla movements worldwide. Interestingly, the department originated as a UFWD bureau before being carved out into an independent entity.

You Quan (above), head of the Communust Party of China’s United Front Work Department (UFWD). You Quan was appointed United Front Work Department (UFWD) head on November 7, 2017. You directs the UFWD, assisted by seven deputy directors. The UFWD is divided into offices, bureaus, and subordinate units, that is to say, mass organizations. The nine numbered Bureaus each specialize in either a particular facet of united front work or a geographic location. While the Communist Party of China employs many means through which it seeks foreign intelligence, the UFWD is distinct from other organizations in its overt and benign appearance.

Although he mentions the UFWD, Eftimiades does not provide any discussion of the organization. For readers wholly unfamiliar with it, greatcharlie provides some small treatment here. As discussed in the October 19, 2020 greatcharlie post entitled, “The Case of a NYPD Officer Allegedly Engaged in Intelligence Activities for China Spotlights the United Front Work Department”, within China, the UFWD plays a vital policy development and coordination role, especially for ethnic and religious minorities. Outside of China, the UFWD has had a hand in developing political and business ties with overseas Chinese, bringing investment and research benefits, as well as helping the Communist Party of China shape foreign views of China. Xi has repeatedly emphasized the importance of the UFWD to China’s rejuvenation. United front work is the central element to understanding what the Communist Party of China is doing and why to shape the world outside of itself. In a June 9, 2020 Australian Strategic Policy Institute report, You Quan, the head of the UFWD, is quoted as saying: “The United Front is a political alliance, and united front work is political work. It must maintain the party’s leadership throughout, having the party’s flag as its flag, the party’s direction as its direction, and the party’s will as its will, uniting and gathering members of each part of the United Front around the party.” People’s Republic of China Chairman Mao Zedong described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a 1950s CIA paper, united front work was referred to as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the Party.

Perhaps from a publisher’s point of view and with some intimation of what would most interest the monograph’s readers in fields of business and finance, Eftimiades thought it most necessary to place emphasis upon the State Administration for Science, Technology, and Industry for National Defense (SASTIND) over all of the other PRC organizations engaged in espionage. The information presented on SASTIND, for instance, is assuredly not part of regular discourse on Chinese espionage. Eftimiades, in a rather sedate tone but still a quite edifying stream of consciousness, lays out what that government organization’s well-controlled work against the US and other highly industrialized countries worldwide and its stealthy and insidious nature.

It should be expected, and may actually be tacitly accepted by some intelligence analysts in the US and in the services of other highly industrialized countries, that among Chinese government organizations and commercial entities on the ground in the US engaged in espionage, there are understood defined areas of responsibility and much as the clear boundaries already set, and well-known, between PLA HUMINT targets and activities and those of its civilian counterpart, MSS, similar arrangements have been made to avoid unwittingly conducting redundant operations, accidental collision of officers and operatives in the field, and potential interservice competition and quarrels in pursuit of available sources for US secrets. A similar delineation between the MSS and Zhōnghuá Rénmín Gònghéguó Gōng’ānbùthe Ministry of Public Security of the People’s Republic of China (MPS), both a law enforcement and an intelligence and counterintelligence service. Harmony among organizations is doubtlessly desired and required in order for them to succeed and to avoid being caught.

Yet, with so many Chinese government organizations and commercial entities on the ground in the US engaged in espionage, theft, overt collection, hiring operatives, surveilling and studying the opposition, as a reality, on more than one instance an effort to collect a particular type of information might lead more than one organization, for example, one governmental and one commercial, to the same target. One might imagine how chaos could reign without some communication. Officers and operators, perhaps not even immediately aware of each others presence, might literally run into each other, occasionally tread on each other’s work, and might even step on each other’s toes now and then creating some disruption. Some general agreement between organizations and entities in the field would need to exist in order to ensure possible fruitful operations would not face “friendly” challenges and obstacles albeit unintentionally, and to ensure they are enabled to adhere to clearly delineated lanes of action for each organization. On the matter of security, one might imagine how much easier it would be to detect and intercept Chinese espionage operators from the different organizations if they all kept showing up at the same institution trying to contact, recruit, smooze, cajole the same people in them, or one institution were simply bombarded by attempts by individuals to inveigle their way into it with a similar focus on its research and development. Obviously Chinese espionage efforts have been far quieter, smoother, and more sophisticated in nature.

Perhaps the best way to what is discussed here is simply to state that there are likely furtive bridges across organizational lines and areas of responsibilities that allow managers on the ground and officers, old hands in the business who have mastered the job, engaged in intricate operations against similar targets to directly communicate, provide assistance, modest resources, and advice all designed to facilitate security and activities and promote success. It would be a form of unofficial, collegial, furtive modus vivendi established with the requirements for operational security firmly in mind and every imaginable precaution taken. In this section, Eftimiades briefly mentions that in at least two cases, there were actually joint MSS and PLA operations in which individuals inside an aerospace company were recruited as operatives to assist in targeting the company for cyber-attacks. The MSS is so segmented with its many state department’s and provincial bureaus, that the most effective aspect of any effort by the two organizations to work jointly must have occurred between managers in the field. Given the success each espionage element, government or otherwise, has found in the US, the Communist Party of China, which would indubitably be aware of such interorganizational contacts, would likely stay mum about it all but monitor it all the same. After all, Communist Party of China intelligence organs operating sub rosa in diplomatic missions and commercial entities or incognito wherever else, would conceivably benefit too from being tied into the clandestine communications among managers in the field imagined here.

Concerning another point that flows from this discussion, rather than lacking actual knowledge or even a good sense of where everyone was relative to each other among Chinese government organizations and commercial entities engaged in espionage in the US and not having an full account of who was on the ground and stand bereft of paths for the most senior network managers of each organization to liaise, potentially in some extraordinary emergency, in the abstract, surely one could conceive that there would be a least some tacit coordination among their senior leaders, perhaps back in China. Such information would at least be in PLA, MSS, and–as often ordinary Chinese citizens will usually be involved–MPS hands. MPS surely has the most complete, up-to-date records–are perhaps often pulled into the mix of overseas espionage activities to some small degree for that reason. That information would also most likely be in the hands of the Communist Party of China via MPS. In addition to performing standard domestic functions as a law enforcement and intelligence and counterintelligence service, MPS is very much tied to the Communist Party of China to the extent that it helps the Party maintain its tight grip on the population.

For the edification of greatcharlie’s readers who may be not so familiar PLA intelligence, as explained in the  January 31, 2021 greatcharlie post entitled Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)”, the PLA’s human intelligence (HUMINT) operations are managed by the aforementioned Central Military Commission (CMC) Joint Staff Department, Intelligence Bureau. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission. Thereby, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), something similar to the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare are now aggregated into the Strategic Support Force. As with its sister civilian service, the MSS, and intelligence services worldwide, the PLA makes regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. It aggressively uses Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection.

Eftimiades explains that the State Administration for Science, Technology, and Industry for National Defense (SASTIND), which is housed under the State Council, manages military acquisition requirements for the Central Military Commission’s Equipment Department. Eftimiades reports that SASTIND has direct supervision over seven universities as well as contracts more defense research with 55 additional universities. The seven universities have been dubbed the Seven Sons of National Defense. On that list is Northwestern Polytechnical University of Xian, China, It is ranked number 1 in the discipline Aeronautical and Astronautical Science and Technology, known for producing some of the best brains in China’s defense industry.

Section 7: “Intelligence Collection Objectives”

As promised, greatcharlie has condensed the sections of Eftimiades monograph, providing important details, but it has not revealed everything. Yet, with such a relatively short text, there would naturally arise occasions when little option would appear available than present wholly what is provided in a particularly diminutive section, in order to provide the reader with a full understanding of the author’s thinking. That is the case with the “Intelligence Collection Objectives” section of the monograph. Under what has been whimsically dubbed as “spookspeak” by members of the intelligence industry some time ago, Collection Objectives, also known as Information Objectives or Requirements, identify the specific information or technology that is tasked to intelligence services for collection. Eftimiades stated that requirements can number in the tens-of-thousands, and explains that one can infer from requirements a country’s knowledge and technology gaps for they are a reflection of them. He provides as an example a country that has been continually pursuing information on specific components of turbine engines. The implications and indications for taking that course, says Eftimiades, are that the country most likely lacks the required information or technology on turbine engines for its planned purposes and espionage presents the only immediate way of acquiring it. Non solum eventus hoc docet, iste est magister stultorum, sed etiam ratio. (Not only does the outcome teach (us) this, that is the teacher of fools, but (so) too does reason.)

Regarding China, Eftimiades explains that its strategic collection objectives can be identified through a number of national level strategic planning documents. Listed earlier in the “Key Findings” section in the monograph, they are: Made in China 2025; Space Science and Technology in China; and, A Road Map to 2050, the National Key Technologies R&D Program, and the 13th Five Year Plan. Those national level strategic planning documents can be subdivided into specific technology development programs, are the following: the National Basic Research Program (973 Program); the National High-Tech Research and Development Program (863 Program); the National Key Technologies R&D Program; and, The National S&T Major Projects. Eftimiades offers a subset of those National S&T Major Projects which includes: Advanced Digital Control Machines and Fundamental Manufacturing Equipment; Breeding of New Variety of Transgenic Biology; Core Electronic Devices, High-end General Chips and Fundamental Software; Key New Drug Innovation; Large Scale Development of Oil and Gas Fields and Coal-bed Gas; Megascale Integrated Circuit Manufacturing Technologies; Next Generation of Broad Wireless Mobile Networks; Wastewater Control and  S&T Achievement Industrialization; National New Products Program; and, the National Soft Sciences Research Program. 

Eftimiades says that as one further breaks down the strategic technology objectives, a strong correlation to China’s espionage activity emerges. The Director of National Intelligence report, Foreign Economic Espionage in Cyberspace (2018) identified industries and private technologies that are frequent targets of foreign espionage. Eftimiades’ informs that an even closer correlation between China’s espionage efforts and national requirements can be made when comparing the 595 cases with the 19 key Technologies identified in the Communust Party of China strategic industrial planning documents Made in China 2025. These technology requirements were the primary objectives in the 435 cases. The fact that such a high proportion of espionage activities are correlated in Made in China 2025 Key technology list indicates the Communist Party of China’s role in guiding China’s global espionage effort.

Laying out points on this matter from his case analysis for all readers to understand, avec brio, Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks. Such collection efforts support PLA military aerospace programs and China’s commercial aviation sector. Going further, he states that a review of the 116 cases targeted at aerospace companies identified over 200 specific military and civilian technologies and trade secrets (stolen and attempted stolen). Among the many “Key Technologies” sought, were: Cryogenic pumps for space vehicles, valves, transfer lines, refrigeration equipment, space qualified radiation hardened circuits, components for the storage and use of liquid hydrogen, cryogenic coolers, Ka-band space communications, satellite/missile insulation blankets–germanium coated polyimide film, and multi octave traveling wave tubes used as amplifiers in satellite transponders. Major systems include: the Space Shuttle, Delta IV Rocket, F-15 Fighter, C-17 transport, F-22 Fighter, F-35 Fighter, B-1 Bomber, Ch46/47 Chinook, C-130 training equipment.

China’s Mars rover, the Zhurong (above) rolls off its lander, to begin a mission of seeking out geological discoveries. Was its development the result of espionage? Eftimiades states that China puts a strong emphasis on the collection of aerospace and aeronautical equipment. (116 cases). Approximately half of those collection activities are targeted against military aerospace technologies, related trade secrets, and intellectual property. The primary collectors are: the PLA Joint Staff Department Intelligence Bureau and private companies conducting export violations, and individuals, Eftimiades refers to as “Insider Threats”, working in foreign aerospace companies. He says the MSS is actively engaged in stealing foreign aerospace technology, too. Several of the 595 cases show the MSS utilizes both HUMINT and contract cyber hackers to collect foreign aerospace technology. In at least two cases, these were Joint operations recruiting individuals inside an aerospace company as operatives to assist in targeting it for cyber-attacks.

Another high priority collection target of Chinese espionage is information technology. Statistically speaking, China’s collection of information technology (113 cases) is second in numbers only to aerospace technology. China has placed strong emphasis on collecting information technology to include semiconductors and manufacturing technology. Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did. The Chinese company Huawei has been under similar export restrictions for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Key information technology related to China’s collection requirements include: microelectronics, microwave integrated circuits, microprocessors, circuit boards, crypto key devices, data and voice transmission systems, semiconductors, and trade secrets such as laser manufacturing techniques. Semiconductor manufacturing is a priority target for Chinese espionage as the US and several other nations still maintain a sizable lead over China in production capabilities. Additional priority targets for collection include biopharma and medical devices, automated machine tools and robotics, energy saving/new energy vehicles, and new materials development. Eftimiades informs that these are often distinct patterns of intelligence activity that correspond to each category of technology. For example, excluding China’s  cyber espionage campaigns, collection on biopharma and medical devices is limited to exploiting research programs (e.g., Thousand Talents Program) or economic espionage using company insiders. The three targets for this category are universities, research institutes, and pharmaceutical companies. Lastly, In the category of energy saving/new energy vehicles, Eftimiades states that most of the collection activity has been economic espionage employing insiders. The two targets for this collection effort have been companies and research laboratories. Eftimiades reveals that the majority of thefts of this technology have occurred through insider threats with cyber espionage as a secondary method.

To be succinct, in many fields, subject areas for analysis, facts are often misused and abused, but on intelligence, it can lead to great failures, and potential national disaster. Facts cannot be nailed down and used to support only what one wishes. To the contrary, facts should take the analysis toward what is authentic. From that judgments and plans must be based. Doing anything otherwise, especially while in pursuit of an opponent, is simply to procrastinate by entertaining oneself with errant deliberations. The opponent, no matter what one might choose to believe, does not procrastinate. As Eftimiades, himself, notes in the “Intelligence Collection Objectives” section of his own text, the Chinese know what they want and go after it at the time, in the way, and with the means they desire. Operatives complete their tasks and off secrets go–and oftentimes actual technologies as well–to China. That is one of the simple and more apparent keys to the opponent’s success.

China has shown little compunction over putting in full view at home, marketing, technologies, and making geopolitical moves that would be suggestive of the fact the information that allowed for those developments and actions was stolen from the US. It is almost as if the Communist Party of China encourages such actions to flaunt their country’s considerable bag of intelligence victories. Of course, government officials in Beijing will normally assert that there have been thefts and declare any evidence presented of such as circumstantial or outright lies.

Given just how much China has poached from the US has been revealed, even paraded in Beijing, one could reasonably conclude–and it is absolutely true–that China has run off with far more than a bale of information and data on classified defense and intelligence related projects, innovative commercial products, trade secrets, intellectual property, and classified foreign and defense policy documents. It is safe to say that an enormous amount is being collected. It might leave some to reasonably accept that a stratospheric level of espionage is being conducted by far greater numbers of intelligence officers and operatives and it has been ongoing.

Eftimiades provides a brilliant account of Chinese intelligence collection requirements. He supports his claims with superb charts. Some are practically signposts pointing to where the adversary is likely to show up next. Some are strong enough to serve as figurative beckoning fingers enticing along with whispered words, “Here they are.”

Eftimiades reports that in 2015, Beijing began allocating $50 billion dollars for the domestic development of advanced integrated chips. This action was initiated to ensure self-reliance after the US began restricting semiconductor sales to the Chinese company ZTE, now defunct. ZTE was sanctioned for evading sanctions on Iran and North Korea respectively, and repeatedly lying to US Department of Commerce officials. The US subsequently lifted the order three months later when the company paid a $1 billion fine and agreed to reprimand its Board and cut their bonuses, which it never did.

Section 8: “Analysis of Espionage Cases”

The dominant activities for China’s overseas espionage are espionage, economic espionage, and export administration regulation (dual use) violations, together comprising 60 percent of all activities. Taken as a whole, statistically speaking, illegal exports (theft of dual use and military technology) make up approximately 47 percent of China’s espionage activities abroad. Eftimiades divides the 595 espionage cases that he analyzed into the following categories: espionage; economic espionage as defined by ITAR, EAR, IEEPA; covert action; and, research violations. China’s illegal export of military and dual use technology, to include IEEPA, EAR, and ITAR violations and other export related violations in the US, comprise 43.7 percent (260) of all cases worldwide. Eftimiades says more than 80 percent of these cases occurred in the US. Reportedly, economic espionage which is mainly conducted by private companies or individuals, account for 25.98 percent (119 total) of cases). The category of “traditional espionage” stands at 22 percent (108 total) of worldwide activities. Eftimiades notes the figure of traditional espionage cases sits at 55 if Taiwan is separated out as a Chinese intelligence target. Of known cases, Taiwan is the single highest priority target for individual espionage.

On a chart provided by Eftimiades, one can observe the distribution of cases to the many venues of Chinese espionage in the US. The distribution pattern reveals concentrations occurring in tech sectors, manufacturing hubs and business centers. In California, “Silicon Valley” is shown to be the number one spot in the US for China’s illegal technology collection efforts. Apparently, more than half of the 140 cases that occurred in California targeted technology firms in that venue. Other cases centered around San Diego and then Los Angeles in the state. Further, collection activity in California was mainly economic espionage (51) cases), EAR violations (30 cases), ITAR violations (25 cases), and IEEPA violations (13 cases). In the economic espionage cases, the predominant form of tradecraft was using insiders (employees) to access restricted technology and trade secrets. Priority collection objectives in California were information technology (46 cases), aerospace and aeronautical equipment (27 cases), and automated machine tools and robotics (20 cases). Nationwide, China’s collection activities cluster around the major educational, research, and manufacturing centers in several states to include Massachusetts, Michigan, New York, Pennsylvania, Florida, New Jersey, and Texas. Victims of China’s espionage efforts in the US include major defense and aerospace companies, pharmaceutical firms, technology research companies, and manufacturers. In cases in Virginia and Florida, Chinese diplomats and citizens were caught trespassing on military facilities to conduct ground photo reconnaissance. Those facilities were associated with US Naval forces and special operations capabilities.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) Eftimiades notes that research universities are clearly primary targets for collection efforts, achieved most often through talent programs such as China’s Thousand Talents Program, Hundreds Talents Program. Eftimiades reports that most estimates suggest there are “at least 200 Chinese talent programs designed to employ academic and professional expertise from the West into serving China’s national development.” He continues further to explain: “This expertise ranges from scientific and engineering fields to business, finance, and social Sciences. These programs are serviced by 600 overseas stations that gather information on foreign scientists and then attempt to recruit them. In numerous cases, professors, graduate students, and PLA researchers have also been arrested for stealing research from overseas universities for use in China.”

Chinese intelligence services apparently studied the situation, and recognized just how open the US was for theft of its secrets in all sectors and then clearly decided to pour through, taking whatever they could. Surely, the Communist Party of China saw no need to halt commercial entities engaged in their own espionage activities, much as Eftimiades remarks earlier in the section entitled “PRC Organizations Conducting Espionage”. It appears they have seen nothing but opportunities to do a lot of open field running for them with little real risk. To date, it appears that they have all found no reason to pare down their operations, and certainly no reason to retreat. From Eftimiades own data, one can infer their espionage activities have steadily increased. Opinionis enim commenta delet dies, naturae judicia confirmat. (For time destroys the fictions of error and opinion, while it confirms the determination of nature and of truth.)

Though Eftimiades explains in his Preface that “cyber espionage is only addressed in select cases which were enabled by humans providing insider access. However, in discussing how exactly the FBI and DHS have thwarted Chinese espionage efforts later in his “Analysis of Cases” section, the discussion meanders into cases in which they discovered sources within China of cyberattacks into sensitive computer files of the US government, defense related businesses, financial institutions, high-tech and medical research facilities, academia, and anywhere else the hackers apparently believed there was a good opportunity to break-in and seize data. While Eftimiades expressed the intent to focus on HUMINT operations and tactics of Chinese government organizations and commercial entities engaged in espionage in the US, it would seem that he had little choice but to present it if he sought to put some positive face on what US counterintelligence services are doing to thwart China’s efforts. It is the brightest rift which can at present be seen in the clouds,

Readers may recall in Act 1, scene 3 of William Shakespeare’s play, The Life and Death of Julius Caesar, Cassius utters these apposite words to his co-conspirator Brutus: “The fault, dear Brutus, is not in our stars / But in ourselves, . . . .” With the intention of being frank, but by no means beastly, greatcharlie proffers that the fault for China’s success may lie with the US counterintelligence services themselves. It may be less a matter of tactics, techniques, procedures and methods, and rather a problem among US counterintelligence service personnel that the Chinese have recognized that they can exploit. As a matter of professional development, some effort might be made to ensure their cognitive abilities regularly honed through weekly, even daily, exercises and tests to strengthen their thinking skills, their prowess at uncovering all relevant facts, even from trifles, and developing solid insights from those facts, and their effective and correct use of a reliable intuition and intimation. Though this is stated in the abstract, one can almost be certain that the Chinese intelligence services to some degree are doing like-minded things to strengthen their intelligence officers competences. It could be something as simple as the private performance of Tai chi chuan or likely Martial Qigong every morning. (imaginably, both techniques would be performed respectively with a dynamic and free-flowing form and stances that would cause any instructor to weep with delight while observing ) Along with exercise, stretching, and breathing, it would allow their intelligence officers to mediate and attain deep focus and a relaxed state. Such activity would be helpful in any struggles with dépaysement.The Chinese intelligence services surely are quite determined to maintain an edge over their adversaries. So far, they have proved themselves to be competent and accomplished services in the field.

The Chinese company Huawei has been placed under similar export restrictions as ZTE had been, for evading restrictions on Iran and stealing US technology. Company personnel face charges of economic espionage or espionage in the US, Germany, and Poland. Eftimiades explains that China has not as yet developed the manufacturing technology to produce certain categories of advanced semiconductors, including radiation hardened chips. Such technology has as its core element, several methods of etching laser lithography chips at a nanoscale.

Section 9: “Analysis of Espionage Tradecraft”

As stated earlier, a condensed review of Section 9 “Analysis of Espionage Tradecraft” is not included here. The section is left to each reader to enjoy at first blush and perceive and decipher all they can from it. Recall that in November 1922, when excavating the tomb of Tutankamen, the English archeologist and Egyptologist, Howard Carter, pierced a hole enabling him to see inside the actual chamber. He was asked by colleagues if he could see anything, and he simply replied: “Yes! Wonderful things!” Readers will say the same when they read this section.

Having stated that, greatcharlie nevertheless includes some commentary on section, compelled by Eftimiades to mention that among those committing acts of espionage for China are commercial entities, SOEs and private companies, academic institutions, and independent individuals, particularly entrepreneurs. Eftimiades explains that SOEs and commercial entities have been determined to engage in espionage in the US and elsewhere outside of China. Having dubbed them as entities engaged in espionage, they are examined as such and ascribe all of the qualities of an intelligence service. Thereby, one would expect to observe certain traits of an intelligence service such as tradecraft to be performed by their representatives while operating in the field. Yet, unless there is some information collected by US Intelligence Community–and that would unbeknownst to greatcharlie–stating those entities as well as individual business engaged in similar acts, view themselves to be intelligence services or espionage organizations, one may not see them regularly act as such.If they display any tactics, techniques, or methods that resemble tradecraft it should be viewed as exceptional and not an expectation. Imaginably, they, themselves, might be quite surprised anyone might refer to them as espionage organizations. They simply may view themselves as a “collective” Chinese citizens working in the US availing their home companies and country of technologies, hardware, documents or whatever else they might grab from US institutions that may employ them as the opportunities present themselves. To that extent, they may really be nothing more than somewhat organized rings of thieves, nothing more. As for these individuals showing such willingness to respond to the requests and demands of the Chinese intelligence services or other State Council bureaucracies as SASTIND, too much might be made of the fact that they are obedient to the commands and demands of their authoritarian and very often punitive, government. After all, in addition to their own lives, everything that they hold dear, their families, are in the hands and under the awful power of an authoritarian–some might say totalitarian–Communist government in Beijing.

Of course, one must be open-minded. Thus, the door should not be shut completely on the possibility of some deliberate design in the practices of such commercial entities and individuals with regard to their espionage. Note that overall, their practices are not chaotic or haphazard, but rather they are grounded and for the most part accomplished. Aliquis latet error. (Some trickery lies hidden.)

In the abstract, one could imagine their movements and interactions of individuals operating for commercial entities may be intentionally stochastic. Indeed, if the activity is genuine espionage and not simply criminal behavior what greatcharlie supposes should really draw the attention of US counterintelligence is not as much whether it meets a certain expected standard of tactics, techniques, procedures and methods. What should draw that attention is the appearance of control, orchestration, and forceful activity, and that something intense is happening. Something is intended and is being achieved. The fact that there is a professional side to all of that activity must also be considered. The focus, greatcharlie humbly suggests, perhaps should be placed first on the purposefulness of the activities displayed by Chinese commercial entities and individual businesspeople, not its randomness. 

Acting as described, they allow themselves some degree of security without the need to set up resources, set up sites, train in tactics, techniques, procedures and methods to communicate and pass information physically. Keeping their movements randomly determined might leave their efforts open to analysis statistically. One could discern some random probability distribution or pattern. However, it might still be impossible for those movements and interactions to be predicted in a useful way. One might imagine that to rise to a certain level in their companies or institutions, the individuals involved are well-educated or clever enough to consciously plan their activities in a seemingly random way. Surely, anyone in a commercial entity or institution selected for such work will be tested and screened before being sent off. In some welcome back, job well-done session or maybe a torturous debriefing, the employees surely inform their manager what practices worked well in the field and which at the time were determined to be too risky.

What would seem as important, or perhaps even more vital for Chinese commercial entities, would be properly casting each “espionage operative” or “thief.” The absolute right man or woman must be assigned for the right job. Surely, human resources would bring in and spotlight the right people and managers would make selections for such work and overseas deployment. One would hardly find such individuals to be hot-blooded, and wreckless, incompetent in any fashion. They would exude equanimity, sangfroid, graciousness, and professionalism. They apparently work with a mindset that nothing is unattainable. Loosely, one might posit, taking such an attitude and approach to their efforts, might be said to be at the foundation of any “ostensible tradecraft.” Everything they do, choices they make, flows from that line of thinking.

Looking at Eftimiades discussion a tad more it would seem that he gives Chinese commercial entities and individuals engaged in espionage too much and too little credit at the same time. He perhaps gives them too much credit by identifying them as intelligence gathering organizations and thereby assessing their use of tradecraft. He gives them too little credit in that if he believes his presumption as to their status as spies and their “spy-like practices,” correct, then he dismisses the possibility that their actions are disguised, deliberately performed in a way distant from tradecraft as a technique. If their intention was to cause confusion among possible observers by taking that tack, Eftimiades’ expression of some puzzlement over the absence of traditional tradecraft in their practices serves as evidence that to a degree they may have succeeded in that. At the same time, certainly nothing they might do, would be intended to stand out, such as, perhaps in extreme, appearing gargoyle or something of the type, and drawing attention daily.

Some foundational information and thought on Chinese espionage activities in the US has to be established if study and understanding on the subject is to be advanced. The establishment of such a baseline of information, however, should not result conversely in some uncompromising stance toward it. New facts must be collected and an openness must exist to consider alternative analyses of those facts, which may lead to new possibilities and potential successes against such activities. There are likely many unexplored possibilities that perhaps should be considered about all matters concerning the subject. From what has been publicly reported, often in the US national security bureaucracies, perspectives on adversaries have reportedly become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, perhaps most akin to an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with regard to Chinese foreign intelligence activity in the US.

It seems high time that US counterintelligence services ceased looking at Chinese intelligence operations and tactics with a focus on their deficiencies and flaws in practice. Equally or even more important is to consider precisely what they are doing right in order to be successful. A starting point would be an assessment of how Chinese intelligence services and all the other government organizations and commercial entities engaged in espionage in the US view US counterintelligence services and how they are responding to US defenses set up against them. It would seem from Eftimiades text that a burgeoning notion in defense of the current situation in which China is achieving a degree of success is that their numbers in the US are so high that it would naturally be difficult to struggle with them head-to-head. Hopefully, this is not the case. To be frank, the ability of Chinese intelligence services to position so many of their personnel in the US is just a symptom of the conundrum of not being able to stem their activities. Focusing upon that will not yield a cure. There are surely considerable deficiencies and flaws in the way in which US counterintelligence operates that have given Chinese government organizations and commercial entities the confidence to act without much fear. Res ipsa locquitor. (The thing speaks for itself.)

Of the seven universities that have been dubbed the Seven Sons of National Defense, some have been identified in US federal court documents as actively conducting espionage, working with the MSS to conduct espionage, or receiving stolen foreign research and technology. Many of these universities have high security research facilities that support classified technology development for the PLA and are on the US Department of Commerce Entities List for their research in support of Chinese defense entities involved in the theft of technologies. On that list is the Nanjing University Aeronautics and Astronautics (above). Nanjing is also known for providing the MSS with recruits for its corps of intelligence officers.

Section 11: “Summary”

Since what is found in Eftimiades “Summary” section is drawn from his discussion of his analysis of the 595 espionage cases since 2000, it would stand to reason they would serve well as a figurative subset of eight ample bullet points for his “Key Findings” which themselves extracted directly from the facts of those many cases. Of that seeming “subset of findings” in Eftimiades “Summary” section, the “top 5” selected by greatcharlie are the following.

First, Eftimiades explains that the US Intelligence Community is not well-organized to protect the secrets of US industries. It is far better at protecting its own secrets. He says the same holds true for most other technologically advanced [highly industrialized] countries. A problem he points to, calling it obvious, is that commercial industry and scientific research programs, the primary targets for Chinese intelligence collection, are the most vulnerable.

Second, as aforementioned in the discussion of the monograph’s Preface, Eftimiades says the DHS and the FBI are leading the effort in the US “to combat China’s massive intelligence collection campaign.” He again states that both organizations “have done excellent work in reducing Beijing’s relentless efforts,” noting the FBI has made advances since 2018 to assist US industry and academia, and DHS is also working aggressively to curtail illegal exports of advanced technology and those who steal scientific research. However, he declares “there is still much more to be done.” He explains that the work of other government agencies as well as a bipartisan effort in Congress will also be necessary to ensure national and economic security.

Third, Eftimiades proffers that success in thwarting China’s aggressive collection efforts will ultimately rest upon three factors: 1) the ability of US law enforcement and intelligence apparatus to shift organizational culture and support private industry and academia; 2) developing a strategic campaign in the US integrating all the elements of the government and its allies; and, 3) having Congress pass laws to raise the costs of economic espionage to the Communist Party of China. Chinese companies and individuals via visa restrictions, sanctions, investment restrictions, and otherwise. 

Fourth, Eftimiades explains, as he has surely illustrated throughout his monograph by reporting his case analysis, yet does not declare in any vehement way, that China’s “whole of society” approach to espionage has been quite successful thus far in defeating government and private industry organizations. He focuses more on what has been positive about US counterintelligence efforts,

Fifth, Eftimiades reveals that efforts by some countries within the EU, India, and Japan to restrain China’s intelligence activities have been comparatively less apparent in public sources. Although espionage arrests in India, Germany, France, Belgium, and Poland have been low in number, he sees such developments as an indication that those countries now seek to more vigorously counter China’s collection efforts. In addition, Eftimiades asserts that “China’s public image is suffering worldwide as the French and German governments have made statements on China’s aggressive espionage on social media, human rights issues, COVID-19 response, and Beijing’s threats over trade.”

In determining the percentage of Chinese espionage efforts thwarted, it must again be noted that the percentage would need to be calculated based on the entirety of the Chinese espionage effort. If one accepts Eftimiades does not know that number, and there is no reason not to do so, knowing the percentage of thwarted espionage efforts seems impossible and his claim is only a presumption or at best the result of “secret knowledge.”

When writing about the success of the FBI and DHS in thwarting espionage efforts of Chinese government organizations and commercial entities, there was less of an appearance by Eftimiades of reporting facts, and a more apparent effort by him to convince readers on a position tenuously supported in the text that he wants them to accept. To that extent, he actually presents more than anything else, as there is no supportable alternative story to present given the realities of the situation, is a well-supported outline of concerted, energetic, and endless activity to steal US secrets by China.

It would seem that the nature of the situation has already been firmed in the minds of the public based on reports in the newsmedia. It is unlikely that readers of his monograph would be inclined to Eftimiades perspective, despite his remarkable background. It is unlikely that anyone in the US counterintelligence services, particularly among senior executives and managers, is on Cloud 9 over results versus Chinese government organizations and commercial entities engaged in espionage in the US. Somewhere deep inside, some may feel a bit stuck and stagnating, clutching at straws, and listening to the wind, but conceal such concerns from their colleagues. One might imagine their feelings: “Je suis las de toujours faire la même chose.” That would be a multifaceted problem for US counterintelligence services in itself. Perchance in trumpeting FBI and DHS success was an effort to boost morale or at least comfort those from each service who may have had their fill of Chinese success in their country. Eftimiades may have viewed optimism as the best and most available elixir for defeatism, and employed it liberally. Perhaps this line of thinking that drove Eftimiades, who leaves no doubt that he is unwavering in his support and confidence of the FBI and DHS, consciously drifts a tad away from his encomium of their respective work against Chinese espionage moves in the US. As also mentioned in the discussion of the monograph’s Preface, in the “Summary” section, Eftimiades does say “there is still much more to be done.”

Noticeably, in the “Summary” section, as noted in the discussion of the Preface, Eftimiades also relents so to speak from his “declaration of nescience” to say there are very likely thousands of Chinese espionage operators in the US. However, although there is clear evidence that their purpose is to steal US secrets and technologies, one might consider in the abstract whether there may be other interests of the utmost importance to the Chinese intelligence services that require such a labor-intensive effort. That should beat the brain. Going back to the suggested figure of 25,000 intelligence officers, professionals, albeit discrepantly trained and experienced, on the ground–a force one and half times the current size of a US Army armored division, it may be worth considering whether they may be engaged in a bold, cunning reconnaissance and surveillance mission of far greater conception than ever seen in the past or might normally be imagined in the present. Itt might be a mission that could not be performed in any other way than with a large force of professional intelligence officers. To be direct, yet admittedly still a bit Delphic, there must be a clear reason why officers of Chinese Intelligence services operating in the US, in particular, are so successful at not being wherever, whenever US counterintelligence services are looking for them. 

There is a thin line that separates reality from illusion. It must be kept firmly in mind that if one denies or unconsciously suppresses reality, what is left is only an illusion, false reality. Once one begins planning and operating within that, all is lost. If that is or ever would be the case concerning the Chinese conundrum, the situation will become far worse than ever imagined. Further, the more one deals in truths and reality, the more one develops reliable intuition and intimations. The more one entertains fallacies and what is artificial, the farther one moves away from having any real intuition or developing any intimations at all. These skills in the end will prove to be absolutely imperative if endsieg, a final victory against all of the odds stacked against them, is to be achieved by US counterintelligence services in their struggle against Chinese espionage efforts. As the celebrated Spanish novelist, translator, and columnist, Javier Marías remarked during an interview for the Winter 2006 issue of the Paris Review: “One must have courage to see what one does see and not to deny it for convenience.”

Regarding China’s concern about having the image of being a country of thieves and copycats, stealing the best ideas of other countries to support and propel its conspicuous advancements in nearly all sectors, the Communist Party of China absolutely has an interest in global public opinion of China and perceptions of its actions on the world stage. Still, it is unlikely that the Communist Party of China has too much concern about that in that vein. One must remember, the Party insists that at the foundation of all advancements of the Western industrial powers are the years those countries overwhelmed peoples who were defenseless and through a colonial system violently oppressed them and allowed business enterprises of their respective countries to exploit the conquered peoples’ lands for raw materials and mineral wealth for centuries. They will use the experience of China to support that argument. Within their own countries, the Party says down-trodden workers were essentially enslaved by the same business enterprises now called multinational corporations. (Note that greatcharlie asserts in the abstract that this is the Communist Party of China’s perspective; it is by no means greatcharlie’s perspective.)

Still, more salient based on the Party’s mindset would be the overall judgment of the world on the robust energy China displays as it pushes onward and upward into the future and, albeit mistakenly believing, eventually reaching the position at the top as the world’s dominant power. From that perspective, the Communist Party of China would see their country as having a very positive, lasting impact on global perceptions of it everyday. To that extent, the Party leaders and propagandists likely weigh that global perception on “energy” and Western measures of global public opinion ratings, particularly if those ratings are based on reactions to independent events and not the bigger picture. While one might agree that there are some universal truths about our world, still not everyone thinks the same on all issues. China’s view of its future is quite at variance with that held by most in the US best familiar with the issues involved. Fere libenter homines id quod volunt credunt. (In most cases men willingly believe what they wish.)

There will naturally be more that US counterintelligence services would want from the US Congress to appropriate for them in order to pursue adversarial countries’ intelligence services operating without pause, on the ground, in the US. However, the matter must be examined from the lens of Congressional leadership. From their view, US counterintelligence services  presently possess considerable resources to pursue Chinese intelligence officers and operatives. There are no indications Chinese espionage networks are being regularly taken down. Harsh critics and skeptical observers might begin to believe that, unbeknownst to the public, US counterintelligence services are actually being restrained from doing their utmost to defeat opponents here in the US. However, there would hardly be any logic to that. Surely, US counterintelligence services are not flâneurs, in the field simply playing chase games. Even the slightest act in that direction would betray the trust and reliance the US public has in their fidelity and  their belief that they are protecting the country’s sovereignty, its property, its interests and especially its people. As expressed in the February 26, 2021 greatcharlie post entitled “Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts”, by 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. Sardonically, from a paranormal perspective, one might suggest that although Chinese intelligence officers may be operating in the same spaces in which US counterintelligence services are looking hard, they do so in some other plane existence, undetectable by mortal eye. Sous une surface calme tout se passe.

There has been more than enough talk about how bad the problem with China is. C’est la Bérézina. As it has been discussed so often that, in a way, such talk haa become by the by to some degree for the US public. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and destroy all of its networks. As greatcharlie has mentioned in proceeding posts on the Chinese espionage crisis, It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Eftimiades clearly understands that much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. Fundamental changes may be needed in efforts to halt Chinese espionage operations. There is the possibility that certain apparent aspects of Chinese intelligence operations are not being focused on sufficiently or appropriately. Making the right improvements requires being persistent in one’s search for answers. To continue the pursuit successfully will require a certain boldness in thinking. Although he literally lost his head by guillotine two years later, George Jacques Danton, the 18th century French revolutionary leader, addressed the Legislative Committee of General Defence, September 2, 1792 with words concerning the situation in France which are apposite for counterintelligence organizations dedication protecting their countries against any harm by Chinese intelligence services: “De l’audace, et encore de l’audace, et toujours de l’audace, et la France est sauvee.” (Boldness, more boldness, and always boldness, and France is saved.)

What Eftimiades presents on Chinese espionage operations and tactics represents a stage of those activities existent at the time he wrote the monograph. However, Chinese intelligence operations and tactics appear to be constantly and rapidly evolving, becoming something more effective, more efficient everyday. As their capabilities improve, the possibilities for action also increase. It is difficult to accept but very likely a reality that success has given Chinese intelligence services so far good reason to approach the future with confidence. To that extent, the worst may be yet to come. However, on the other side of the coin, while it may seem counterintuitive to some ears, the success of Chinese government organizations and commercial entities engaged in espionage in the US should not frustrate US counterintelligence officers. Rather, it should embolden officers of US counterintelligence services to struggle even harder to succeed. Hope must still exist in the situation for that. Surely, establishing a pattern of success would go a much longer way in building self-confidence among officers in US counterintelligence services struggling on their own home ground with the Chinese.

What one finds in Chinese Espionage Operations and Tactics is of considerable quality. The book remains a steady flow of information, data, and expressions that well-demonstrates the author’s command of the subject matter, from beginning to end. Without pretension, greatcharlie states that what is presented here represents less than twenty percent of the insights birthed in greatcharlie by Eftimiades monograph. Readers should imagine what insights might be brewed up from within themselves after they have had a chance to read through it. 

It is assured that after the first reading Chinese Espionage Operations and Tactics, one would most likely go back to the book and engage in that stimulating process again and again. The monograph will very likely be regularly consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. Surely, the monograph would be quite useful to an Intelligence Studies instructor who, as a primary part of an assignment, might decide to have students read the monograph, observe the manner in which Eftimiades report is formatted, how information is presented in its sections, and develop insights from its discussion.

Perhaps it is eedless to say at this point, but it is nonetheless stated with absolute conviction and true relish, greatcharlie unequivocally recommends Eftimiades Chinese Espionage Operations and Tactics to its readers.

By Mark Edmond Clark

Food for Thought for US Companies Maintaining Robust Operations in China despite Beijing’s Strained Relations with Washington

The Great Wall of China (above) actually consists of numerous walls built over two millennia across northern China and southern Mongolia. The most extensive version of the wall dates from the Ming dynasty. Despite the Great Wall’s construction, China has always been relatively open to contact and trade with foreigners. The Communist Party of China would explain that due to such openness, in more recent times, China was the victim of Western “imperialist,” “capitalist” countries that reaped huge benefits from it. Many foreign companies currently operate in China, but their host, quite different from the past, is a world power. The Communist Party calls China’s success the vindication of an ancient civilization after a ‘century of humiliation.” China desires to take the title of the dominant power in the world and in its quest has created a challenging situation with the US. US companies in China must closely watch how US-China relations “progress,” and well-consider what prospective outcomes could mean for them.

Many in the US government’s foreign and national security policy bureaucracies and the US Congress with the responsibility to monitor what China is doing apparently do not want to tell too much about its actions and intentions and what its intelligence services are doing against the US, possibly for fear of metaphorically frightening the horses,  the US public. The Communist Party of China has at least demonstrated to itself that it had all the cleverness to outwit, outmaneuver, and surpass some preceding US administrations in its quest to establish the People’s Republic as the world’s dominant power. China’s accomplishments in that direction are now recognized by many policy experts as being far more significant than once realized. Relatively recent, popular books on US-China relations cut to the foundation of that which was perhaps previously satisfying and assuring in US policy circles about Beijing’s actions and intentions. While is far from exhaustive, among list of such books that greatcharlie has read or reread on the matter are: Michael Pillsbury, The Hundred-Year Marathon: China’s Secret Strategy to Replace America as the Global Superpower (Henry Holt and Company, 2015); Steven Mosher, Bully of Asia: Why China’s Dream is the New Threat to World Order (Regnery Publishing, 2017); Robert Spalding, Stealth War: How China Took Over While America’s Elite Slept (Portfolio, 2019); and, Bill Gertz, Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (Encounter Books, 2019). Those with a keen interest in what has popularly been called “The China Threat” surely possess copies of one or more of these texts and likely have frequently made a long arm for copies in their libraries for reference. Though recognizing their popularity, greatcharlie would not dare hint at some rank or order of them for it would only open the door to judgments of its choices which is beside the matter. For its April 30, 2021 post, greatcharlie reviewed Gertz’s Deceiving the Sky. Of course, a treasure trove of excellent, recent academic books on US-China relations have been presented by university press and think tank publishers, which includes a few greatcharlie has appreciated and recommends: Michael E. O’Hanlon and James Steinberg, A Glass Half Full?: Rebalance, Reassurance, and Resolve in the U.S.-China Strategic Relationship (Brookings Institution Press, 2017); Elizabeth Economy, The Third Revolution: Xi Jinping and the Chinese State (Oxford University Press, 2018); Clyde Prestowitz, The World Turned Upside Down: America, China, and the Struggle for Global Leadership (Yale University Press, 2021); and, Ryan Hass, Stronger: Adapting America’s China Strategy in an Age of Competitive Interdependence (Yale University Press, 2021).

Despite readily discernible differences of each text, their respective discussions harmonize on the point that China is in the midst of implementing a strategy to supplant the US as the world’s dominant power. Some say the deadline for this takeover is 2049, the one-hundredth anniversary of the founding of the People’s Republic, but others believe it may come earlier. (Some policy circles in the US have assessed dispiritedly that it has happened already.) To that extent, on an additional common point, the authors explain how preceding US administrations, with an apparent tinge of romanticism, misguidedly believed that the US could somehow guide and manage China’s industrialization, trade and overall economic development and thereby impact its political and social development. They also explain how, in some instances, the US government has unwittingly assisted China in achieving its goal of world dominance. In fact, each author essentially declares that China is a national security challenge for the US and its allies. China has made that very clear by building island seabases to secure claims of sovereignty over waters in the South China Sea, conduct overflights of the airspace and naval incursions into the waters of US allies in the region, regularly organize parades of their latest weapon systems, and marches of tens of thousands of men, stupefying to the eyes. The authors by in large suggest that the US should implement a more competitive strategy toward China, as it really is, to get a handle on it, by using all instruments of national power and urging US allies in Asia and outside to do the same. The efforts of the aforementioned authors, and many authors of notable books not discussed here, to expose China for the danger they believe it poses is driven not by antipathy but rather by evidence. There is materiality on the balance of negative probabilities which they have dug up in their research and revealed in their works. 

Given what generally presented, it would appear that China may not be the safest country for US companies to operate in at the present. Being steeped in matters concerning China, and they certainly are, one might presume that senior executives of firms there have already formed positions. Perhaps the best answer for senior executives of US companies is to consider moving their operations to a country that presents no risk or at a minimum, far less risk than China at the moment while the opportunity still exists. Yet, as many US companies are operating robustly in China, clearly moving out is not the course that all senior executives would agree upon. With un fil di voce, greatcharlie, cautiously takes on the task of shining some light on why they would continue operating in China despite problems their firms could face as a result of a collapse in US-China relations or even conflict between the two countries. Some not so subtle changes in attitudes and behaviors of Chinese officials toward the US in recent times are examined to develop insights on specific reactions that should be expected from Beijing. The possibility is considered that Beijing may have plans to make their companies targets of its wrath in the event such dark days come. Simply with the possibility of trouble on the horizon, it would seem their respective companies will soon become targets of China’s public security and intelligence services in very apparent ways. Along with think tank scholars, academics, policy analysts, and military and diplomatic officials, journalists, and students that would hopefully be an interested audience for this essay, greatcharlie would hope that senior executives of US companies with considerable operations in China, might take note as it directly concerns their efforts. Absent from the discussion is any mention of the identities of companies that have placed themselves in, or may have in some way fallen into, a somewhat precarious position in China as greatcharlie believes that information is immaterial, away from the heart of the matter. As for the senior executives of US companies, they are only referred to in the third person as the sole goal here is to touch upon the likely prospective broad range of thinking among them, not to throw the spotlight upon anyone. Make no mistake, greatcharlie is not offering any business advice to anyone. It is stated without pretension that such would be out of its province, and any impressions of the kind caused by this writing should not be given flight. The aim is to provide a look at some important issues from a new angle, provoke thought, and contribute to the greater discourse on the matter at hand. Non enim parum cognosse, sed in parum cognito stulte et diu perseverasse turpe est, propterea quod alterum communi hominum infirmitati alterum singulari cuiusque vitio est attributum. (For it is not having insufficient knowledge, but persisting a long time in insufficient knowledge that is shameful; since the one is assumed to be a disease common to all, but the other is assumed to be a flaw to an individual.)

People’s Liberation Army forces on parade in Beijing (above). In the past, US administrations believed the US could somehow guide and manage China’s industrialization, trade and overall economic development and thereby impact its political and social development. Some scholars assert that in certain instances, the US government unwittingly assisted China in achieving its goal of becoming the world’s dominant power. China is surely a national security challenge for the US and its allies now. It has made that very clear by building island seabases to secure claims of sovereignty over waters in the South China Sea, conduct overflights of the airspace and naval incursions into the waters of US allies in the region, regularly organize, parades of their latest weapon systems, and marches of tens of thousands of men, stupefying to the eyes.

“Perfidious Communist China”

“Perfidious Albion” is the nickname that French Emperor Napoleon Bonaparte would use to acidulously refer to his arch rival Great Britain, which he considered to be treacherous in international affairs, distrustful of foreigners, and had a knack for frustrating his plans. Albion is a literary or poetic term most often used for Britain or England of Ancient or historical times. The term, “Le perfid Albion,” was said to have been first used by Augustin-Louis, Marquis de Ximenès, the 18th century French poet and playwright. In the same vain that the term, “Perfidious Albion,” was used by Napoleon, perhaps the term, “Perfidious Communist China,” could be used in Washington in reference to China as US leaders must remain suspicious and distrustful of it. Leaders of the Communist Party of China do not leave any room for doubt that they are determined to bring down the US in order to claim the title of dominant power in the world. Moreover, they are clearly willing to use whatever jiggery-pokery it takes and use, so far within tolerable limits, the aggression needed to achieve that goal. 

Becoming the world’s dominant power may not seem to some as a worthy pursuit for a developed, industrialized country. The US essentially fell into the role and has held it as a matter of events, fate, and necessity, though arguably some political leaders in the early years of the 20th century, such as President Theodore Roosevelt, envisioned the country reaching the top. Many countries and national leaders in the past two centuries that sought the mantle can now be found upon what former US President Ronald Reagan in 1982 referred to as the “ash heap of history.” Yet, it is the Communist Party of China’s pursuit nonetheless, and Beijing seems to be moving inexorably toward that goal. The strategy to reach its objective apparently from the start was far larger in conception than some in US foreign and defense policy and business circles still appear willing to consider. 

The words of the Chinese officials have begun to reflect the Communist Party of China’s unsheathed antipathy toward the US. The Party, itself, might explain the words of the Chinese officials rightfully manifest the tone of a country once victimized, yet not demoralized by Western “imperialist,” “capitalist” countries that reaped benefits from it. (Truth be told, by the late 1800s, China was “carved up like a melon” by foreign powers competing for spheres of influence over trade and territory.)  The Party line is that China’s success is the vindication of an ancient civilization after a “century of humiliation.” Their words have the flavor of officials from a country that has been executing a clearly defined strategy to unseat the US as the world’s dominant power. It often smacks of something personal for members of the Communist Party of China. With regard to the officials and diplomats of the People’s Republic of China Ministry of Foreign Affairs, this behavior was briefly discussed in the June 30, 2020 greatcharlie post entitled, “Commentary: China’s Coronavirus Tack Includes More Abrupt Officials and Political Warfare; Its Diplomatic Tool Must Endure the Consequences.”

Such qualities in Chinese officials words could be ascribed to those expressed by the People’s Republic of China delegation led by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi at bilateral meeting with a US delegation in Anchorage, Alaska in March 2021. The US delegation led by US Secretary of State Antony Blinken and US National Security Adviser, Jake Sullivan. Blinken, indeed, started the meeting off by telling the delegation from China that the US intended to address “deep concerns” over the treatment of the Chinese citizens in Xinjiang and Hong Kong and the situation with Taiwan. However, Yang responded boldly, taking a bit of time to express sharp criticism of the US over what he described as its struggling democracy, poor treatment of minorities, and over its foreign and trade policies.

Yang’s words of reproach and his demeanor were completely out of character for an opening statement, particularly a very public one, for a bilateral meeting between industrialized powers. If the matter were not so serious and the prospects for improved relations between the two countries so grim, it might have been characterized as satire and marked down as a response. Needless to say concerning the speeches given by the two senior officials of the Chinese delegation in Anchorage, bon mot, they were not! Previously, there was an apparent Chinese doctrine of moderation in talks with other countries. Calmness and authority was once shown not only in diplomacy but in all circumstances by officials. This more assertive approach as of late has pulled Chinese officials from their more traditional conservative, stolid posture.

Overall, Yang, as well as Wang when he spoke immediately after him, comported themselves with an astringency which some critics would agree uncloaked the true nature of the regime. Certainly, as discussed in greatcharlie’s April 30, 2021 post, one could not help but get the impression by the vexatious words used lately by Chinese negotiators that all talks and perhaps the overall situation with the US, something even more is going on with Beijing’s thinking. It may very well be that leaders of the Communist Party of China have been satisfied enough with its accomplishments and ongoing progress towards surpassing the US that they have approved behavior by officials in interactions with foreign counterparts that would indicate the transition of power has already occurred. In the New American Bible, it is written in Luke 6:45: “A good person out of the store of goodness in his heart produces good, but an evil person out of a store of evil produces evil; for from the fullness of the heart the mouth speaks.”

In its April 30, 2021 post, greatcharlie also postulates that the Chinese officials appear to be presenting themselves as symbols of national resistance to US power. The Chinese officials wanted not just the US delegation, but the world to pay heed to their exhortations concerning the US. Such public behavior is part of what is known as united front work under Communist Party of China. During the current rule of the People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, united front work calls for the never-ending, enthusiastic promotion of the Communust Movement, the Communist Party of China, Xi, and the People’s Republic, and a lot of other things. The Communist Party of China is happy to foster animus toward the US wherever it may be found in the world as well as cause foment over such where it can. James Baldwin, the 20th century US novelist, playwright, essayist, poet, and activist, rightly recognized in his fascinating September 23, 1979 New York Times interview: “The world changes according to the way people see it, and if you alter, even but a millimeter the way people look at reality, then you can change it.”

The future situation is not entirely clear. One might reasonably suspect that while Beijing wants a peaceful resolution to the most stressing geopolitical issues it faces with regard to the US, it is uncertain whether they would even imagine accepting a balanced one. Real success for Beijing may very likely mean achieving some major advantages across issues in contention with the US. Looking at the extreme alternative, measuring what it might lose against what it might gain in some limited use of force, its judgments are likely balanced on perceptions of the will of the US to act and to sacrifice in such a way to actually protect its interests and allies in the region. Another factor included in the forecasts of Beijing’s moves would perhaps be the temperament of Xi. Conflict of any kind would have a dreadful impact on US companies in China. The lead up to any turn for the worse would likely mean problems for their operations and their employees in-country. As would be expected, some US companies have moved out or have expressed plans to move out. Other companies appear to be tiptoeing in the same direction. Still, there are those firms that are not just reluctant, but unwilling to take a new course. 

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping (above). In an April 30, 2021 post, greatcharlie postulates that the Chinese officials appear to be presenting themselves on the world stage as symbols of national resistance to US power. That was apparent during a bilateral meeting in Anchorage , Alaska in March 2021. Chinese officials wanted not just the US delegation, but the world to pay heed to their exhortations concerning the US. Such public behavior is part of what is known as united front work. Under the current rule of the People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, Chinese officials appear required to engage in a never-ending, enthusiastic promotion of the Communust Movement, the Communist Party of China, Xi, and the People’s Republic, and a lot of other things.

Do Not Rely on Beijing’s Goodwill!

Knowing what is wrong is not as great as knowing how to fix the problem. Moreover, one must accept there is a problem and be willing to fix it. In his philosophical and autobiographical treatise, “Discourse on the Method of Rightly Conducting One’s Reason and of Seeking Truth in the Sciences” (1637), the renowned 17th French philosopher René Descartes wrote: “And thus, the actions of life often not allow any delay, it is a truth very certain that, when it is not in our power to determine the most true opinions we ought to follow the most probable.” In the small hours of the morning, one might imagine US executives look within to find the truest answer to how to proceed given all that they have been informed of respectively. 

What greatcharlie has discovered in its own research and the voluminous scholarly sources that support the view that danger lies ahead is that from the aggregate of respective discussions in recent books and other publications in this vein, this idea can be confidently drawn by business executives in question, too! More so, executives sophisticated enough to create a successful space for their companies in China have sufficient information available to them even beyond what outside experts offer, to include reports from the US government, that would allow them to grasp the potential impact of decisions they might make. Undoubtedly, capable and diligent regional specialists in their own companies have collected and presented similar information on the dangers of remaining in China. Everything asserted about the threat Beijing poses to US companies can be substantiated by a history of necessary commiserations between company senior executives and decision-makers of the Communist Party of China.

Yet, while it is most apparent that China’s recent past clearly is not without stain, that fact appears to be by the by to those senior executives of US companies working robustly in China who choose to remain. They will not allow their minds to be biased by theories and suspicions suggested by those who do not have the type of investment at stake in China as their respective companies. They are unwilling to condescend to what they would call fear mongering about the Communist Party of China. China appears to have won many of them and those in that number will hear nothing against it. In this discussion, greatcharlie leaves aside any suggestion that the continued investment by US companies in China is the result of some urge among their senior executives to act in a knowingly dangerous way, l’appel du vide. What those business executives may believe is that in their own assessments of Beijing, they have the advantage of being well informed through what they might characterize as their own most informative, “regular” contacts and “substantive” conversations with officials of Chinese government bureaucracies and leaders of the Communist Party of China. They may believe their relationships with them are strong, bien entretenue. Many appear willing and some comforted by refusing to look beyond what Beijing presents about itself. In that respect, some have become metaphorically tone deaf to warnings concerning all urgent matters now underway. It was expressed by Aristophanes in Clouds (423 BC): “To invoke solely the weaker arguments and yet triumph is a talent worth more than a hundred thousand drachmae.”

As for Beijing’s guile and maneuvering, some of the senior executives even at this point would doubtlessly declare that the evidence that has publicly presented on its malign actions and intentions as something akin to an albeit a peculiar rag bag of singular happenings. Ironically, they might sarcastically note that some new wrinkle of China’s malevolence comes to light practically “every ten seconds” as the 20th century US humorist Sam Levenson might remark to defuse the tension caused by the subject.

In A Mountain of Crumbs: A Memoir (Simon & Schuster, 2010), Elena Gorokhova recounts growing up under the Communist government of the Soviet Union in the 1960s, and tells of her discovery of the hidden truths about adulthood and her country’s profound, brazen lies. Gorokhova recounts: “The rules are simple: they lie to us, we know they’re lying, they know we know they’re lying but they keep lying anyway, and we keep pretending to believe them.” The regime in Communist China operates in a similar deceitful fashion both at home and abroad. There are doubtlessly many more aspects of Beijing’s thinking and behavior that have not as yet been discerned or at least publicly reported. They may become known only after a situation literally blows up. One might state that within the Communist Party of China, the powers of evil are exalted, anything negative is possible. 

The latest word from the US Intelligence Community is that the US supply chain from China now faces real threat. There are a few normal factors that can affect US supply chains, including production shortages, trade disruptions and natural disasters. However, the US National Counterintelligence and Security Center (NCSC) has warned that “actions by foreign adversaries to exploit vulnerabilities in US supply chains pose unique counterintelligence and security threats.” According to the NCSC, foreign adversaries are increasingly using companies and trusted suppliers as “attack vectors” against the US for espionage, information theft and sabotage. Officials warned that those actions compromise the products and services that “underpin America’s government and industry” and warned of the effects–“lost intellectual property, jobs, economic advantage, and reduced military strength.”

What is shared by the US government on Beijing’s plans and intention toward companies foreign working in China should be fully heeded by US companies. Beijing would of course become indignant claiming Western arrogance would lead accusers to say an idea was stolen. Perhaps Chinese government spokespersons would rely upon words similar to those of Sir Arthur Conan Doyle’s fictional character Sherlock Holmes, who in “The Adventure of the Dancing Men,” the third story of 13 in the The Return of Sherlock Holmes (1905), stated: “What one man can invent, another can discover.” 

Simple facts can go some way to explain what might be recognized as a charitable position. To that extent, distortions of truth from Beijing or other trusted or favored sources are far more satisfying as a result of an infatuation with a present preoccupation. In arguments, the business executives will mistakenly grab the nearest evidence to hand that would uniquely support their perspective. What they might characterize as the “stirring of alarm” would likely be inexplicable to those who have not abandoned the idea that China acts in goodwill. They would likely assert that China’s sense of a rivalry between itself and the US is natural given geopolitical, geostrategic, economic considerations alone. Indeed, among those reluctant to accept what present evidence insists upon, one might find that almost every decision to carry on with their current business plans in China is likely founded upon a mix of reality and imagination.

As reported in the Wall Street Journal on March 26, 2021, in the weeks that surrounded the inauguration of President Joe Biden and Vice President Kamala Harris, Chinese leaders waged an information campaign aimed at the US business community. It included a flurry of speeches, letters and announcements. Of special note was a February 2021 speech by the Communist Party of China’s  foreign policy director, Yang, to a virtual audience of US business leaders and former government officials. Initially laying out a very positive situation for investment and trade opportunities in China, he then offered the stern warning that Tibet, Xinjiang, Hong Kong and Taiwan are “red lines” that anyone from the US should remain silent about. He also made the demand that the business community lobby the new Biden-Harris administration to reverse Trump administration policies toward China which he excoriated. 

Without the intent of being folsom, greatcharlie states that there are highly qualified individuals that serve as senior executives at companies. In their respective fields, these professionals are generally known and admired for their astute judgments, being steady and reliable, and having keen minds and the laudable capacity to reason. Finding answers to such situations were what the executives were hired for. Being incommoded by the regulations of China’s bureaucracies would by no means be new to them and they would expect to find a way to work around any problems. Their thoughts would remain focused on optimizing their respective companies’ investments in China. That would be the vintage way of thinking, so to speak.

One might go as far as to suppose that some US business executives may feel that if accomplishing that meant being under some recherché obligation to Beijing, they would accept that. They doubtlessly would expect to gain additional favor from the Communist Party of China through such loyalty. As a bonus of taking such a step, they might believe they would be taking the steps that would allow them to avoid a serious dilemma in the near future. (Such would hardly be a schema Beijing would feel obligated to follow, and indeed, something one should not plan for.) One might expect to occasionally hear expressions of appreciation from US companies to the most senior leaders of the Communist Party of China and the Chinese people for their “magnanimity.” In fact, they have been heard. Those companies could do no greater service for Beijing than to take such a course. Those in the US outraged by China’s overall behavior toward the US and its allies would very likely call it a perverse allegiance.

Perhaps conditions for some companies were never idyllic to start, and any new circumstances that arise are just one more hurdle to overcome. One might suppose that for senior executives of US companies in China, navigating any problems that have arisen so far has been a bit similar to white water rafting. It is a challenge, but in the end overall satisfying. To speak more in metaphors, senior executives of most US companies still operating in China likely feel that they successfully managed the disturbed sea of those relations by monitoring essential currents and will achieve further success by navigating them intelligently. Indeed, in many cases having spent years inveigling their way into many meetings with Communist Party of China leaders and government officials they likely feel that have created links with them near equal to those that exist between those same Party leaders and officials that the executives of China’s state-run companies. They are likely confident that as a result of those linkages, their companies’ investments In China are to the greatest extent possible shielded from any possible troubles in relations between Beijing and Washington. In corporate conference rooms and meetings with Communist Party of China or other government officials, any dark imaginings of Beijing’s behavior evaporate fastest. Conceivably, ideas and attitudes expressed In those same conference rooms of US companies are very likely encapsulated with the quip: “I will believe it when I see it.” There may very well be companies planning to simply carry on even under the worst circumstances should it come to that. 

Yet, many have doubtlessly assessed that contrary to the reports of experts, they have so far had no reason to regret, nor do they believe they shall have any reason to regret their speculation in China. Until they are caused to accept anything to the contrary, one could imagine certain senior executives of US companies would happily seek to remain in their offices in China. The claim that Beijing could turn against them in some profound way may simply be a counterfactual. Perchance senior executives still engaged in robust operations in China believe Beijing’s intentions are the best and would refer to all of the negative talk of Beijing’s intentions as slander. Presumably, senior executives of US companies, having minimized in their own minds the danger that China presents, might suggest to other senior executives whose companies are similarly invested in China, that no one should get ahead of oneself in reaction to what they may have heard or observed of those companies that have moved out. Perhaps the retention of that mindset, a certain stubbornness among some, may be a prime obstacle in convincing them to open their eyes. Assuming that all have the best intentions at heart, one might believe that differences in thinking among senior executives of US companies are mostly a matter of clarification 

There are situations in which even the most accomplished business executives might find themselves helpless. No US firm should count upon the goodwill of Beijing to help see them through the storm of greatly deteriorated relations, or the catastrophe of a clash, between the US and China. Beijing time and again has proven that it is unworthy of such trust. Most US companies operating in China or have an extremely close relationship with Party leaders and government officials, they should not expect that they would be able to just carry-on as they have been no matter what. By the mere fact that they are Western companies representing Western capitalism, there would be a fairly good chance that they would fall afoul of the Communist regime in Beijing. That has been a reality all along.

To be as frank as possible, the Communist Party of China has no love for them. Without a shadow of doubt, many Party leaders yearn to reach that day in the future when China can show its true colors, declare broad powers over all foreign companies and severely alter terms of any signed agreements to immensely favor its own interests, if a firm is allowed to remain in China at all. Surely they believe there would be more than one parallel Chinese firm of its respective industry to replace just about every foreign entity, except those as the National Basketball Association (NBA), and could take on their markets even in the US.

Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi (above). In the weeks that surrounded the inauguration of US President Joe Biden and Vice President Kamala Harris, Chinese leaders waged an information campaign aimed at the US business community. It included a flurry of speeches, letters and announcements. Of special note was a February 2021 speech by the Communist Party of China’s foreign policy director, Yang, to a virtual audience of US business leaders and former government officials. Initially laying out a very positive situation for investment and trade opportunities in China, he then offered the stern warning that Tibet, Xinjiang, Hong Kong and Taiwan are “red lines” that anyone from the US should remain silent about. He also made the demand that the business community lobby the new Biden-Harris administration to reverse Trump administration policies toward China which he excoriated.

Recent Displays of Beijing’s Tactfulness toward Foreign Companies

The renowned English philosopher and physician, John Locke, in An Essay Concerning Human Understanding (1689), wrote: “I have always thought the actions of men the best interpreters of their thoughts.” There have been a few  fresh events in China concerning foreign companies operating there over the grave issue of members of China’s Uyghur ethnic minority from the Xinjiang Uyghur Autonomous Region (XUAR) in China’s far west, being used as forced labor in factories. They may provide some clues as to the sort of subterfuge and sophistry senior executives of US companies still operating in China should expect, and perhaps things even more intense. (In citing news articles concerning these events, greatcharlie felt some reluctance given a few US companies are directly mentioned in them and that information is central to understanding the events that occurred. However, to the extent that these incidents were well-supported in the news media, the sense that anything fresh about the firms was being revealed was mitigated.)

In an extensive new report by the Australian Strategic Policy Institute (ASPI), a think-tank founded by Australia’s government, between 2017 and 2019, the Chinese government relocated at least 80,000 Uyghurs from Xinjiang in western China to factories across the country where they work “under conditions that strongly suggest forced labour.” The report further explains that the manufacturers using these transported Uyghurs supply at least 83 international companies making everything from footwear to electronics. Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.” 

Beijing has denied all of these claims, declaring them to be unjust aspersions. It has stated that rather than running forced labor camps, it is providing vocational training, and that its measures are needed to fight extremism. Recall that Xinjiang was an issue broached by Blinken at the bilateral talks in Anchorage. In January, Washington had banned Xinjiang cotton used widely by clothing producers for Western markets. The US, the European Union, United Kingdom, and Canada have imposed sanctions on Chinese officials for alleged human rights abuses in Xinjiang in March 2020. . China retaliated with sanctions on European lawmakers and institutions.

According to a March 27, 2021 Bloomberg report, Hennes & Mauritz AB (H&M), the Swedish multinational, expressed the view in March 2021 statements that it’s “deeply concerned by reports from civil society organizations and media that include accusations of forced labor and discrimination of ethnoreligious minorities.” It was a risky move for H&M given that China is one of the five biggest markets for the company in terms of revenue with 5.2% of the group’s total sales in 2020. The company had opened 505 stores in China as of November 30, 2020. The company’s access to China, the Communist Party of China, and to customers was put on the line. Almost immediately, H&M encountered what was characterized as backlash over its statements from the company concerning issues surrounding Xinjiang. The company quickly removed its statement on Xinjiang from its website, on a separate link on its homepage expressing the same stance on Xinjiang cotton remained active.

Authors of the news story notably recognized that China’s response to H&M was markedly stronger than its previous pushback when foreign brands crossed political lines. Xi had already set a red line on the issue of China’s human rights record, and foreign companies surely understood at that point that addressing the issue in any way would mean picking a side. In a briefing in Beijing, Gao Feng, a spokesman for the Chinese Commerce Ministry, essentially proscribed H&M’s statements as slanderous ravings. He reportedly said: “We can’t tolerate any forces bringing shame on and tarnishing the pure and flawless Xinjiang cotton.” He went on to state: “Chinese consumers have acted in response to the so-called business decisions made by some companies based on false information. We hope the relevant companies will respect market laws, correct wrong practices, and avoid the politicization of commercial issues.”

As would be expected, H&M’s statement was blasted by organizations such as the Communist Youth League and the People’s Liberation Army (PLA) on social media. However, there was also rising outcry and calls for a boycott on Chinese social media against an undated H&M statement over its website that also expressed concern about reports of forced labor in Xinjiang. At least six stores in the lower-tiered cities of Urumqi, Yinchuan, Changchun and Lianyunang have been shut down by the owners of the properties, according to mall operators in those areas who were contacted by Bloomberg. Local media have reported more closures and pictures showing H&M’s brand billboards being removedThe global clothing retailer’s outlets have also vanished on Apple Maps and Baidu Maps searches.

Adverse effects from the H&M’s statement about forced labor in the contentious region of Xinjiang have spread to other Western brands that have voiced their views on the matter. DW News noted that the Better Cotton Initiative (BCI) declared in October 2020 that it was suspending cotton sourced from Xinjiang for the 2020-2021 fashion season, also citing concerns over that region’s human rights. BCI, formed in 2009 and based in Geneva, Switzerland  states that it was formed to make global cotton production better for the people who produce it, better for the environment it grows in and better for the sector’s future. Its goal is to transform cotton production worldwide by developing Better Cotton as a sustainable mainstream commodity. Members include US-based Nike, Germany-based Adidas, Japan-based Fast Retailing, as well as China-based ANTA. Certainly, BCI members would not comment idly on such a grave matter or any matter for that case.

As foreign companies speak out concerning Xinjiang and forced labor, they are being targeted for treatment. China’s government-aligned English language newspaper the Global Times cited Burberry and New Balance as having made “cutting remarks” about Xinjiang cotton two years ago. It also cited the brand Zara as having expressed a “zero-tolerance approach towards forced labor.” ANTA, a Chinese shoe brand announced it was quitting BCI and would continue buying Xinjiang cotton–prompting a spike in its share prices on Hong Kong’s Han Seng Index.

Chinese social media users expressed umbrage against Western sanctions over alleged abuses of Uyghur Muslims in Xinjiang province by ostracizing further global clothing and footwear brands. DW News quoted one “netizen” as stating: “If you boycott Xinjiang cotton, we’ll boycott you. Either Adidas quits BCI, or get out of China.” Social media posts in China have reportedly also mentioned the Japanese and US brands Uniqlo and Gap but it was unclear whether the people posting messages were private citizens or government plants online. Two popular Chinese television stars, Wang Yibo and Tan Songyun, reportedly said they would end promotional work for Nike over remarks it made in 2020. China’s People’s Daily newspaper began a social media campaign via the microblog Weibo, using a slogan translating as “I support Xinjiang cotton. Citing Reuters, DW News explained many Chinese online users said they would instead support local Asian brands such as Li Ning and ANTA, prompting share price surges in Hong Kong. The US government has called attention to China’s state-run social media campaign and boycott against foreign companies that refuse to use cotton from Xinjiang. State Department deputy spokeswoman Jalina Porter stated that tactic amounts to a state-run “corporate and consumer boycott.”

Taking a closer look at what has been directed at Nike, according Reuters it faces rather a singular social media storm in China over its statement concerning Xinjiang Indeed, anger with Nike reportedly erupted on Chinese social media late immediately after China’s netizens spotted a statement from the sporting goods giant saying it was “concerned” about reports of forced labour in Xinjiang and that it does not use cotton from the region. There is a well-known love affair among the Chinese people and basketball shoes worn by NBA players. It was no small matter. 

Topics around the Nike statement were among the highest trending on China’s Twitter-like social media Weibo the day it was revealed and the social media backlash had a wider fallout. It was in direct response to Nike’s statement concerning Xinjiang and social media criticism on social media, that the agency representing actor Wang Yibo stated on Weibo that he has terminated his contract as a representative for Nike. It was not apparent when exactly Nike had put out the statement. It did not have a date on it. Nike explained in the statement: “We are concerned about reports of forced labor in, and connected to, the Xinjiang Uyghur Autonomous Region (XUAR).” It also stated: “Nike does not source products from the XUAR and we have confirmed with our contract suppliers that they are not using textiles or spun yarn from the region.” To prevent further interference, Hu Xijin, editor-in-chief of the state-run Global Times urged Western companies to be “highly cautious” and not to “suppress China’s Xinjiang” in a social media post. To do so, Hu anticipated, would “undoubtedly arouse the anger of the Chinese public,” he added. He did not single out any companies.

Jean-Jacques Rousseau, the 18th century philosopher, writer, and co)mposer of the then independent Calvinist city-state of Geneva, explained in The Social Contract (1762): “Virtue is a state of war, and to live in it we have always to combat with ourselves.” Naturally, foreign companies operating in China will attempt ameliorate and perhaps resolve Xinjiang controversy or any other with Beijing, senior executives of those companies be assured that the Communist Party of China’s memory of even temporary disrespectful acts and what its leaders may perceive as betrayal through declarations of concerns on what are in reality documented human rights abuses, substantiated by Western government sources, will be long.

A heavily secured industrial park in Xinjiang, China (above). In a report by the Australian Strategic Policy Institute, between 2017 and 2019, the Chinese government relocated at least 80,000 Uyghurs from Xinjiang in western China to factories across the country where they work “under conditions that strongly suggest forced labour.” The report also explains that manufacturers using these transported Uyghurs supply at least 83 international companies making everything from footwear to electronics. The Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps. Beijing has denied such claims.

Experience Speaks?

Memores acti prudentes futuri. (Mindful of what has been done, aware of what will be.) As aforementioned, with consideration of a full range of facts on the current situation between the US-China, to include many discussed here, as well as other key business considerations, some US companies have accepted that the risks are too great to remain and rather than wait for a crisis to arise. To the senior executives of those companies, China’s true, malevolent nature appears to be self-evident. Aware of those practices first-hand, they watch likely in horror as other US companies confidently stroll into the Chinese tangles from which they avoided or feel they escaped. Hope undoubtedly remains even among those companies that have already left that Xi and the Communist Party of China are not intending anything tragic. Any positive prospects for their future reinvestment in China surely rest upon what comes next with Xi and the Biden-Harris administration.

Those with a turn of mind to commit themselves to a defense of China’s behavior as a “competitor” of the US, and commit to even greater investment there, may eventually find themselves obliged to be a bit more obedient to Beijing’s wishes if events cause the authoritarian Chinese government to make its true self clear to them. If that day comes, the sense of the scale of its malignant being and purpose will likely be overwhelming. Those dead-enders, though they would hardly see themselves as such, will discover just how masterful Beijing has been at deception, offering satisfying explanations and signing agreements that really had no meaning. 

Some senior executives whose companies remain in China may already fear doing anything to subvert Beijing and incurring its wrath upon their respective interests. Others will perhaps be paralyzed to act in a crisis having been sufficiently instilled with fearfulness over a perception that the Chinese government will become noisy and rough. Even then, reaching a low point but not yet bottom, it would not be too late to accept the loss, as wise business executives sometimes must do, and move out.

Fallaces sunt rerum species. (The appearances of things are deceptive.) The security of US companies, all foreign companies, working in China, is a subject greatcharlie previously broached on the individual employees of those companies might face. Certainly, security offices of any US companies whose executives and staff frequently visit China should have long since arranged opportunities to brief those employees on problems they could possibly face in China. Such briefings might include the discussion of ways to subtly execute defensive measures to defeat Ministry of Public Security (MPS), Ministry of State Security (MSS), PLA Joint Staff Department human intelligence groups, and any Communist Party of China intelligence organs (e.g., the Chinese People’s Political Consultative Conference, the super secret and malignant International (Liaison) Department, the United Front Work Department, and the Propaganda Department) from capturing information that meets their organizations’ immediate intelligence requirements as well as whatever information that managers of those spy organizations may deem useful otherwise.

What was presented in the discussion of the December 13, 2020 greatcharlie post entitled, “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago” on security precautions employees of foreign companies must take in China seems worthy of review as background. The discussion is preclosed here. Only the more apposite points are presented.

As discussed, the foreign visitor is always a potential target for province and municipal offices of MPS and MSS. The capability of Chinese authorities to use technological means to keep a close eye on foreigners and detect, apprehend, and deal with those who protest and oppose the government has been enhanced immensely. Two sensational articles in the New York Times, “A Surveillance Net Blankets China’s Cities, Giving Police Vast Powers” dated December 17, 2019, and “Inside China’s Dystopian Dreams: A.I., Shame and Lots of Cameras,” dated July 8, 2018, well lay out the increased use of technology in MPS and MSS surveillance efforts. Reportedly, as part of Xi’s effort to have the security services take on a greater role in China, he has launched a major upgrade of their surveillance capabilities. China, as a result, has become the world’s largest market for security and surveillance technology. It is reported that almost 300 million cameras have been installed in the country. Government contracts are supporting research and development into technologies that track faces, clothing and even a person’s gait. MPS officers on the beat have been observed using experimental gadgets such as facial-recognition glasses. In Zhengzhou, police and security services can use software to create lists of people. They can create virtual alerts when a targeted  individual approaches a specific location. They can acquire updates on people every hour or every day, and monitor anyone with whom those people have met, particularly if there exists a report that one or both individuals have committed an infraction.  Yet, while the new technology may ostensibly provide police and security services with a way to track criminals, it also improves their means to crack down on sympathizers of the protest movement in Hong Kong, critics of the Communist Party of China, and critics of the police and security services, themselves. Worse, it better enables the police and security services to target migrant workers who travel from the countryside to fill China’s factories and ethnic minority groups as the Uyghurs.

On the street, the surveillance of foreigners will typically be relatively light, calibrated to ensure utilization of an optimal number of officers and informants in the role of surveillance operatives in the field. Doing so also facilitates the monitoring process. The more surveillance one uses the more reports that must be reviewed to find one aggregate picture of what occurred. MPS counterintelligence officers will regularly collect and closely review reports on a foreigner’s behavior via informants among neighbors in the vicinity of their residence and locals among colleagues at work. They would be interested in knowing if they have engaged in behaviors that would make them open to recruitment. Their attitudes toward China and its system would be important. The friendships they have made would be of interest. From the reports of informants and technical surveillance, assessments of what type of temptations could be used, if necessary, to bring them to China’s side based on observations of the foreigner’s lifestyle. 

In its December 13th post, greatcharlie additionally cites Articles 9, 11, 12, and 13 of the National Security Law of the People’s Republic of China, as adopted at the 15th session of the Standing Committee of the Twelfth National People’s Congress to explain that for citizens of the People’s Republic of China, the motivations of money ideology, conspiracy, and excitement do not factor in such a decision to come to call of their country’s intelligence services. The law requires them to do so. If any motivations at all could be said to factor in a Chinese citizen’s decision to obey the direction of an intelligence service, expectedly the Communist Party of China would list faith and adherence to the ideals of the Communist Revolution, the Communist Party of China, patriotism, and the homeland. Supposedly, revolutionary zeal drives the heart of China as “one beating heart.”

Since that writing, the NCSC provided, on Twitter, three articles from China’s National Intelligence Law of 2017, Cybersecurity Law of 2016, and, National Security Law of 2015. NCSC explained its aim in doing so was to help those entering an agreement with a company based in China better understand the legal landscape and that Chinese companies will provide data they obtain or information stored on their networks to China’s state security apparatus upon request. More directly, the NCSC wants US citizens to better understand by its message that Chinese companies and citizens are required to assist in intelligence efforts against them by law. Under Article 7 of the PRC’s National Intelligence Law (2017), NCSC cites: “All organizations and citizens SHALL support, assist, and cooperate with national intelligence efforts in accordance with the law, and shall protect national work secrets they are aware of.” Under Article 28 of the PRC’s Cybersecurity Law (2016), it cites, “Network operators SHALL provide technical support and assistance to public security and national security organs that are safeguarding and investigating criminal activities in accordance with the law.” Under Article 77 of the PRC’s National Security Law (2015), it cites, “Citizens and organizations SHALL provide the following obligations for safeguarding national security,” and then cites section specifically (5), which instructs: “Provide national security authorities, public security authorities, and military authorities with needed support and assistance.”

The foreign businessman, scientist, engineer, academic or any other type of professional  working closely with a Chinese counterpart in China may not be aware that he or she is being monitored by that same friendly colleague. It should be expected. When told, it may be so emotionally shocking to outsiders  that it may very well be near impossible to believe. Perhaps refusing to accept that reality is the only way a foreigner can continue to function comfortably in China. In any event, it is the responsibility of the Chinese citizen to engage in such activity under the National Security law. To that extent, friendship with Chinese colleagues may never be authentic as there is an element to the interaction between the foreigner and the Chinese citizen that is cloaked. China comes first. The foreigner is inconsequential to that reality. Ordinary people doing a little this and a little that for the MPS as well as the MSS is a norm.

Although it has not as yet become a commonplace problem, if a foreigner visiting China for the purpose of business or tourism, accepts  documents, notebooks, and books, the traveler might discover quite surprisingly that he or she is carrying items that contain sensitive data the possession of which could be considered criminal. Those illicit materials would have been presented to the traveler intentionally, perhaps even by a Chinese citizen with whom the traveler may have a positive personal relationship, almost certainly at the behest of MPS or MSS. It was said somewhere that it is terrible to find an enemy in a friend, but it is much worse not to find a friend in a friend. (Given the uncertainty of what may result from contact with Chinese intelligence and counterintelligence units, ordinary Chinese citizens typically will not seek out contact with them nor independently engage in activity with foreigners outside of the workplace on matters related to their work. They will focus on true personal relationships on personal matters, human interests.)

One must also be very cautious about accepting recording devices or recorded materials, or any devices, thumb drives, dvds, or materials that may include video or audio recordings unless one can be absolutely certain as to their contents. Documents contained in any of these media may prove to be government documents concerning confidential matters, and not any run-of-the-mill confidential matters at that. One must immediately open the documents and read them before those who presented them using a laptop or tablet. The review of the recordings posthaste could be passed off as an affected display of ebullience and appreciation of the gift and wonderment about what it holds. 

As things stand, from year to year, the situation has not gotten better in terms of stability and safety. If troubles between the US and China ever begin to arise with regularity, such as detainments of employees of US companies, one might expect some form of ransom will be discreetly demanded by Chinese officials with a warning not to acknowledge their villainy to the world. More than just an aggressive act, it would be an expression of Beijing’s power over those companies, designed to work in the psyche of the US business executives. If a US companies is resolute about remaining in China, it would to be willing to accept that the situation could change rapidly for the worse, new ground rules could be put in for operating in a flash, and it would know without doubt who is really in charge. They would need to accept that ties back to the US would have little meaning to Beijing. The Communist Party of China would surely delight in exercising such power over Western “capitalist” guests. The door opening in that direction of what is outlined here can already be heard creaking.

President Xi in his People’s Liberation Army uniform on parade (above). It would be more than likely that if a military conflict between the US and China arose on the greater world stage, Beijing would lash out at available US targets right at home such as US companies and their employees. Indeed, when leaders of Communist Party of China are exhausted of tricks and manipulations, they often turn to the cane. If US companies were to face such a situation, the matter would need to be put right by senior executives of those companies at the crisis point, if at all possible.

Prospective Problems Ahead

ata volentem ducunt, nolentem trahunt. (Fate leads the willing, and drags the unwilling.) As US companies, by their own devices, continue to entangle themselves in meshes with Beijing, they may be grooming themselves to become subject to its machinations. An impregnable collection of evidence already indicates that Beijing’s desire to control Western business communities attitudes and behavior toward nearly anything Chinese. Perhaps one day US companies will awaken to the true character of the Communist Party of China and the Chinese government after it is too late. Once any extraordinary conduct is exhibited by Beijing toward one or more US companies  it would be almost impossible for the US government to chuck itself in the mix in a calibrated way that mitigates such steps as opposed to exacerbating the situation.

As it was explained in the 14th century by the English lawyer, author, and statesman, Saint Thomas More, “What is deferred is not avoided.” Caught in such a conundrum, it would be best if US companies had already laid plans to respond to such a contingency well in advance of it. It would be the only way to have a fighting chance of getting some handle on it. Complete consideration of Beijing’s immoral side must be part of that assessment. Exactly how business executives might intend to put the matter right on their side under such circumstances is unknown. In spite of contingency planning, it is hard to see from greatcharlie’s vantage point what cards US business executives could realistically play to sway Beijing in such a crisis. They would be in a weak position to negotiate relief from Beijing. Perhaps it was in the process of planning for such a contingency, that senior executives of such companies along with their security offices recognized that it was time to leave.

Conceivably, the senior executives of some US companies in China might hold the idea that they might serve as “go-betweens,” neutral emissaries, who, while loyal to their US homeland, are also loyal and responsive to their Chinese hosts, and assist in finding some settlement between the US and China during a conflict. The idea would unlikely interest Beijing in wartime. Despite any notions senior executives might have of their ties to China and relationship with leaders of the Communist Party of China, during a war, they would most certainly be tagged as enemy aliens, perhaps dangerous enemy aliens, and handled with due care by MPS and Party security organs. In an atrocious yet very possible scenario, they may be tasked to perform high profile duties against their will for the Party’s Propaganda Department. United Work Department and International Department operatives might force them without compunction to any point resembling a front line of the conflict to demonstrate the senior executives recognition that China was on the correct side of the struggle and any of its actions against the US were righteous. Chinese security services might force them to visit foreign capitals, accompanied of course, to give speeches on how the US allegedly may have wrongfully threatened China’s interest and caused the conflict. One could imagine a hundred possibilities and none of them would be good for the senior executives. At about that point, the business executives will have the truest and fullest understanding of the Communist Party of China.

Interestingly enough, any decision by Beijing  to take steps against one or more US companies would undoubtedly be a measure decided upon in its own contingency planning in the event of a sudden ratcheting up of contentious relations with Washington. To that extent, what might happen to US companies stranded in China in such circumstances would assuredly be a fixed fate. Leaders of the Communist Party of China, under such circumstances, would hardly be inveigled by the platitudes of foreign business executives to be more lenient toward their companies. Any Party leaders would feel both angered and shamed if that perception was created about them within the Party’s membership. It is imaginable that such a bargaining effort would be responded to violently.

Essentially, any breakdown in relations between the US and China, or worse, a military conflict, would have an unfortunate effect upon the position of US companies operating there. More than likely, it would cause Beijing to lash out at available US targets right at home such as those US companies and their employees. Indeed, when the brains of the leadership of Communist Party of China are exhausted of tricks and manipulations, they have often turned to the cane. If US companies were to face such a situation, the matter would need to be put right by senior executives of those companies at the crisis point, if at all possible.

The Way Forward

Aligning the suppositions offered here on thinking over remaining in China with specific senior executives of US companies operating in China undoubtedly would not be too difficult for numerous investigative journalists if they preferred to do so. Yet, as mentioned on the outset of this post, their identities are immaterial with regard to the objective here which was to provide a picture of the challenging circumstances that those business executives face particularly from China’s public security and intelligence services, shed light upon what they are likely discussing among their counsels, and present insights on the decisions they have reached given the paths they have taken.

If credit might be given to their line of thinking of those US business executives resolute about remaining in China, it might be provided by F. Scott Fitzgerald in a February 1936 Esquire magazine essay entitled, “The Crack-Up.” Fitzgerald explains: “the test of a first-rate intelligence is the ability to hold two opposed ideas in the mind at the same time, and still retain the ability to function. One should, for example, be able to see that things are hopeless and yet be determined to make them otherwise. This philosophy fitted on to my early adult life, when I saw the improbable, the implausible, often the “impossible” come true.” However, it cannot be denied that those executives are placing their respective companies’ interests in a vulnerable position by remaining on the ground in China. Some might call that a calculated risk. 

Worrisome is the possibility that some may be unable to fully grasp the effect of their own actions. If placed in a trying position by external events as a collapse in US-China relations or a military conflict between the two, it is hard to imagine how US business executives would preserve their respective companies’ operations in China or more generally, how they would actually act. They may very well be placing themselves in what could become a serious dilemma. Concerning those executives laser focused on the bottomline–some might say they should be, they might do better to employ their minds on the matter of the well-being of their employees and equities in China before there is some tumultuous event. Perhaps some would say greatcharlie is over-egging the pudding here. However, greatcharlie hopes only to be of some material assistance.

The world exists in an ordered universe and one expects everything to follow that design. There are patterns one can discern that establish order in the human mind. Illusion must never be chosen over fact. Any senior executive of a US firm operating in China should have already been sufficiently aware of how Beijing is acting. Sentiment is a poor substitute for true feeling and fact. Ignorance more often than not dissolves into tragedy. While they are in a position to reexamine the facts, they should do so while there is still time available. Qui ipse si sapiens prodesse non quit, nequiquam sapit. (A wise man whose wisdom does not serve him is wise in vain.)

Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts

The People’s Republic of China Consulate in San Francisco (above). The Consulate has been a bit troublesome. On occasion, it has been linked to suspected Chinese espionage efforts on the West Coast. However, Chinese intelligence operations in the region, which holds world-leading science and tech firms, have more often been tied to state-owned businesses, private firms, academic institutions, or research institutes than the Consulate. In a January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence. In Chapter Six, Olson lists 10 “benefits of a counterintelligence operation” and explains how to reap them. In this essay, greatcharlie presents some suggestions on how Olson’s precepts might be applied to help defeat Chinese espionage efforts throughout the US.

In its January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019. In Chapter Six “Double-Agent Operations,” Chapter Seven, “Managing Double-Agent Operations,” and Chapter Eight “Counterintelligence Case Studies,” in particular, Olson provides a generous amount of information on how counterintelligence operations have been conducted by US counterintelligence services. Readers are also favored with many of the logical principles that Olson would practice and expound during training during his service in the Central Intelligence Agency (CIA) counterintelligence. Included among what he presents is a list of benefits US counterintelligence seeks to gain from a double-agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Many of the tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination and creativity. One discovers how double-agents were dangled to garner interest from adversarial intelligence services, false information spiked with just enough truths, “chicken feed,” was transmitted, and nuanced communications between the double-agent and his handler were managed. In 12 case studies, Olson finally presents a classical series of demonstrations along with lessons learned. He tells it all in an apposite way. Virum mihi, Camena, insece versutum. (Tell me, O Muse,of the skillfully man.)

In fairness, Olson’s work should not be judged in terms of his reaction to the prevailing national security crisis at the time of this writing: Chinese intelligence penetration into the foundations of US power. A criminal strain is observed running through the thinking of the Communist Party of China as it dispatches Chinese foreign intelligence services to steal volumes, tons of information from the most secure locations in the US. Perhaps what the future may hold is made darker by the fact that among its central members, are individuals of immense intellect, making them a far more dangerous threat to US interests. In greatcharlie’s view, there is much that can be extracted from To Catch a Spy that might constructively provide some suggestions on how to address this crisis. With the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. That does not imply that a bias colors its discussion. No information is skewed or bent with preconceived ideas. What it does mean is that readers will likely discern facts are interpreted from that perspective.

In Chapter Six of To Catch a Spy, Olson lists the 10 “benefits of a counterintelligence operation” related in particular to double-agent operations and explains, in brief, how to reap them. In this essay, greatcharlie may albeit step out on shaky ground to present some discreet suggestions on how 9 of Olson’s 10 precepts might be applied in efforts to defeat Chinese espionage activities in the US. The suggestions are the result of some creative thinking on what if anything new might be said on the matter. In the essay’s discussion, greatcharlie hopes to avoid any appearance of instructing counterintelligence officers on what to do. Rather, the only desire is to offer all readers its suggestions, leaving it up to those in US counterintelligence to observe, reflect, and act as they may. It would be satisfying enough to know that some of what is presented here might  resonate with a few of them. It is presumed by greatcharlie that Olson’s precepts harmonize to a great degree with those that currently guide US counterintelligence officers in active service and thereby anything resulting from them would not be deemed too fanciful or even recherché. Applying Olson’s precepts to developments on the Chinese intelligence front in greatcharlie’s would have been beyond its scope of its preceding review of To Catch a Spy –although some readers noting the review’s length might sardonically query why there might be any concern over a few thousand words extra. In response to such concerns, greatcharlie has attempted to apply Olson’s teachings to the discussion here without making it an exercise in “large data processing.” It should also be noted that from the corpus of work on Chinese intelligence, a great influence upon greatcharlie are the writings of Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant.

Additionally, upon consideration of what it could offer to support the development of more effective approaches to defeat Chinese human intelligence and electronic intelligence collection activities against the US, greatcharlie bore in mind that it would need to be somewhat Delphic in its discussion. Therefore, what is offered are fragments of ideas with the aim of leaving a figurative trail of breadcrumbs that  a few officers in the US counterintelligence services might pick up. Hopefully, after testing their virtue, they will find something useful. Given this approach, greatcharlie apologies in advance to other readers who may find the discussion somewhat cryptic or a bit “undercooked” at places. De minimis grandis fit magnus acervus. (From the smallest grains comes a big heap.)

Chinese Foreign Intelligence Versus US Counterintelligence

Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know. At the top, senior executives and managers must account for the failing of their respective US counterintelligence services. Imaginably, they resent the deficiency. Surely, they are feeling terribly unsettled by regular reports of so much being blown, so much intellectual property and classified material being lost. They have certainly had a bellyful of the failure rate against the Chinese intelligence networks. There has been so much scandal–or at least what should be scandal–with US political leaders becoming entangled with Chinese intelligence operatives, from interns, drivers, fundraisers, to “camp followers.” Expectedly, senior executives and managers should be wondering whether the rank and file of US counterintelligence has gone on hiatus. To use contemporary sports vernacular in the US, US counterintelligence services “have not shown up” in the struggle with China. They may also be wondering, given the array of tools and considerable resources available to them, whether the rank and file, led by squad, shop, or unit supervisors and commanders, have told them the whole story. Perhaps harshly, they would question whether the rank and file were organizing valid plans or going off on profitless “school boy larks,” not remotely sufficient to defeat a most cunning opponent. Against the Chinese style intelligence operations, it may very well be the case that the ordinary principles of trade craft and security have gone to the wall. French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Directors and commanding officers of US counterintelligence services can only come to the US Congress for hearings on oversight and appropriations seeking sympathy not approval or report any real success.

Perchance little has really been provided in any official assessments of why US counterintelligence efforts have been so unsuccessful. Perhaps senior executives are not asking the right questions or any questions. When one is overmatched, one will usually lose. Some enhanced intelligibility in the discussion of what has been occurring would help to bring at least the US public around to a better understanding of what where things stand and the prospects for success. Without that, policy analysts and other observers are left to presume that the Chinese are that much better. Indeed, as of this writing, the suggestion that has frequently been voiced in certain quarters concerned with the crisis, and has even spilled out into the newsmedia, is that the professional, diligent officers of the US counterintelligence services–and sadly those qualities cannot be ascribed to the entire group–are simply unable to get a handle on the Chinese threat. That suggests there has been a complete eclipse of their faculties. However, that should not be taken as the gospel truth. Surely, the men and women of the US counterintelligence services, correctly focused, will be able to gain and retain the initiative and start pulling apart Chinese intelligence networks. The renowned US industrialist Henry Ford once remarked: “Failure is simply the opportunity to begin again, this time more intelligently.” The US counterintelligence services maintain their vigil.

Olson’s Precepts from To Catch a Spy

On “Spreading disinformation”

Olson begins his veritable “mini manual” by explaining double-agents can be used to provide the opposition service with false or misleading disinformation, but this a relatively infrequent objective. Deceiving the enemy in this manner requires tremendous planning and subtlety because adversarial foreign intelligence services are not easily deceived. Very often they possess the means to verify the provenance of the double-agent’s reporting. Moreover, if the double-agent reports that some action will take place in the future and it does not, the double-agent’s credibility is seriously undermined. According to Olson the use of disinformation in a double-agent operation would only make sense when the stakes are unusually high or the opposition has limited means of verification.

With reference to “Determining the other side’s modus operandi”

Olson explains that a double-agent is in a perfect position to report back on the opposition’s modus operandi. For any counterintelligence officer responsible for monitoring and thwarting hostile services operations, it is invaluable to know how the service conducts its business. Olson recalls that when he was tasked with developing counterintelligence programs at CIA field stations, the first thing he did was review all of the double-agent operations that any US government agency had run in that location. What he wanted to learn was how the target services operated. Among the questions that he would ask were the following: “Did they meet their agents in safe houses, cafes, parks, vehicles, or some other location? What time of day did they prefer for agent meetings? Were there sections of the city they overused? Did they incorporate initial contact points into their modus operandi, and if so, what kind? What kind of equipment and training did they provide for their agents? Did they use electronic communications of any kind? Where were their dead drops and what did their concealment devices look like? What type of signal device did they prefer?”

Olson remarks that It was especially helpful to have double-agent history in the same city that you are operating, but there was value in reviewing any foibles of double-agent operations run by the target service anywhere. As Olson explains, the case officers of the service have all had the same training and follow the same operational doctrine. They tend to fall into habits and use operational techniques that have worked for them elsewhere. The result can be predictability–a major vulnerability in spying that can and should be exploited by the opposition’s counterintelligence. 

Concerning “Identifying hostile intelligence officers”

Foreign intelligence services take great pains to hide their case officers under a variety of covers according to Olson. They can pose as diplomats, trade officials, journalists, students, businessmen or businesswomen, airline representatives, employees of international organizations, and practically any other profession that gives them an ostensible reason for being in the country. US counterintelligence is tasked with piercing those covers and identifying the spies. One of the best tools available for this task is the double-agent.

In some cases the handling officer is the recruiting officer. If the recruiting officer first met our double-agent dangle when he was providing the dotting and assessing venues in true name, then the double-agent can provide a positive identification from the beginning. As standard practice, however, the case officer will use an alias in meeting with the double-agent. The double-agent can still provide a detailed description of his or her handler and can often make an identification through a photo spread. Also, since counterintelligence service running the double-agent operation knows when and where the case officer will show up, for example to meet to meet the double agent, to service a dead drop, or to mark a signal, it has technical options to assist in identification. The case officer usually comes from a known pool of officials from the local embassy, consulate, the UN, a trade mission, or some other official installation. Olson claims that it never takes long “to make” who the handler is.

Double-agent operations that go on for an extended period, as many of them do, Olson explains that they will lead usually to additional identifications of hostile intelligence personnel. Case officers rotate regularly to other assignments, and their agents doubled or otherwise, are turned over to a new case officer for handling. Other case officers are sometimes introduced into the operation as a back-up or as a subject expert. The primary case officer may handle the day-to-day operational aspects of the operation but may not have the in-depth knowledge required to debrief the double-agent effectively on a highly technical subject. Olson says it is not uncommon in these cases for intelligence services to insert a more knowledgeable debriefer into an operation from time to time. He continues by explaining that If the primary case officer may not be able to get a surveillance break to pick up a dead drop, for example, or may not have cover to mark or read a given signal. In that event a colleague from the residency is called on to help out–and can be identified by employed cameras or other surveillance techniques nearby. Olson states that in some long term double-agent  operations, as many as twenty or thirty opposition case officers and support personnel have been exposed in this manner.

Olson warns that things get funny when the handling or servicing officer if a double-agent operation is an illegal or nonofficial cover officer (NOC). Case officers in these categories face arrest or imprisonment if caught. For that reason, illegals or NOCs are used carefully and as a rule only handle or support a case in which the bona fides of the operation are considered airtight.

With respect to “Learning the opposition’s intelligence collection requirements”

In what Olson calls “the cat-and-mouse game” of counterintelligence, even the slightest advantage can be the difference between winning and losing. A good double-agent operation can provide a winning edge by alerting the sponsoring service to the opposition’s collection requirements. Knowing what the double-agent is being asked to provide the handler is a valuable window into what the opposition’s priorities and gaps are. A question posed would be “How much pressure is being put on the double-agent to collect intelligence in a certain area?” He says that the range of tasking is limited, of course, to what the double-agent professes his access to be,  but a good double-agent might hint at the possibility if expanded access to smoke out the opposition’s response. For example, a high technology double-agent might tell his handler that his future duties might include research in high technology devices. Olson says the question then would be: “Does the opposition service respond either alacrity or lassitude?” According to Olson, the latter reaction could indicate that this requirement is being covered by another agent.

Olson demonstrates another ploy that can be used to learn the adversary’s collection priorities which was to have a military double-agent, for example, announce to his handler that he is up for reassignment and is about to put in his wish list for a new posting. Olson says the double-agent would be prompted to ask his handler: “Where would the service like him to go?  Where does the service not want him to go? For what kind of bullet should he be applying?” Olson explains that how the handler responds can indicate the services collection priorities and gaps in locations where it thinks it can handle the double agent safely.

Olson further explains that intelligence services do not task their agents haphazardly. The requirements are generated by a systematic process that includes input from all the interested parties. In the US, for example, requirements for the intelligence community result from an elaborate consultation and give and take managed by the Office of the Director of National Intelligence. The process is far from casual. Any intelligence service can learn a lot by analyzing the requirements given to its double agents. There is significant meaning in what the opposition service is asking for and what it is not.

Regarding “Acquiring positive intelligence”

Olson reveals that occasionally, a foreign intelligence service so believes in the trustworthiness of a double agent that it shares with that double-agent positive intelligence information. The purpose may be to give the founder agent background information to assist in his or her collection efforts. Another reason for doing so might be that the case officer-double-agent relationship may become so critical that the case officer assumes the double-agents ironclad loyalty and “talks out of school.” Olson also says a case officer may try to enhance his or her standing with the double-agent by boasting about past or current accomplishments.

With reference to “Tying up the opposition’s operations”

Every minute an opposition case officer spends on a double-agent, proffers Olson, is a wasted minute. The handlers time is wasted. Also tied up in the operation for no productive purpose are technical teams, linguists, surveillance, and analysts. Olson goes on to note that It is perhaps a perverse but still undeniable pleasure for a US counterintelligence officer to sit back to survey his or her double-agent operations and to gloat about owning a big chunk of that adversary’s time and energy. Every useless thing that a foreign intelligence service does in handling one of our double agent operations leaves less time for it to hurt us with real operations. In the great game of counterintelligence, these are gratifying victories.

As to “Taking the oppositions money”

Foreign intelligence services vary tremendously in how much they pay their agents, but Olson admits that with the right kind of material, a good double-agent can command big money. He explains that the willingness of an adversarial service to pay our double-agents large amounts of money is a good indicator of how deeply we have set the hook. 

About “Discrediting the opposition”

Commenting generally, Olson says intelligence services hate to lose face. Enough of them around the world have acquired such bad reputations for violating human rights, torture, other violent acts, and murder, that there is not too much for the many to lose in terms of good standing. They want to project to the world an image of competence, professionalism, toughness and discipline. Olson explains that any publicity that highlights their failures can undermine their support from their government and demoralize their troops. He notes that in closed societies like the Soviet Union, East Germany, China, and Cuba, intelligence services were hardly accountable to the press and public as those of Western democratic societies. However, he maintains that they still did everything they could to protect their reputations. Olson says that the same is true today of our major counterintelligence adversaries.

The US is reluctant to publicize expired double-agent operations out of fear of revealing sensitive methodology or subjecting the American principal of notoriety. In selected cases, Olson states that he would like to see US counterintelligence be more proactive in capitalizing on the other side’s failures. He believes that by doing so the US can make them gun shy about engaging in future operations against its citizens. He asserts that the US could publicize how they fell into our trap and how much they gave away to us in the process. He suggests that once they are lured into operating inside the US, counterintelligence services can do a splashy expulsion of case officers who have diplomatic immunity and arrest those who do not. As a benefit, Olson suggests the hostile service looks bad for letting itself be duped by our double-agent operation, and should pay a price for it. It loses some of its operational staff, its reputation for professionalism suffers. He feels that no mistake by the opposition should go unexploited. 

The People’s Republic of China Minister of State Security, Chen Wenqing (above). Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know.

Suggestions Drawn from Olson’s Precepts

Do Not Fume, Think!

In Greek Mythology, there was Até, an unpredictable figure, not necessarily personified, yet represented rash, chaotic, ruinous responses by both gods and men to a situation. She was famously mentioned in Act 3, Scene 1 of  William Shakespeare’s play The Tragedy of Julius Caesar, when Mark Antony addresses the body of Caesar and predicts civil war: “And Caesar’s spirit ranging for revenge,/ With Até by his side, come hot from hell,/ Shall in these confines, with a monarch’s voice,/ Cry havoc, and let slip the dogs of war.” Até has been described as a chain reaction, a mechanism in which evil succeeds evil. In finding a handle to the current espionage crisis with China, it is not a time for a “gloves off” attitude. Minds should be directed toward getting at the opponent to send a message, to bully or even to overwhelm, The requirement in this situation is subtlety, nuance, thinking, not any heavy-handed business. If any US counterintelligence officer involved cannot sustain that, he or she is working the wrong target. Informed by experience, greatcharlie is aware that it is a predilection among not all young special agents in a particular US counterintelligence service, but some, to be frightfully eager to prove something to their cohorts and to themselves. Ira furor brevis est; animum rege. (Anger is a brief madness; govern your soul (control your emotions)).

Practicing what is compulsory for all investigations in the Chinese crisis is sine qua non. However, if one’s thinking is not yielding satisfactory outcomes, then one must focus upon how and what one thinks. A corrective step must be to concentrate to enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. It is one thing to supposedly see everything–certainly the tools available to US counterintelligence services allow them to see an extraordinary amount of things, but another thing to properly reason from what one sees. US counterintelligence officers must think harder and conceptualize better. They must ruminate on events in relation to those that proceed them and meditate on what the future may bring. They must practice forecasting decisions by their adversary that may shape what might come and then proof their efforts by watching events unfold in reports. 

The question that must beat the brain of every US counterintelligence officer working on the matter is most likely: “Where will they strike next?” As a practical suggestion, the focus of many investigations–if not all investigations–of Chinese intelligence networks send operations might be placed on two points: those controlling networks and running operations in the field; and the composition of operations in the field.

Know Who Controls the Chinese Intelligence Networks

As it was discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” personnel of the Ministry of State Security (MSS), the civilian foreign intelligence service of China, are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for ten years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is near certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army (PLA) and Communist Party of China intelligence units are operating without official cover throughout the West. (Note: The four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders are the United Front Work Department, the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.) Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. They are known to often operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. 

There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial. In a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations. For some time, those provincial and municipal sub-elements performed mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus By the time of Mattis’ writing, they had become small-sized foreign intelligence services. They were given considerable leeway to pursue sources. In Mattis’ view, that independence accounted for variation across the MSS in terms of the quality of individual intelligence officers and operations. At the present, the provincial and municipal state security departments and bureaus may be operating entire networks of their own in the US with appropriate guidance from MSS Headquarters and the Communist Party of China.

There are likely many unexplored possibilities that perhaps should be considered about the managers of Chinese intelligence networks in the US. Anything that can be gathered or inferred about the individuality of such a person must be put forth for study. A constant effort must be made to understand what makes the network manager tick. Using some of what is publicly known about how Chinese intelligence services have been operating in the US from a variety of sources, to include US Department of Justice indictments and criminal complaints, one might conceptualize traits that could be ascribed to those managers possibly on the ground in the US, controlling operations day-to-day, are: energy, enthusiasm, and creativity. Among their traits, one might expect that they would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. That energy is transmitted to US citizens and Chinese émigrés being recruited to serve the purposes of their intelligence services and, of course, the Communist Party of China. There would very likely be the hope among Chinese intelligence services and the Communist Party of China that following the detection of each of their victories by US counterintelligence services there is an opposite effect upon the officers of those organizations. Chinese intelligence services would surely hope that a sense of defeat reaches deep into the psyche of US counterintelligence services rank and file and firmly sets within them a sense of disponding woe, sorrow, and discouragement. They doubtlessly want them to feel gutted.

The managers controlling operations of Chinese foreign intelligence networks in the US have undoubtedly been selected due to their proven mental alertness, quick thinking, adaptability, and curiosity. They surely have the right stuff to be open-minded and imaginative, within authorized parameters, and are willing to adapt. Surprisingly given the iron-grip culture among managers and executives in Beijing, these “field managers” have apparently been given some leeway to use their initiative to achieve progress. It likely accounts for how the Chinese are able to react quickly to any changing circumstances. To an extent, it may also explain why Chinese intelligence services may appear to some to be so disdainful of any danger that US counterintelligence efforts might pose to their operations despite knowing that they are actively being pursued by them by the hour. To be on top of everything, the network managers are likely sharp as a tack and no doubt endlessly study what is known by Chinese intelligence about US counterintelligence tactics, techniques, procedures, and methods, concepts and intent, and the latest counterintelligence tools US counterintelligence has fielded. Among such individuals, a solid foundation of information likely allows for the development of viable inferences and strong insights which in turn allows for confidence in using their intuition on what may come or what is coming their way. These network leaders are also likely able to identify any “bad habits” that may have ever brought US counterintelligence services too close for comfort. 

There remains the possibility that the network manager may not even be located in the US. Still, someone must be present on the ground in the US, to relay, with authority, directions from the manager and respond to inquiries and urgent matters from those operating in the field. It could be the case that they maintain modest lodgings not only to reduce costs and keep a low-profile in general. However, the presumption of a low-profile manager could also be entirely incorrect. It may very well be that they are individuals who have achieved considerable success and prominence in areas such as business and finance. As such, they, as a professional requirement, would both have access to and daily accumulate knowledge far beyond average boundaries of the latest events in industry and government. They would know what is important and urgent, what is moving things forward, what is the next big thing, who and where are the individuals influencing events and how to make contact with them and get connected to all of it. In their fields, they may be among the most capable at doing that and may have the recognition, awards, and the financial benefits that would confirm it. It would appear that they avoid engaging in any surreptitious or malign efforts in their own companies or in their own fields. However, it is still a possibility.

Such prospective network managers would very likely be untainted by any apparent or questionable affiliation with Chinese universities, the PLA, and the Communist Party of China. (That does not mean family members who may reside in China would not be thoroughly connected to such organizations.) If the individuals have family ties back to China, there would be nothing apparent about them that would make them suspicious. They would likely have no overseas travel or contacts that would create suspicion. Doubtlessly, an endless list of notables from their fields might be prepared to vouch for them. All the while, though, they would be managing intelligence operations of their networks in an exquisite fashion, and feeding back information to China vital to US national security and the key to helping US businesses maintain their competitive edge against foreign rivals. (If the manager is situated in the US, oddly enough, there may actually be a number of creative ways to draw out such senior managers of field operations. As aforementioned, greatcharlie will never offer any insights even from its position outside the bureaucracy that it believed might result in any negative outcomes for the US as it seeks to resolve the China crisis. That being stated, as stated in the December 13, 2020 greatcharlie post entitled, “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago,” if one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. Not one case has been a “wilderness of mirrors.”)

Perchance those of a younger generation would say that Chinese intelligence network managers in the US, as described here, as being  “woke,” or as the Germans would say, “wach,” both words roughly refer to them as being awake. In greatcharlie’s view, spying on the US is not woke. Nonetheless, everyday, the network managers place their keen eyes on the world around them and have a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

Perhaps reading this, one might get the impression that greatcharlie was attempting to convince readers that Jupiter himself was running the Chinese intelligence networks. That is surely not the case. However, it must be recognized that the sort controlling those networks are likely of a very special nature. Surely, with regard to politics which is all so important in the regime of the Communist Party of China, one would expect that network managers deployed against the US, despite not having much physical contact with anyone in Beijing, would be the fair-haired boys or gals among one or more of the senior executives in MSS or even a senior leader of the Party, itself. 

Whatever any US counterintelligence service may attempt to do in an effort to break Chinese intelligence operations, its officers must be mindful that this may likely be the sort of individual they are seeking to maneuver against. Without the ability to get up close to these managers, it might be enough to conceptualize them, given the pattern of activity and interrogations of intercepted officers, operatives, and informants and reinterviewing the handful of “recent” defectors in US hands. (It is wholly plausible that the officers, operatives, and informants working in the US have never seen and do not know the identity of their network manager on the ground. They may only recognize the individual by code via orders, rectifications, responses to inquiries and requests, and inspirational messages.) If the abstract entity, de créature imaginaire, constructed here is, by coincidence, correct in every particular, there may be the rudiments to get started on trying to “steal a march” on perhaps a few of the Chinese intelligence network managers. Shaping one’s thinking against thinking and conceptualized tratits of de créature imaginaire, may be enough to open new doors. Perhaps in time, such in-depth study of these aspects will allow informed counterintelligence officers to develop true intimations, not valueless surmisals or absurd speculation, of what may be occurring and what is about to occur. In “A Story of Great Love,” published in the Winter 2011 edition of the Paris Review, Clarice Lispector writes a sentence that is amusing yet conceptually germane to what is discussed here: “Once upon a time there was a girl who spent so much time looking at her hens that she came to understand their souls and their desires intimately.”

The People’s Republic of China Consulate in Houston (above). From this now closed building, China directed government, economic, and cultural activity across the southern US. Ministry of State Security (MSS) personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations.

Discover the Composition of Network Operations

One might suppose the Chinese intelligence networks in the US, as a primary purpose, unlikely conduct operations in which they blithely seek out new targets day-after-day, although there are perhaps some operations underway that serve to monitor individuals in positions that might be interest and sites of information of interest with the guidance of MSS headquarters, provincial bureaus and municipal departments based on available intelligence. The settled, more fruitful networks that have nettled US counterintelligence services the most are likely set up to run operations on targets of a certain type, rich with prospects at locations in  which Chinese intelligence operatives and informants are well ensconced. One could reasonably expect that there will be a commonality in location for both predator and prey. (Although, nothing can really be certain for espionage is a deke business.) The Chinese intelligence operation will be set up in proximity of a figurative “happy hunting ground,” a high-tech firm, laboratory, academia, political network, foreign, national security, economic, trade policymaking office, agribusiness, and aviation, and energy business to list only a handful. In addition to propinquity, there will be a common functionality of any Chinese owned business that may establish themselves in the hunting ground, and very apparent efforts to create employee links by them with their likely targets. 

Control remains essential in the authoritarian (totalitarian) regime of the Communist Party of China and therefore there is a certain specificity intrinsic to every operation–despite nuance in design, methods, and other imaginative approaches attendant–that will presumably allow for monitoring, oversight, and audits. If it ever was detected that an odd Chinese intelligence network was skillfully mixing tactics, techniques, procedures, and methods in operations conducted following an aggregate rollup of known Chinese intelligence efforts in the US, it is unlikely that particular network’s approach, while perhaps creative to the extent possible, will never stray too far from any observances that would be laid down by their respective Chinese intelligence services. If the tactics, techniques, procedures, and methods used by Chinese intelligence networks are really so similar, one could say their operations will likely have a common “DNA.” The adversary’s known practices are undoubtedly cataloged by US counterintelligence services. It will be necessary to more closely study the common functionality of networks and operations. As much information on their operations must be collected as possible. Study what has been learned by allies. Identify common vulnerabilities in every network. Identify, study, and exploit their deficiencies.

As much of what the networks Chinese intelligence services are exactly doing day-to-day in the US remains unknown publicly at least, it is impossible to say with certainty how the COVID-19 pandemic has impacted their operations. One can imagine there has been some impact. Nevertheless, given that reality, in considering how COVID-19 factors into their efforts, one must again enter the world of supposition in which one analysis of how those networks are not only operating, but more specifically, how managers of those networks are communicating with Beijing and with their officers, operatives, and informants, can be just as good as another.

Even before COVID-19 hit, for Chinese intelligence networks on the ground in the US, managing communications in any direction was imaginably no mean feat. As it was discussed in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).” Perhaps, the main lesson for Chinese intelligence services was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. 

One might venture to say that a likely move to hard documents may have been evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

From what is publicly known, it appears that Chinese intelligence networks do not recruit after simply spotting a potential operative or informant. If that were the case, the success rate of US counterintelligence services against them would be far higher given the opportunities such activities would present and given the experience of their organizations in dealing with such a basic set up. Chinese intelligence services clearly work wholly on their own terms, investigating only those “targets” who they choose to investigate, essentially ignoring anyone that may have the slightest appearance of being dangled before them. It is a benefit for them to operate in what could be called a target rich environment in the US. Recruitment is “by invitation only.” If one is not on the figurative guest list, one does not get in! As part of their investigations of targets for recruitment, doubtlessly it is important to identify the psychological profile of a person, his political orientation, his attitude towards his motherland, China or towards the US, where he or she has become a citizen or visiting for school or long-term employment. And then, after accumulating a sizable amount of material (based on a whole array of undertakings: plain observation, audio- and video-surveillance of the places of residence, agency-level scrutiny, including “honey traps”), on the basis of the analysis, a decision is made about a transforming the investigation into a recruitment with appropriate conditions (such as through compromising materials or a voluntary agreement) or about wrapping up the whole matter by “educating” a foreigner, conveying a favorable message on China and the wave of the future, Chairman Mao Zedong’s vision of Communism.

After studying what is being specifically done by a network long enough, one will begin to see dimly what a network or specific operation is driving at. After finding a few missing links, an entirely connected case will not always, but can be obtained. Once a clear picture emerges, one can start developing attack vectors against Chinese intelligence networks with a forecast of nearly assured fruits. Lately, the identification and aim at any networks has clearly been far less than accurate. Do not use individuals lacking good judgment and sanguine required based on one’s own standard. Create the best team possible. Know your people well. Keep a close eye on neophytes. (As touched on in the discussion of Olson’s “Ten Commandments of Counterintelligence” of Chapter Four in greatcharlie’s review of To Catch a Spy, a supposition verging on the ridiculous must be seen as such by a supervisor and appropriately knocked down. A keen interest must be kept on how subordinates, especially novices, are reasoning with facts. A supposition verging on the ridiculous might involve imputing criminal motive or involvement on a party that could not have been part of a criminal conspiracy or ascribing characteristics to an individual who could not possibly possess them or has not displayed them. A good case could be blighted by such wrongheadedness.)

Gnawing a bit further at the matter of using young, novice counterintelligence officers on such delicate cases concerning Chinese intelligence, one should avoid the pitfall of allowing them to manage surveillance work for a case and turn it into something that might more reflect the work of a security service in a totalitarian country to soothe their egos. Be mindful of the use of time, energy, and budget by them such as placing heavy, wasteful surveillance on the street not to advance the casework but to prove some immature point of power. Casting some wide net will bring in nothing but a lot of extra things that time, energy and money cannot be wasted upon. Differ nothing to their judgment. Every mistake or misstep made by US counterintelligence, whether the result of a manager’s use of some clever misdirection or whether self-inflicted, represents a success for a Chinese intelligence network manager. Keep firmly in mind the managers of Chinese intelligence networks are flexible enough in their thinking that they appear to be able to change horses in midstream while maintaining the metaphoric helm on a steady heading so to speak. 

Concerning contractors, by their nature, they are owned and managed by businessmen out to make money as priority. That focus among many of them can be boiled down to the  precept, “minimum effort, maximum gain” and that can be most apparent in how they conduct their so-called operations on the street. As already alluded to here, their “operatives,” often poorly vetted before being “hired,” many times find it difficult in the field, physically surveilling a target or trying to open a clandestine conversation, to be their higher selves. They are often too aggressive, even ruthless, and engage in what could politely be called “aberrant behavior.” Strangely enough, for many contractors, the reality that their operatives display these characteristics is a point of pride.. As it was discussed in greatcharlie’s January 31, 2020 review of To Catch a Spy, the negative behavior of contractors witnessed in the field by an adversarial intelligence service’s officers, operatives, and informants could very likely have an impact on their impressions of US counterintelligence services beyond what has already been inculcated within them by their masters. It should be expected that any negative impressions could have the deleterious effect of negatively impacting a decision to defect or be recruited if the idea might ever cross their minds. It is impossible to calculate, but it surely can be imagined that a number of potential defectors and recruits may have been deterred from taking the first step over this very issue. Recognizably, there is a reduced ability to effectively oversee what contractors are doing at all times on behalf of US counterintelligence services. At best, the managers of a particular counterintelligence operation that they may be hired to support will only know what the contractors divulge about their efforts. Close observance of them in operation, done furtively by managers of US counterintelligence services, would doubtlessly substantiate this.

Those in US counterintelligence services considering what is noted here might cast their minds back to the observation of the renowned 17th century French philosopher Blaise Pascal in Pensées (1670): “Justice without power is inefficient; power without justice is tyranny. Justice without power is opposed, because there are always wicked men. Power without justice is soon questioned. Justice and power must therefore be brought together, so that whatever is just may be powerful, and whatever is powerful may be just.”

Surely at one time the relationship between contractors and US counterintelligence services was quite beneficial as they provided real assistance through manpower and talent, but again, the situation has since changed considerably. They are shadows of what they once were in terms of quality.  Beyond some possible invaluable assistance they may be providing through precious outside of the bureaucracy analysis and advice on Chinese intelligence activities in the US, in the China case, US counterintelligence services should severely minimize or eliminate contractors if possible. There may be a place for such contractors and their ways in counternarcotics, organized crime control, human-trafficking or some other kind of criminal investigations. However, up against the sophisticated intelligence services of a determined adversary as China, those contractors are not a credit to US counterintelligence services. They are nothing but a liability. The China case is too important to indulge in any uncertainties. On an additional point, technical intelligence tools must be utilized effectively and appropriately. Monitor only those who need to be monitored. Resist the urge to play George Orwell’s “Big Brother.” That urge is another weakness. Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.)

The continued success Chinese intelligence services and counterintelligence services in being able to conceal their massive espionage efforts may suggest that conceptually, they may approach establishing their presence in the US with the thought of “peacefully coexisting” in the same environment as US counterintelligence services. The relationship that they seem to have sought with US counterintelligence services in order to ensure the security of their networks and operations is not “cat and mouse” or combative. It is strangely, but logically, symbiotic. 

That symbiotic relationship, however, is malignant, and designed to be parasitical. To that end, managers of Chinese intelligence and counterintelligence services in the US likely respond to any detection of the presence of US counterintelligence personnel or activity not by avoiding them, but by connecting in some smart way to them. Connecting to them, to give a couple of simple examples means having operatives work for a contractor engaged in physical surveillance, or take on low level employment in or around offices of those contractors. From such positions and similar ones, they would enable themselves to monitor the most well-orchestrated, well-conducted activities from the inside. Some operatives, finding work as operatives in the agencies of contractors for US counterintelligence services  could actually become, and have very likely actually been, part of those operations. Note that operatives of Chinese foreign intelligence and counterintelligence services directed to get close to US counterintelligence services personnel and activities may not necessarily be ethnic Chinese. (For a fuller discussion of that matter, see the July 31, 2020 greatcharlie post “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”) Such a precaution would likely be deemed less necessary by managers of Chinese foreign intelligence and counterintelligence services for operatives placed within or close proximity of contractors offices and personnel as those managers have likely become well-aware of the astonishing lack of due diligence and security practiced by them. Surely, US counterintelligence activities of greatest interest would be those against Chinese foreign intelligence networks and operations. However, there would undoubtedly be significant and considerable value in being aware of physical surveillance activities by US counterintelligence services against the other adversaries of those services. There is every reason to believe cooperative relationships exist among the intelligence services of US adversaries. To say the least, there would be some monetary value in information collected by China of that kind.

Much as some parasites, those operatives who might successfully penetrate any organizations of or pertaining to US counterintelligence services would never act directly  to destroy those personnel or organizations but would rather only nourish themselves off  of them by collecting critical information from them for the security and survival of Chinese Intelligence activities in the US. Reminding again of what might be called Olson’s maxim from To Catch a Spy, “Penetration is the best counterintelligence.” One can almost be certain that senior executives and managers in adversarial foreign intelligence services surely believe that, too! That is something for US counterintelligence services to be very concerned about.

With regard to working with quantitative data, broken down to the essentials, it must continually be used to keep US counterintelligence officers cognizant and well appraised of activity by confirmed Chinese intelligence officers, operatives, and informants tied to diplomatic missions. With quantitative data, users ought to drill down on data concerning their daily and hourly activity from communications to commuting. One must be able to discern even the slightest changes in activity, whether increased or decreased. Data should be reviewed daily to identify the slightest changes from the aggregate numbers. Revisiting data that has already been rolled up and aggregated is also advised. It should be mined through for more details, clues. (One should never get so caught up with data to believe that an opponent’s actions can be reduced to an algorithm. The opposition’s leaders are living, breathing, agile, flexible and–despite working in Communist China–potentially unconventional thinkers.)

Getting Results

Measures of success of the practices suggested here may hopefully be a marked increased prospective opportunities to: neutralize; displace; and, intercept, even recruit, from a targeted Chinese intelligence network.

1. Displace

If the purpose of US counterintelligence is to displace a Chinese intelligence network or operation, the rapid shutdown of an operation would be a sign of success in that endeavor. The threat of intercept or the very public revelation that an officer, operative, or informant in the network has been apprehended would naturally spur such an action. If the environment is made hot enough for the network, its managers and the remainder of their string of officers, operatives, and informants will indubitably go to ground with the hope of resurrecting their network with its diffuse operations at a more favorable point in time. However, if an operation has packed up and moved out, there will be a palpable change in the working atmosphere for the counterintelligence officer who has had their noses to grindstone working the case. In a frenzied rush to exit the US, individual suspected Chinese intelligence officers, working in academia or industry, in physical isolation from their compatriots, or ones that may appear to be operating independently and farthest away from their network compatriots and resources, may no longer see the need to carry on with any pretenses. It is also interesting to see that there is never mention of any effort by Chinese intelligence officers, operatives, or informants to figuratively throw dust in the eyes of those investigating, plant false leads or use other means to misdirect, as they make their escape.

Interviews can be used as a psychological tool to prompt displacement. For the network manager who is logical, visits to the residence or workplace of a subject of investigation by US counterintelligence officer to invite them for an interview in the respective office of their service, or to interview them at that location, may be viewed as probing based on some insight possessed by the adversary. There is the odd chance a network manager might believe a US counterintelligence service was on to something. However, it would seem they would more likely think a US counterintelligence service would “hold its cards a little closer” if it had something solid to act on. If the network manager is thinking in that way, it would mean  he or she has been trying to see through all things cooked up by US counterintelligence. Surely, for the Chinese intelligence  services as much as those of the US, studying their oppositions modus operandi is as important a task as anything else.

Operatives and informants, on the other hand, may become jittery. However, such a visit may not unnerve the network manager. The reaction of a network manager may be no visible  reaction at all. He or she will likely continually display nerve and knowledge. The possibility of such interviews has likely already crossed the managers mind. The network manager has likely already assessed how officers, operatives, and informants in his or her retinue will act or react when approached. The task of the network manager will be to deduce what triggered the interview, reason from cause to effect what is the likely course of events to follow, and act accordingly. That being stated, activities and especially the communications of those approached for interviews must be monitored. New travel plans by individuals with some association to those interviewed, scheduled closely by date, must be examined.

2. Neutralize

To assist in determining where to interdict, stand up a “Red Team” on a non-stop basis, using templates properly constructed from everything known and insights and inferences on Chinese operations and to continue to build up a legend for de créature imaginaire with the objective of achieving increasing accuracy. Among tools that should be made available for use in neutralizing Chinese intelligence officers, operatives, and informants, should be heavy financial rewards for “coming forward”; and whistle-blower-like protections. Casting one’s mind back to the “Chieu Hoi” program used to contend with the Viet Cong during the Vietnam War, US counterintelligence services, using an approach certainly not the same but conceptually similar to that, may very well be able net a few long-time operatives and informants of China see intelligence services with deep involvement in their efforts, who may have had their fill of the whole business and want to get out, but safely. Cela n’a rien d’évident. (The fact that the Chieu Hoi program was implemented in an Asian country is purely coincidental. No deliberate connection regarding a region, race, or political philosophy was made. The parallel is that much as the Viet Cong, Chinese foreign intelligence officers in particular, but any operatives and informants as well are often “true believers,” who act out of conviction. Similar to the Viet Cong, they are driven by a deep-seeded ideology. In their unique case, it is usually the erroneous belief that China is the champion of the oppressed and will become the dominant power in the world.) In case the point has been misunderstood, heavy financial rewards for them would mean steep rewards. Ideally, the result will be to threaten the rewards structure, financial and psychological, of the Chinese foreign intelligence and counterintelligence services. If money would not be the elixir to turn any Chinese intelligence officers, operatives, or informants, US counterintelligence services would only need to pose the question to themselves: Deployed to the US and caught in the business of spying, what else would truly satisfy them enough to cause them to  defect or to become a double? If the situation becomes desperate enough, ask the targeted Chinese intelligence officer, operative, or informant: “What do you want? Name it!” (In other words, at least to get things moving, do whatever it takes, but within reason!) Turning Chinese operatives and informants should ideally take on the appearance of something akin to a business enterprise while actually being a counterintelligence task, if successful. Cela encore n’a rien d’évident. (Note, however, that money can become poisonous in both directions, creating temptation among those in service ranks unfortunately disposed to transgressions. Therefore, its distribution must be very carefully supervised.)

To be succinct, the hope of US counterintelligence should be to come in contact with an officer, operative, or informant with an albeit idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. Pretio parata vincitur pretio fides. (Fidelity bought by money is overcome by money)

3. Intercept

Non capiunt lepores tympana rauca leves. (Drumming is not the way to catch a hare.) This could be entirely off the mark, but it appears that aggressive counterintelligence appears to have been directed at targets of opportunity versus the industry-centric networks of Chinese intelligence in the US. While there may be a meretricious benefit to this practice, it accomplishes nothing in terms of tearing down Chinese intelligence networks or smothering greater espionage operations. Again, elevated thinking is required. There must be an inflexion point at which US counterintelligence services become the fox, and the days of being the chicken come to an end. Better use must be made of tools available and good practices. There must be better use of deception. To lure Chinese intelligence networks into traps, network managers and higher ups in the Chinese system must be convinced that the figurative cheese in the trap is something worth the risk of trying to take. Psychological operations must be used to draw them closer to targets US counterintelligence can cover while remaining concealed. As part of the information warfare campaign with China, an effort must be made to surreptitiously “assist” Beijing in discovering a novel target worth pursuing. Chinese intelligence services have enjoyed a halcion season of success. They apparently have no intention of being thrown off their pace and streak of victories by what they in all likelihood suspect are attempts by US counterintelligence to score a victory against their effort during their moment of glory.

US counterintelligence officers must do their utmost to go beyond the normal scope in determining what will attract Chinese intelligence network managers. They must not proceed by pretending to know. There is no room for guesswork. Approaches developed must not be derivative. They must put as much time as necessary into developing them to become as certain as humanly possible that any new approaches will work. Any enticement or manipulation must not give off any indication of being a plant nor chicken feed. It must appear as genuine gold dust. Under extremely controlled circumstances, it may need to be actual gold dust! What is left is to wait for the network to show itself. There is nothing else to do otherwise. Efforts to stoke or prompt the adversary will lead to blowing the entire set up. Impatience is what the Chinese will look for because that is what every other foreign intelligence service expects of US counterintelligence.

Logically, it would be a capital mistake for Chinese Intelligence services to adulterate what could likely be characterized as an operation in which every aspect was well-known with individuals of ultimately unknown character, loyalties, or reliability and targets of likely no immediate unknown value and of no prior interest or desire. As senior executives and managers in Beijing might assess, if anything suddenly put before them was truly of any immediate value or desirable to China, the individuals or the information would have respectively been recruited or stolen already. Assuredly, that is the pinch for US counterintelligence services when it comes to getting decent double-agent operation off the ground.

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, offers the statement in The Honourable Schoolboy (Alfred A. Knopf, 1977): “A desk is a dangerous place from which to view the world.” US counterintelligence officers must be mindful of what may be perceived in the conference room as an advantage over the opposition intelligence network manager may be the ugly product of groupthink. They must judge perceptions in view of what is  actually known about that opponent, even if he or she remains de créature imaginaire and how that manager may act in response to what they plan to put in his or her way. Use of aggressive tactics or overwhelming superiority can be turned into a liability by an agile thinker. It is also important to understand that no matter how the Chinese intelligence network or operation may be approached, everything done, particularly if successful, will be studied by superiors in Beijing so that all gaps that may have been exploited in a disrupted, displaced, or destroyed network will be rapidly and quietly set right in all remaining networks. Operational missteps that might have been exploited will be identified and never made again. (Be observant for changes in practices among networks and operations being traced.) In view of what Beijing may learn from an initial attack, adjustments in the next US counterintelligence strike against a Chinese intelligence network or operation must be considered even before the first is executed. In a cycle, this approach to attacking Chinese intelligence networks and operations must be adjusted for each new situation and repeated.

To go a step further, one might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them. 

It is unlikely that the senior executives and managers of Chinese foreign Intelligence services are sitting back and gloating about their victories. Rather, it is very likely that everyday they work harder and harder to make their networks and operations better and more effective, pushing their espionage capabilities far-beyond the reach of the counterintelligence services of the countries in which they operate. All of that being said, one might still imagine that soon enough, in a gesture aimed at figuratively putting some dirt in the eyes of US counterintelligence services, the Chinese foreign intelligence services may spend some hours planning some upheaval that their networks could cause in the US to embarrass US counterintelligence services. It would imaginably be designed to knock them well-off track and symbolically mark China’s domination of their opponent on his own home ground. China would also be sending a message concerning its dominance throughout the espionage world. Of course, despite its meretricious effect, whatever such a potential ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would feel enabled to plausibly deny China’s connection to the action. (These are only some thoughts, ruminations, on the situation. Hopefully, this should not cause any undue concern. Or, cela n’a rien d’évident.)

The Chinese have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. To that extent, it is unlikely Beijing wants its intelligence services reaching after anything when their plates are already full follow up on leads they created for themselves. It is possible that the Chinese foreign intelligence services have never seen US counterintelligence services get anything substantial started against their networks in terms of penetration. However, the Chinese will unlikely mistake quiet for security. They probably never really feel secure in the US. It is hard to imagine what might ever be worth the candle to Chinese intelligence services to reach after. Assuredly, impatience in any US operation would be anathema.

People’s Republic of China President Xi Jinping (above). Given the success of Chinese intelligence services in the US, China might soon enough choose to send a message to symbolically mark China’s domination of their opponent on his own home ground. and its dominance in the espionage world. Chinese foreign intelligence services operating in the US may spend some time planning an upheaval that would figuratively put some dirt in the eyes of US counterintelligence services. Despite any meretricious effect such an act might have, whatever such a potential deplorable ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would be able to plausibly deny their connection to the action.

The Way Forward

Month after month, US counterintelligence services discover another set of occasions when China has incommoded a federal agency, a private firm, an academic institution, or research institute by stealing from them classified information or intellectual property most often vital to the national interest. Leave it to say, having engaged in an empirical study of public facts coming in what has been transpiring, the potential trajectory of China’s malign efforts is breathtaking. By 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. However, that is not the case. Perhaps in some allied country, success against China will be achieved showing US counterintelligence services the way forward. With a long history of successfully defending the United Kingdom from foreign spies, it may very well be that MI5 will not have the Cabinet, the Prime Minister, the exalted person herself, wait much longer for good news.

Whether this essay for some will cause a journey from unawareness, curiosity, or a lack of clarity to knowledge, remains to be seen. There has been more than enough talk about how bad the problem with China is. That becomes by the by. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and take the game back to China and destroy all of its networks. It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. In a very small way here, greatcharlie has sought to contribute to development more effective approaches to defeat Chinese intelligence collection efforts in the US. Before writing this essay, greatcharlie fully understood and accepted that there are those singular US counterintelligence services that would be completely uninterested in, and even shun, any voice or meditations from outside the bureaucracy that would dare offer assistance to them in their struggle with China’s intelligence services. (It must be stated that greatcharlie has either been retained to supply any imaginable deficiencies of US counterintelligence services nor has it been retained for anything by any of them.) Often in the US national security bureaucracy, perspectives on adversaries can become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, as suggested,, perhaps an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with Chinese foreign intelligence activity in the US.

With a near endless chain of losses, the following theft sometimes being a greater defeat than the one proceeding it, greatcharlie feels compelled to ingeminate the position expressed in the conclusion of its August 31, 2020 greatcharlie post US counterintelligence services should consider hiring individuals from outside the bureaucracy who are already known due to demonstrated interest in the subject matter and recognized as possessing some ability to present what may be unorthodox innovative, forward-looking perspectives. New thinkers can rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Thinking outside the bureaucracy would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. 

The suggestion should not seem so exotic at this point. Even the adversaries of the US would likely imagine the possibility that some assistance from an unexpected source and direction could pose the greatest threat to their success. Perhaps some US counterintelligence services will never brook the idea of receiving such assistance from outside the bureaucracy. However, in the end, the US counterintelligence service which opens itself up to new, thinking, new insights, new approaches, will very likely bag its tiger. Vigilando, agendo, bene consulendo, prospera omnia cedunt. (By watching, by doing, by consulting well, these things yield all things prosperous.)