Commentary: Will the Real Dong Jingwei Please Stand Up?: Comparing Features of Popular Images of China’s MSS Vice Minister

People’s Republic of China Vice Minister for counterintelligence of the Ministry of State Security Dong Jingwei (far right), and People Republic of China Minister of Public Security Zhao Kezhi (center), were among five Chinese officials attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. On June 23, 2021, officials of the People’s Republic of China Embassy in Washington presented this photograph of Dong’s very public appearance at the Shanghai meeting as proof that he is in China despite rumors that he had defected to the US four months before. The point at issue is whether the photograph presents the real Dong.

In June 2021, rumors had taken flight concerning the alleged defection of Dong Jingwei, the People’s Republic of China Vice Minister for counterintelligence of Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS–China’s relative equivalent to the Central Intelligence Agency (CIA). Dong was alleged to have defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. After arriving safely into US hands, Dong allegedly provided government officials with information about the Wuhan Institute of Virology that purportedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. However, by late June 2021, US officials began reaching out to the news anonymously to say reports of Dong’s defection were not true. and hinting that he remained in China. The mainstream news magazine Newsweek reported on June 22, 2021 that it was informed by a US government official that reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Although reticent about the rumors for the longest time, on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite claims that he had defected to the US four months before. Curiously, the photograph has not been widely accepted as incontrovertible proof of Dong’s identity, that he still resides in China, or that he did not defect among many independent China-watchers.

Before the controversy of the rumored defection, one would have had great difficulty finding Dong Jingwei’s name anywhere it might even be expected. Two resources for such information that greatcharlie’s will reach for first are: Peter Mattis and Matthew Brazil, Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), and I. C. Smith and Nigel West, Historical Dictionary of Chinese Intelligence (Historical Dictionaries of Intelligence and Counterintelligence) (Scarecrow, 2012). Following the blow-up of the defection story, numerous articles online have appeared and online encyclopedias such as Wikipedia and Britannica, have developed enough information to provide decent–though some were not so verifiable–biographies of him. As was noted in greatcharlie’s June 30, 2021 post entitled The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax,” never before has Dong’s name, or any other senior MSS counterintelligence official’s name, been bandied about in the US or global newsmedia in the manner it has been lately.

What would imaginably now be a greater issue for inquiring minds than Dong’s biography, is the matter of his actual image, how he actually looks. A number of photographs of him have cropped up along with the many new articles, but two particular images of Dong have been very popular. As the two images have far more similar features than dissimilar, one could very easily understand how it might present a challenge for many to distinguish between their facial features of the individuals in the photographs. Yet, both photographs, in reality, display enough distinct aspects to allow one to discern fairly significant differences between them. If they are photographs of two different men, one may actually be Dong. Here, greatcharlie gives making comparisons between the two images of Dong the old college try.

The June 16, 2021 tweet from the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong Jingwei had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia. Along with Han’s commentary was the popularized photograph allegedly of Dong Jingwei.

The first image mentioned above was made available widely via Twitter on June 16, 2021 as a result of being in a photograph attached to a tweet by the US based, Chinese pro-democracy activist, Han Lianchao. In the now famous tweet, Han stated he heard a rumor from an associate that Dong had defected to the US. Han’s tweet was picked up the next day by SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations. SpyTalk’s analysis was then widely reported and discussed mainly by conservative newsmedia outlets, and gradually reported by some in the mainstream newsmedia.

The second fairly popular image is included with his biography in Wikipedia. The individual in the Wikipedia photograph appears to be the same individual in the photograph that the Chinese government released of Dong attending the 16th Meeting of the Security Council Secretaries of the Shanghai Cooperation Organization Member States on June 23, 2021. He is the same individual in a photograph taken when Dong was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. In the photograph, Dong is first from the left. It is alleged to be the earliest publicly available photograph of Dong after he began serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in April 2018. 

A photograph taken when Dong Jingwei (far left) was part of a delegation led by Chen Yixin, Secretary-General of the Commission for Political and Legal Affairs of the Communist Party of China Central Committee, to attend the second round of a bilateral high-level security dialogue in Berlin on Sept. 21, 2018. It is alleged to be the earliest publicly available photograph of Dong serving as Vice Minister for counterintelligence in the MSS. Dong took on the position of Vice Minister in the MSS in April 2018.

Si parva licet componere magnis. (If we may compare small things with great.) By placing the photograph of Dong from greatcharlie’s June 30th post beside the photograph from his biography in Wikipedia, using only the naked eye, one can find clear distinctions in at least seven areas of their respective faces. To allow readers to follow along with comparisons of facial features, the June 30, 2021 greatcharlie post photograph is included here as Figure 1. The Wikipedia photograph is included here as Figure 2. A chart that identifies parts of the human face is included here as Figure 3. Readers should refer to that chart to locate points of the face mentioned in Figures 1 and 2. The seven specific points on the face address include: philtrum; philtral columns; philtral dimple; nasolabial grooves; nasal septum; mentolabial sulcus; and, facial marks.

Figure 1 

Dong Jingwei June 16, 2021 Twitter Photograph

Figure 2 

Dong Jingwei Wikipedia Biography Photograph

Figure 3 

Face Chart

Philtrum

The philtrum on the individual in Figure 1 forms a visually straight canal with the philtral columns formed in straight lines from the nasal septum to the top of the lip. They are somewhat thick on both left and right. The canal of the philtrum appears relatively symmetric in its depth and width to the corresponding height and width of each philtral column. On the individual in Figure 2, the philtral columns appear shorter than those of the individual in Figure 1. They are separated enough to form the philtrum into a wider and somewhat deeper canal than that of the individual in Figure 1. 

Philtral columns

Although they are not marked on the chart in Figure 3–greatcharlie apologizes for that omission, the two columns of the philtrum running from the septum of the nose to the top of the upper lip are called the philtral columns. At the point the philtral columns touch the top of the upper lip–known more precisely as the vermilion border–in Figure 1, two delta shaped points form. Those delta shaped points are not present on the upper lip of the individual in Figure 2. On the individual in Figure 2, the philtral columns contact the upper lip in a way to form a horseshoe or “U” shape. The upper lip, itself–as aforementioned, called the vermillion–forms only moderate curves at the points on which the philtral columns contact it.

Philtral dimple

The philtral dimple, not marked in the chart in Figure 3–again, our apologies–is the gap between the two philtral columns where they contact the upper lip. On the individual in Figure 1, the philtral dimple is pronounced between what are visually two triangle shaped points, both left and right at the base of the philtral columns. On the individual in Figure 2, the philtral dimple is a far less pronounced facial feature.

Nasolabial grooves

The nasolabial grooves on the individual in Figure 1 are very pronounced both right and left. They begin at a point above the wings of the nose appearing to make contact with the dorsum of the nose. The nasolabial grooves on the individual do not contact the wings of the nose. They stretch in near straight lines down and to the left and down and to the right, reaching just outside the edge of the angles of the mouth. The nasolabial grooves on the individual in Figure 2 are not as long as that of the individual in Figure 1. They curve inward and contact the top of the wings of the nose of the individual. Although the nasolabial grooves are not as pronounced on the individual in Figure 2 as those of the individual in Figure 1, where they become more apparent is closer to the wings of the nose. They are somewhat deeper and the skin around them appears thicker than that for Figure 1.

Nasal septum

The nasal septum at the point where it contacts the philtrum on the individual in Figure 1 is thin. The point at which the nasal septum contacts the philtrum On the individual in Figure 2 is somewhat thick. The nasal septum also appears shorter to some degree. The individual in Figure 1 appears clean shaven beneath the nasal septum and over the philtrum to the upper lip. The individual in Figure 2, in all photos available publicly, maintains very slight hair growth, perhaps a deliberate, modest “designer stubble,” beneath the nasal septum, covering the philtrum down to the top of the upper lip and across to the angles of the mouth.

Mentolabial sulcus

On the individual in Figure 1, the mentolabial sulcus, the line or furrow formed between the base of the lower lip and the base of the chin, is prominent. There is an apparent blemish–mole, birthmark, scratch, bruise–beneath the mentolabial sulcus along its right edge, at a point just inside “the line.” The mentolabial sulcus on the individual in Figure 2 is barely perceptible. It has a somewhat curved shape. The chin on the individual in Figure 1 appears somewhat “U” shaped. The chin on the individual in Figure 2 appears more “bow” shaped. The length between the base of the lower lip and the base of the chin is shorter on the individual in Figure 2 than on the individual in Figure 1.

Facial marks

On the individual in Figure 1, there is a mole, birthmark, slight injury (scratch or bruise), beneath the mentolabial sulcus, beneath and just inside the right edge of it, not making contact with the line itself. On the individual in Figure 2, there are no similar marks on the face.

Finally, the most obvious difference between the two men is that one in Figure 1 wears eyeglasses. The individual in Figure 2 does not wear eyeglasses. It is possible, however, that the individual in Figure 2 does wear eyeglasses, but simply removes them when taking photographs.

Additional Observations Concerning Photographs

Signs of Aging

Eheu fugaces labuntur anni. (Alas, the fleeting years slip by.) What might be perceived beyond the physical about how two individuals in the photographs projected themselves at the moment their pictures were taken is that they are respectively professional, intelligent, well-minded, well-dressed, well-groomed, Chinese officials. However, from what information is publicly known, and what one may accept as true about Dong is that he is currently 57 years old, reportedly being born on November 18, 1963, one can attempt to correctly perceive aspects of his physical condition, too! To that extent, one might consider how age might impact the appearance of the real Dong.

There are many who really do not begin showing signs of aging until a bit later than 57. (By no means does one become “past one’s prime” or “over the hill” after reaching age 57!) Yet, there are some fairly common, and commonly understood, changes in appearance that normally occur. As one ages, the appearance of the face and neck typically changes. Loss of muscle tone and thinning skin can often give the face a flabby or drooping appearance. The skin also tends to dry out and the underlying layer of fat shrinks so that your face no longer has a plump, smooth surface. To some extent, wrinkles cannot be avoided. If readers would look back at the two photographs of individuals both identified as Dong in Figures 1 and 2, they will notice that the individual in Figure 2 has a rather plump, smooth surface. There are no wrinkles or furrows visible on the face. There is considerable muscle tone in the face in all three photos of him presented here, most prominently along the jaw. The individual in Figure 1, exhibits the more dried skin that comes with age. The visage of the individual is strong but there is no pronounced muscle tone. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, slight furrows can be discerned on his forehead.)

Sun exposure and cigarette smoking are likely to make them develop more quickly. However, there is no way for greatcharlie to determine whether the individual in the photograph is a heavy smoker or is regularly exposed to the sun. There is no way available for greatcharlie to determine whether these factors relate to the individual in Figure 1 either.

In another sign of aging, the number and size of dark spots on the face increase as well. It was noted earlier that there is a blemish on the right side of the face of the individual in Figure 1. However, there is no available way for greatcharlie to determine when that individual acquired the blemish. There are no discernible spots on the face of the individual in Figure 2.

With aging, the loss of bone mass in the jaw reduces the size of the lower face and makes your forehead, nose, and mouth more pronounced. The nose may lengthen slightly. In both Figures 1 and 2, there is no indication of the loss of bone mass in the jaw. The noses of the individuals in Figures 1 and 2 do not appear to have suffered ill-effects of age such lengthening. In fact, the skin on both noses appears rather smooth and plump.

A common transformation due to aging is for the fat from the eyelids to settle into the eye sockets. This can create the appearance of sunken eyes. make. The lower eyelids can slacken and bags can develop under your eyes. The weakening of the muscle that supports the upper eyelid can make the eyelids droop. This may limit vision. There is nothing to indicate any of these aspects have impacted the appearance of either individual in Figure 1 or 2. As the individual in Figure 1 wears eyeglasses, any effects on his eyes may have been influenced by them. (It must be noted that in another photograph included here below in which the same individual identified as Dong in Figure 1 is seen, it appears that there is a hint of bags under the eyes detectable through his eyeglass lenses.)

A most apparent sign of aging is gray hair on the scalp, and gray hair on the scalp, and on the eyebrows and eyelashes as well. One the individual in Figure A, there is no ability to determine whether he has gray hair in his eyebrows or eyelashes. Except for the hair above his forehead, one cannot see the hair on his scalp to determine if there is gray hair. (It must be noted that in a photograph included here below in which the same individual identified as Dong in Figure 1 is seen, his hair parted on the left side of scalp, revealing what appears to be gray hair.) The individual in Figure 2, on the other hand, clearly has no gray hair in his scalp, eyelashes, or eyebrows. In fact, as aforementioned, there is slight hair growth on his upper lip. It is decidedly black giving him a very youthful appearance. To that extent, the individual in Figure 2 appears to be younger than the individual in Figure 1, and perhaps younger than 57-years-old.

Countenance of the Face

Duriora genti corpora, stricti artus, minax vultus et major animi vigor. (Hardy frames, close-knit limbs, fierce countenances, and a peculiarly vigorous courage, mark the tribe.) In addition the changes in the face that come with aging, one’s work can be manifested in the countenance, too! As explained in greatcharlie’s June 30, 2021 post, the primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide to protect China’s citizens, secrets and technology from foreign spies. Counterintelligence may very well be the greatest manifestation of the paranoia business, but it, as all other elements of the intelligence industry, requires wisdom, reason, and logic to be performed well. If progress through interviews or interrogations of the subject of an investigation indicates that an investigator is on the right track, there will be an attempt to find another door inside to open and pass through in order to get deeper on matters. Such technique is honed and polished over the years. 

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, speaks to this point in The Secret Pilgrim (Alfred L. Knopf, 1990) when his main character, George Smiley a senior and well experienced intelligence officer for The Circus–MI6 in nearly every respect, tells a group of probationary intelligence officers in the fictional foreign IntellIgence training school in Sarratt that he was the one who debriefed his arch rival from Moscow Center, the headquarters of foreign intelligence service of the Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB.  He was known only by the name, Karla, and was captured in Delhi after escaping the US. Explaining to the trainees in general about the nature of interrogations, Smiley says at times they are “communions between damaged souls.” However, when MSS managers have determined the situation demands rough treatment, imaginably compelled by some exigent circumstance, and when the decision will align with the thinking and plans of the Communist Party of China leadership, surely coercive measures will be employed to include forms of torture. That work surely takes its toll, often manifesting its pull on the countenance of those who have engaged in it. The aphorism is quite appropriate here: “L’habit ne fait pas le moine.” Still, perception might lead the reasonable to choose the individual in the photograph of Figure 1 to someone more apparently carrying such a burden based on appearance, and perhaps a bit of intuition. Ut imago est animi voltus sic indices oculi. (The face is a picture of the mind as the eyes are its interpreter.)

An image of Dong Jingwei matching that from the June 16, 2021 Twitter photograph (above). If these popular photographs of Dong in Figures 1 and 2 presented here are actually of two different men so be it. This practice may turn out to be of greater use by China’s intelligence services than anyone outside of the country might have imagined. However, there remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case then in the possible effort to conceal his identity, Dong has done the thing completely.

Concealing an Intelligence Chief’s Identity: Not an Uncommon Practice

The idea of a director, senior executive, or key operations manager of an intelligence service taking steps to conceal his or her identity would not be unique in the annals of secret intelligence. Turning to a handful of examples, in greatcharlie’s November 13, 2019 post entitled, “Book Review: Markus Wolf, Man without a Face: The Autobiography of Communism’s Greatest Spymaster (Times Books, 1997),” it was explained that Markus Wolf, chief of the foreign intelligence service Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), commonly referred to as the HVA of the erstwhile Deutsch Demokratische Republik (German Democratic Republic) or GDR, lived a life in relative obscurity, brilliantly concealing his presence and the footprint of his organization as both operated against the West. His memoir’s title, Man without a Face, was a direct reference to the fact that at one point, Western intelligence services only had a blurred photograph of Wolf while he attended the Nuremberg Trials from which elements within the CIA managed to identify him in 1959. Unable to collect an up-to-date photograph from which to identify Wolf afterward, for a long-time he was referred to among Western intelligence services as the “man without a face.” As the story goes, only after a GDR defector, Werner Stiller, identified Wolf in a photograph in 1979 for the counterintelligence element of West Germany’s Bundesamt für Verfassungsschutz (Office for the Protection of the Constitution) or BfV did that change. The photograph of Wolf was captured by Säpo, Sweden’s National Security Service, during a visit he made with his wife to Stockholm in 1978.

At the time Stephen Dorril wrote his authoritative book, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000), Richard Dearlove, then head of the United Kingdom’s Secret Intelligence Service–colloquially known as M16–was virtually unknown. A contemporary photograph was not published in the newsmedia. According to a BBC report, when Stella Rimington in 1992 was named the first female chief of the United Kingdom’s Security Service–known colloquially as MI5–her neighbors finally discovered what she did. Even her children learned of true occupation for the first time. No official photographs accompanied her name at that time. However, later, official photos of her were provided after photographers managed to take what was described as “a very blurry picture of her out shopping.”

Sidelights

If these popular photographs allegedly of Dong in Figures 1 and 2 here are actually of two different men so be it. It may turn out that using decoys may be a practice in greater use by China’s intelligence services than anyone outside of the country might have imagined. Perchance as a result of the Dong defection matter, it has been brought to light to the world all at once. The sense of security the practice may create perhaps brings comfort to those who would otherwise be under the chronic stress caused by adversaries attempts to surveil and monitor their activities by a variety of means. 

There remains the real possibility that both photographs exist to completely deceive observers, and Dong’s true image is not present in either of them. If that is the case, then in the possible effort to conceal his identity, Dong has done the thing completely. The two photographs focused upon here will continue to be published perhaps until another plausible image, or perchance another two or more, of Dong surface at some time and via some source of Beijing’s choosing.

A quote from Arthur Conan Doyle cited in greatcharlie’s June 30th post on Dong’s rumored defection might be worth repeating here. In “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in Doyle’s The Adventures of Sherlock Holmes published in the Strand Magazine (1891), his main character, Holmes, states: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

The Way Forward

Omne ignotum pro magnifico. (Everything unknown seems magnificent.) Without pretension, greatcharlie states that it does not have any information that would allow it to judge which photograph holds Dong’s true image. As promised, greatcharlie has only sought to parse out a few possibilities here. What is presented are simply perceptions based on observations made of less than a handful of photographs. Certainly in China, there are more than a few people in the MSS, MPS, the State Council, and the Communist Party of China who know exactly what Dong looks like and which of the two photographs, if either, depicts him. It may very well be that the causality for the use of mixed images of Dong is based on an effort to increase security. However, just as greatcharlie, a nonpracticioner, “amateur sleuthhound”–as one reader sardonically  referred to the editor–has examined two reported images of Dong in photographs, Expert, professional analysts in US and other allied intelligence services have doubtlessly examined all of the photographs out there that purportedly include Dong using AI and other advanced technologies, and have reached to their own conclusions. Thus, despite any possible efforts to conceal Dong’s identity, they likely have a fair idea of how Dong looks, too!

As greatcharlie has noted in previous posts, in our ordered universe, it is expected that everything will follow its design. Order in the human mind is established by patterns that one can decipher. With the smattering of facts, evidence, and insights available, one can still postulate, and see if a theory formulated on what the whole Dong episode was all about can be confirmed by facts through investigation. It may not always be a tidy process. Wary of the moves Chinese intelligence can make, some might contend the matter of the varied images of Dong may actually be part of some recherché plan to create greater mystery around his identity. Imaginably, it would be viewed as a subplot hanging from a greater MSS disinformation plot to foster a bizarre defection rumor. On the other hand, some might go as far as to assert a more fanciful theory such as the leadership of MSS, in an effort to impress Communist Party of China leaders ahead of, and during, the Centennial of the Communist Party of China the decided to provide a modest demonstration of the organization’s capabilities. Thus,, MSS may have decided to have a little fun with US counterintelligence services by “just messing with them” as the saying goes, making certain that Party’s leaders were in on the joke. The whole matter has certainly had quite a meretricious effect worldwide. Of course, such a move would hardly be a schema, and perhaps the last thing one should expect from MSS. Still, though it may be improbable, it is all the same conceivable. One can be assured that similar overimaginative assessments, judgments concerning the Dong defection episode will continue to be made and published primarily online. Their creation will be driven by the fact that for inquiring minds, the curious, the enthusiasts demand more answers on the matter. In Areopagitica (1644), the great 17th century English poet and intellectual, John Milton, explains: “Where there is much desire to learn, there of necessity will be much arguing, much writing, for opinion in good men is but knowledge in the making.”

Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts

The People’s Republic of China Consulate in San Francisco (above). The Consulate has been a bit troublesome. On occasion, it has been linked to suspected Chinese espionage efforts on the West Coast. However, Chinese intelligence operations in the region, which holds world-leading science and tech firms, have more often been tied to state-owned businesses, private firms, academic institutions, or research institutes than the Consulate. In a January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence. In Chapter Six, Olson lists 10 “benefits of a counterintelligence operation” and explains how to reap them. In this essay, greatcharlie presents some suggestions on how Olson’s precepts might be applied to help defeat Chinese espionage efforts throughout the US.

In its January 31, 2021 post, greatcharlie reviewed James Olson’s To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019. In Chapter Six “Double-Agent Operations,” Chapter Seven, “Managing Double-Agent Operations,” and Chapter Eight “Counterintelligence Case Studies,” in particular, Olson provides a generous amount of information on how counterintelligence operations have been conducted by US counterintelligence services. Readers are also favored with many of the logical principles that Olson would practice and expound during training during his service in the Central Intelligence Agency (CIA) counterintelligence. Included among what he presents is a list of benefits US counterintelligence seeks to gain from a double-agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Many of the tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination and creativity. One discovers how double-agents were dangled to garner interest from adversarial intelligence services, false information spiked with just enough truths, “chicken feed,” was transmitted, and nuanced communications between the double-agent and his handler were managed. In 12 case studies, Olson finally presents a classical series of demonstrations along with lessons learned. He tells it all in an apposite way. Virum mihi, Camena, insece versutum. (Tell me, O Muse,of the skillfully man.)

In fairness, Olson’s work should not be judged in terms of his reaction to the prevailing national security crisis at the time of this writing: Chinese intelligence penetration into the foundations of US power. A criminal strain is observed running through the thinking of the Communist Party of China as it dispatches Chinese foreign intelligence services to steal volumes, tons of information from the most secure locations in the US. Perhaps what the future may hold is made darker by the fact that among its central members, are individuals of immense intellect, making them a far more dangerous threat to US interests. In greatcharlie’s view, there is much that can be extracted from To Catch a Spy that might constructively provide some suggestions on how to address this crisis. With the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. That does not imply that a bias colors its discussion. No information is skewed or bent with preconceived ideas. What it does mean is that readers will likely discern facts are interpreted from that perspective.

In Chapter Six of To Catch a Spy, Olson lists the 10 “benefits of a counterintelligence operation” related in particular to double-agent operations and explains, in brief, how to reap them. In this essay, greatcharlie may albeit step out on shaky ground to present some discreet suggestions on how 9 of Olson’s 10 precepts might be applied in efforts to defeat Chinese espionage activities in the US. The suggestions are the result of some creative thinking on what if anything new might be said on the matter. In the essay’s discussion, greatcharlie hopes to avoid any appearance of instructing counterintelligence officers on what to do. Rather, the only desire is to offer all readers its suggestions, leaving it up to those in US counterintelligence to observe, reflect, and act as they may. It would be satisfying enough to know that some of what is presented here might  resonate with a few of them. It is presumed by greatcharlie that Olson’s precepts harmonize to a great degree with those that currently guide US counterintelligence officers in active service and thereby anything resulting from them would not be deemed too fanciful or even recherché. Applying Olson’s precepts to developments on the Chinese intelligence front in greatcharlie’s would have been beyond its scope of its preceding review of To Catch a Spy –although some readers noting the review’s length might sardonically query why there might be any concern over a few thousand words extra. In response to such concerns, greatcharlie has attempted to apply Olson’s teachings to the discussion here without making it an exercise in “large data processing.” It should also be noted that from the corpus of work on Chinese intelligence, a great influence upon greatcharlie are the writings of Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019), a book which is nothing less than brilliant.

Additionally, upon consideration of what it could offer to support the development of more effective approaches to defeat Chinese human intelligence and electronic intelligence collection activities against the US, greatcharlie bore in mind that it would need to be somewhat Delphic in its discussion. Therefore, what is offered are fragments of ideas with the aim of leaving a figurative trail of breadcrumbs that  a few officers in the US counterintelligence services might pick up. Hopefully, after testing their virtue, they will find something useful. Given this approach, greatcharlie apologies in advance to other readers who may find the discussion somewhat cryptic or a bit “undercooked” at places. De minimis grandis fit magnus acervus. (From the smallest grains comes a big heap.)

Chinese Foreign Intelligence Versus US Counterintelligence

Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know. At the top, senior executives and managers must account for the failing of their respective US counterintelligence services. Imaginably, they resent the deficiency. Surely, they are feeling terribly unsettled by regular reports of so much being blown, so much intellectual property and classified material being lost. They have certainly had a bellyful of the failure rate against the Chinese intelligence networks. There has been so much scandal–or at least what should be scandal–with US political leaders becoming entangled with Chinese intelligence operatives, from interns, drivers, fundraisers, to “camp followers.” Expectantly, senior executives and managers should be wondering whether the rank and file of US counterintelligence has gone on hiatus. To use contemporary sports vernacular in the US, US counterintelligence services “have not shown up” in the struggle with China. They may also be wondering, given the array of tools and considerable resources available to them, whether the rank and file, led by squad, shop, or unit supervisors and commanders, have told them the whole story. Perhaps harshly, they would question whether the rank and file were organizing valid plans or going off on profitless “school boy larks,” not remotely sufficient to defeat a most cunning opponent. Against the Chinese style intelligence operations, it may very well be the case that the ordinary principles of trade craft and security have gone to the wall. French Emperor Napoleon Bonaparte is quoted as saying: “You must not fight too often with one enemy, or you will teach him all your art of war.” Directors and commanding officers of US counterintelligence services can only come to the US Congress for hearings on oversight and appropriations seeking sympathy not approval or report any real success.

Perchance little has really been provided in any official assessments of why US counterintelligence efforts have been so unsuccessful. Perhaps senior executives are not asking the right questions or any questions. When one is overmatched, one will usually lose. Some enhanced intelligibility in the discussion of what has been occurring would help to bring at least the US public around to a better understanding of what where things stand and the prospects for success. Without that, policy analysts and other observers are left to presume that the Chinese are that much better. Indeed, as of this writing, the suggestion that has frequently been voiced in certain quarters concerned with the crisis, and has even spilled out into the newsmedia, is that the professional, diligent officers of the US counterintelligence services–and sadly those qualities cannot be ascribed to the entire group–are simply unable to get a handle on the Chinese threat. That suggests there has been a complete eclipse of their faculties. However, that should not be taken as the gospel truth. Surely, the men and women of the US counterintelligence services, correctly focused, will be able to gain and retain the initiative and start pulling apart Chinese intelligence networks. The renowned US industrialist Henry Ford once remarked: “Failure is simply the opportunity to begin again, this time more intelligently.” The US counterintelligence services maintain their vigil.

Olson’s Precepts from To Catch a Spy

On “Spreading disinformation”

Olson begins his veritable “mini manual” by explaining double-agents can be used to provide the opposition service with false or misleading disinformation, but this a relatively infrequent objective. Deceiving the enemy in this manner requires tremendous planning and subtlety because adversarial foreign intelligence services are not easily deceived. Very often they possess the means to verify the provenance of the double-agent’s reporting. Moreover, if the double-agent reports that some action will take place in the future and it does not, the double-agent’s credibility is seriously undermined. According to Olson the use of disinformation in a double-agent operation would only make sense when the stakes are unusually high or the opposition has limited means of verification.

With reference to “Determining the other side’s modus operandi”

Olson explains that a double-agent is in a perfect position to report back on the opposition’s modus operandi. For any counterintelligence officer responsible for monitoring and thwarting hostile services operations, it is invaluable to know how the service conducts its business. Olson recalls that when he was tasked with developing counterintelligence programs at CIA field stations, the first thing he did was review all of the double-agent operations that any US government agency had run in that location. What he wanted to learn was how the target services operated. Among the questions that he would ask were the following: “Did they meet their agents in safe houses, cafes, parks, vehicles, or some other location? What time of day did they prefer for agent meetings? Were there sections of the city they overused? Did they incorporate initial contact points into their modus operandi, and if so, what kind? What kind of equipment and training did they provide for their agents? Did they use electronic communications of any kind? Where were their dead drops and what did their concealment devices look like? What type of signal device did they prefer?”

Olson remarks that It was especially helpful to have double-agent history in the same city that you are operating, but there was value in reviewing any foibles of double-agent operations run by the target service anywhere. As Olson explains, the case officers of the service have all had the same training and follow the same operational doctrine. They tend to fall into habits and use operational techniques that have worked for them elsewhere. The result can be predictability–a major vulnerability in spying that can and should be exploited by the opposition’s counterintelligence. 

Concerning “Identifying hostile intelligence officers”

Foreign intelligence services take great pains to hide their case officers under a variety of covers according to Olson. They can pose as diplomats, trade officials, journalists, students, businessmen or businesswomen, airline representatives, employees of international organizations, and practically any other profession that gives them an ostensible reason for being in the country. US counterintelligence is tasked with piercing those covers and identifying the spies. One of the best tools available for this task is the double-agent.

In some cases the handling officer is the recruiting officer. If the recruiting officer first met our double-agent dangle when he was providing the dotting and assessing venues in true name, then the double-agent can provide a positive identification from the beginning. As standard practice, however, the case officer will use an alias in meeting with the double-agent. The double-agent can still provide a detailed description of his or her handler and can often make an identification through a photo spread. Also, since counterintelligence service running the double-agent operation knows when and where the case officer will show up, for example to meet to meet the double agent, to service a dead drop, or to mark a signal, it has technical options to assist in identification. The case officer usually comes from a known pool of officials from the local embassy, consulate, the UN, a trade mission, or some other official installation. Olson claims that it never takes long “to make” who the handler is.

Double-agent operations that go on for an extended period, as many of them do, Olson explains that they will lead usually to additional identifications of hostile intelligence personnel. Case officers rotate regularly to other assignments, and their agents doubled or otherwise, are turned over to a new case officer for handling. Other case officers are sometimes introduced into the operation as a back-up or as a subject expert. The primary case officer may handle the day-to-day operational aspects of the operation but may not have the in-depth knowledge required to debrief the double-agent effectively on a highly technical subject. Olson says it is not uncommon in these cases for intelligence services to insert a more knowledgeable debriefer into an operation from time to time. He continues by explaining that If the primary case officer may not be able to get a surveillance break to pick up a dead drop, for example, or may not have cover to mark or read a given signal. In that event a colleague from the residency is called on to help out–and can be identified by employed cameras or other surveillance techniques nearby. Olson states that in some long term double-agent  operations, as many as twenty or thirty opposition case officers and support personnel have been exposed in this manner.

Olson warns that things get funny when the handling or servicing officer if a double-agent operation is an illegal or nonofficial cover officer (NOC). Case officers in these categories face arrest or imprisonment if caught. For that reason, illegals or NOCs are used carefully and as a rule only handle or support a case in which the bona fides of the operation are considered airtight.

With respect to “Learning the opposition’s intelligence collection requirements”

In what Olson calls “the cat-and-mouse game” of counterintelligence, even the slightest advantage can be the difference between winning and losing. A good double-agent operation can provide a winning edge by alerting the sponsoring service to the opposition’s collection requirements. Knowing what the double-agent is being asked to provide the handler is a valuable window into what the opposition’s priorities and gaps are. A question posed would be “How much pressure is being put on the double-agent to collect intelligence in a certain area?” He says that the range of tasking is limited, of course, to what the double-agent professes his access to be,  but a good double-agent might hint at the possibility if expanded access to smoke out the opposition’s response. For example, a high technology double-agent might tell his handler that his future duties might include research in high technology devices. Olson says the question then would be: “Does the opposition service respond either alacrity or lassitude?” According to Olson, the latter reaction could indicate that this requirement is being covered by another agent.

Olson demonstrates another ploy that can be used to learn the adversary’s collection priorities which was to have a military double-agent, for example, announce to his handler that he is up for reassignment and is about to put in his wish list for a new posting. Olson says the double-agent would be prompted to ask his handler: “Where would the service like him to go?  Where does the service not want him to go? For what kind of bullet should he be applying?” Olson explains that how the handler responds can indicate the services collection priorities and gaps in locations where it thinks it can handle the double agent safely.

Olson further explains that intelligence services do not task their agents haphazardly. The requirements are generated by a systematic process that includes input from all the interested parties. In the US, for example, requirements for the intelligence community result from an elaborate consultation and give and take managed by the Office of the Director of National Intelligence. The process is far from casual. Any intelligence service can learn a lot by analyzing the requirements given to its double agents. There is significant meaning in what the opposition service is asking for and what it is not.

Regarding “Acquiring positive intelligence”

Olson reveals that occasionally, a foreign intelligence service so believes in the trustworthiness of a double agent that it shares with that double-agent positive intelligence information. The purpose may be to give the founder agent background information to assist in his or her collection efforts. Another reason for doing so might be that the case officer-double-agent relationship may become so critical that the case officer assumes the double-agents ironclad loyalty and “talks out of school.” Olson also says a case officer may try to enhance his or her standing with the double-agent by boasting about past or current accomplishments.

With reference to “Tying up the opposition’s operations”

Every minute an opposition case officer spends on a double-agent, proffers Olson, is a wasted minute. The handlers time is wasted. Also tied up in the operation for no productive purpose are technical teams, linguists, surveillance, and analysts. Olson goes on to note that It is perhaps a perverse but still undeniable pleasure for a US counterintelligence officer to sit back to survey his or her double-agent operations and to gloat about owning a big chunk of that adversary’s time and energy. Every useless thing that a foreign intelligence service does in handling one of our double agent operations leaves less time for it to hurt us with real operations. In the great game of counterintelligence, these are gratifying victories.

As to “Taking the oppositions money”

Foreign intelligence services vary tremendously in how much they pay their agents, but Olson admits that with the right kind of material, a good double-agent can command big money. He explains that the willingness of an adversarial service to pay our double-agents large amounts of money is a good indicator of how deeply we have set the hook. 

About “Discrediting the opposition”

Commenting generally, Olson says intelligence services hate to lose face. Enough of them around the world have acquired such bad reputations for violating human rights, torture, other violent acts, and murder, that there is not too much for the many to lose in terms of good standing. They want to project to the world an image of competence, professionalism, toughness and discipline. Olson explains that any publicity that highlights their failures can undermine their support from their government and demoralize their troops. He notes that in closed societies like the Soviet Union, East Germany, China, and Cuba, intelligence services were hardly accountable to the press and public as those of Western democratic societies. However, he maintains that they still did everything they could to protect their reputations. Olson says that the same is true today of our major counterintelligence adversaries.

The US is reluctant to publicize expired double-agent operations out of fear of revealing sensitive methodology or subjecting the American principal of notoriety. In selected cases, Olson states that he would like to see US counterintelligence be more proactive in capitalizing on the other side’s failures. He believes that by doing so the US can make them gun shy about engaging in future operations against its citizens. He asserts that the US could publicize how they fell into our trap and how much they gave away to us in the process. He suggests that once they are lured into operating inside the US, counterintelligence services can do a splashy expulsion of case officers who have diplomatic immunity and arrest those who do not. As a benefit, Olson suggests the hostile service looks bad for letting itself be duped by our double-agent operation, and should pay a price for it. It loses some of its operational staff, its reputation for professionalism suffers. He feels that no mistake by the opposition should go unexploited. 

The People’s Republic of China Minister of State Security, Chen Wenqing (above). Resolving the problem of halting the torrent of successful Chinese intelligence operations against targets inside the US has hardly provided mental exaltation for the rank and file in US counterintelligence services operating in the field. US counterintelligence has lived with failure too long. Surely, a great cloud has covered any happiness of their work. The inability to put an appreciable dent in Chinese efforts has likely had some measurable impact on the morale of earnest US counterintelligence officers. Indeed, the abstruse puzzle that Chinese intelligence operations pose has most likely been an anxiety generating challenge that has pressed those given to believe it is their purview to know things others cannot know.

Suggestions Drawn from Olson’s Precepts

Do Not Fume, Think!

In Greek Mythology, there was Até, an unpredictable figure, not necessarily personified, yet represented rash, chaotic, ruinous responses by both gods and men to a situation. She was famously mentioned in Act 3, Scene 1 of  William Shakespeare’s play The Tragedy of Julius Caesar, when Mark Antony addresses the body of Caesar and predicts civil war: “And Caesar’s spirit ranging for revenge,/ With Até by his side, come hot from hell,/ Shall in these confines, with a monarch’s voice,/ Cry havoc, and let slip the dogs of war.” Até has been described as a chain reaction, a mechanism in which evil succeeds evil. In finding a handle to the current espionage crisis with China, it is not a time for a “gloves off” attitude. Minds should be directed toward getting at the opponent to send a message, to bully or even to overwhelm, The requirement in this situation is subtlety, nuance, thinking, not any heavy-handed business. If any US counterintelligence officer involved cannot sustain that, he or she is working the wrong target. Informed by experience, greatcharlie is aware that it is a predilection among not all young special agents in a particular US counterintelligence service, but some, to be frightfully eager to prove something to their cohorts and to themselves. Ira furor brevis est; animum rege. (Anger is a brief madness; govern your soul (control your emotions)).

Practicing what is compulsory for all investigations in the Chinese crisis is sine qua non. However, if one’s thinking is not yielding satisfactory outcomes, then one must focus upon how and what one thinks. A corrective step must be to concentrate to enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. It is one thing to supposedly see everything–certainly the tools available to US counterintelligence services allow them to see an extraordinary amount of things, but another thing to properly reason from what one sees. US counterintelligence officers must think harder and conceptualize better. They must ruminate on events in relation to those that proceed them and meditate on what the future may bring. They must practice forecasting decisions by their adversary that may shape what might come and then proof their efforts by watching events unfold in reports. 

The question that must beat the brain of every US counterintelligence officer working on the matter is most likely: “Where will they strike next?” As a practical suggestion, the focus of many investigations–if not all investigations–of Chinese intelligence networks send operations might be placed on two points: those controlling networks and running operations in the field; and the composition of operations in the field.

Know Who Controls the Chinese Intelligence Networks

As it was discussed in the July 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” personnel of the Ministry of State Security (MSS), the civilian foreign intelligence service of China, are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, MSS officers are accommodated by the embassy. In the US, there are seven permanent Chinese diplomatic missions staffed with intelligence personnel. MSS personnel are usually assigned overseas for up to six years, with a few remaining in post for ten years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is near certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army (PLA) and Communist Party of China intelligence units are operating without official cover throughout the West. (Note: The four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders are the United Front Work Department, the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.) Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations. They are known to often operate out of front companies created solely for intelligence missions or out of “friendly” companies overseas run by Chinese nationals, “cut outs“, who are willing to be more heavily involved with the work of MSS and other Chinese intelligence services than most Chinese citizens would ever want to be. This approach may be a residual effect of pollination with Soviet intelligence in the past. 

There is a common misunderstanding about the Soviet KGB Rezidentura. While it is generally believed that all intelligence activity by KGB in another country was centralized through the Rezidentura in the embassy or consulate, under a Rezident with an official cover, as fully explained by former KGB Major General Oleg Kalugin in his memoir, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994), there were also nonofficial Rezidenturas that operated away from Soviet diplomatic centers. Those nonofficial Rezidenturas had their own Rezident or chief of station, chain of command, missions, and lines of communication to Moscow. One might suppose that when the relationship during the Cold War was still congenial, had doubtlessly demonstrated to the Chinese, the benefits of operating two types of Rezidentura overseas, official and nonofficial. In a July 9, 2017 National Review article entitled “Everything We Know about China’s Secretive State Security Bureau”, Mattis explains that the MSS’ thirty-one major provincial and municipal sub-elements of MSS more than likely possess most of the officers, operatives, and informants and conduct the lion’s share of the operations. For some time, those provincial and municipal sub-elements performed mostly surveillance and domestic intelligence work. These provincial and municipal state security departments and bureaus By the time of Mattis’ writing, they had become small-sized foreign intelligence services. They were given considerable leeway to pursue sources. In Mattis’ view, that independence accounted for variation across the MSS in terms of the quality of individual intelligence officers and operations. At the present, the provincial and municipal state security departments and bureaus may be operating entire networks of their own in the US with appropriate guidance from MSS Headquarters and the Communist Party of China.

There are likely many unexplored possibilities that perhaps should be considered about the managers of Chinese intelligence networks in the US. Anything that can be gathered or inferred about the individuality of such a person must be put forth for study. A constant effort must be made to understand what makes the network manager tick. Using some of what is publicly known about how Chinese intelligence services have been operating in the US from a variety of sources, to include US Department of Justice indictments and criminal complaints, one might conceptualize traits that could be ascribed to those managers possibly on the ground in the US, controlling operations day-to-day, are: energy, enthusiasm, and creativity. Among their traits, one might expect that they would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. That energy is transmitted to US citizens and Chinese émigrés being recruited to serve the purposes of their intelligence services and, of course, the Communist Party of China. There would very likely be the hope among Chinese intelligence services and the Communist Party of China that following the detection of each of their victories by US counterintelligence services there is an opposite effect upon the officers of those organizations. Chinese intelligence services would surely hope that a sense of defeat reaches deep into the psyche of US counterintelligence services rank and file and firmly sets within them a sense of disponding woe, sorrow, and discouragement. They doubtlessly want them to feel gutted.

The managers controlling operations of Chinese foreign intelligence networks in the US have undoubtedly been selected due to their proven mental alertness, quick thinking, adaptability, and curiosity. They surely have the right stuff to be open-minded and imaginative, within authorized parameters, and are willing to adapt. Surprisingly given the iron-grip culture among managers and executives in Beijing, these “field managers” have apparently been given some leeway to use their initiative to achieve progress. It likely accounts for how the Chinese are able to react quickly to any changing circumstances. To an extent, it may also explain why Chinese intelligence services may appear to some to be so disdainful of any danger that US counterintelligence efforts might pose to their operations despite knowing that they are actively being pursued by them by the hour. To be on top of everything, the network managers are likely sharp as a tack and no doubt endlessly study what is known by Chinese intelligence about US counterintelligence tactics, techniques, procedures, and methods, concepts and intent, and the latest counterintelligence tools US counterintelligence has fielded. Among such individuals, a solid foundation of information likely allows for the development of viable inferences and strong insights which in turn allows for confidence in using their intuition on what may come or what is coming their way. These network leaders are also likely able to identify any “bad habits” that may have ever brought US counterintelligence services too close for comfort. 

There remains the possibility that the network manager may not even be located in the US. Still, someone must be present on the ground in the US, to relay, with authority, directions from the manager and respond to inquiries and urgent matters from those operating in the field. It could be the case that they maintain modest lodgings not only to reduce costs and keep a low-profile in general. However, the presumption of a low-profile manager could also be entirely incorrect. It may very well be that they are individuals who have achieved considerable success and prominence in areas such as business and finance. As such, they, as a professional requirement, would both have access to and daily accumulate knowledge far beyond average boundaries of the latest events in industry and government. They would know what is important and urgent, what is moving things forward, what is the next big thing, who and where are the individuals influencing events and how to make contact with them and get connected to all of it. In their fields, they may be among the most capable at doing that and may have the recognition, awards, and the financial benefits that would confirm it. It would appear that they avoid engaging in any surreptitious or malign efforts in their own companies or in their own fields. However, it is still a possibility.

Such prospective network managers would very likely be untainted by any apparent or questionable affiliation with Chinese universities, the PLA, and the Communist Party of China. (That does not mean family members who may reside in China would not be thoroughly connected to such organizations.) If the individuals have family ties back to China, there would be nothing apparent about them that would make them suspicious. They would likely have no overseas travel or contacts that would create suspicion. Doubtlessly, an endless list of notables from their fields might be prepared to vouch for them. All the while, though, they would be managing intelligence operations of their networks in an exquisite fashion, and feeding back information to China vital to US national security and the key to helping US businesses maintain their competitive edge against foreign rivals. (If the manager is situated in the US, oddly enough, there may actually be a number of creative ways to draw out such senior managers of field operations. As aforementioned, greatcharlie will never offer any insights even from its position outside the bureaucracy that it believed might result in any negative outcomes for the US as it seeks to resolve the China crisis. That being stated, as stated in the December 13, 2020 greatcharlie post entitled, “Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago,” if one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. Not one case has been a “wilderness of mirrors.”)

Perchance those of a younger generation would say that Chinese intelligence network managers in the US, as described here, as being  “woke,” or as the Germans would say, “wach,” both words roughly refer to them as being awake. In greatcharlie’s view, spying on the US is not woke. Nonetheless, everyday, the network managers place their keen eyes on the world around them and have a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

Perhaps reading this, one might get the impression that greatcharlie was attempting to convince readers that Jupiter himself was running the Chinese intelligence networks. That is surely not the case. However, it must be recognized that the sort controlling those networks are likely of a very special nature. Surely, with regard to politics which is all so important in the regime of the Communist Party of China, one would expect that network managers deployed against the US, despite not having much physical contact with anyone in Beijing, would be the fair-haired boys or gals among one or more of the senior executives in MSS or even a senior leader of the Party, itself. 

Whatever any US counterintelligence service may attempt to do in an effort to break Chinese intelligence operations, its officers must be mindful that this may likely be the sort of individual they are seeking to maneuver against. Without the ability to get up close to these managers, it might be enough to conceptualize them, given the pattern of activity and interrogations of intercepted officers, operatives, and informants and reinterviewing the handful of “recent” defectors in US hands. (It is wholly plausible that the officers, operatives, and informants working in the US have never seen and do not know the identity of their network manager on the ground. They may only recognize the individual by code via orders, rectifications, responses to inquiries and requests, and inspirational messages.) If the abstract entity, de créature imaginaire, constructed here is, by coincidence, correct in every particular, there may be the rudiments to get started on trying to “steal a march” on perhaps a few of the Chinese intelligence network managers. Shaping one’s thinking against thinking and conceptualized tratits of de créature imaginaire, may be enough to open new doors. Perhaps in time, such in-depth study of these aspects will allow informed counterintelligence officers to develop true intimations, not valueless surmisals or absurd speculation, of what may be occurring and what is about to occur. In “A Story of Great Love,” published in the Winter 2011 edition of the Paris Review, Clarice Lispector writes a sentence that is amusing yet conceptually germane to what is discussed here: “Once upon a time there was a girl who spent so much time looking at her hens that she came to understand their souls and their desires intimately.”

The People’s Republic of China Consulate in Houston (above). From this now closed building, China directed government, economic, and cultural activity across the southern US. Ministry of State Security (MSS) personnel are usually assigned overseas for up to six years, with a few remaining in post for 10 years if required. In most countries, the local MSS officers are accommodated by the embassy. Having stated that, it is certain that presently far greater numbers of MSS officers as well as officers from the People’s Liberation Army and Communist Party of China intelligence units are operating without official cover throughout the West. Instead of embassies and consulates, they operate out of nongovernmental, decentralized stations.

Discover the Composition of Network Operations

One might suppose the Chinese intelligence networks in the US, as a primary purpose, unlikely conduct operations in which they blithely seek out new targets day-after-day, although there are perhaps some operations underway that serve to monitor individuals in positions that might be interest and sites of information of interest with the guidance of MSS headquarters, provincial bureaus and municipal departments based on available intelligence. The settled, more fruitful networks that have nettled US counterintelligence services the most are likely set up to run operations on targets of a certain type, rich with prospects at locations in  which Chinese intelligence operatives and informants are well ensconced. One could reasonably expect that there will be a commonality in location for both predator and prey. (Although, nothing can really be certain for espionage is a deke business.) The Chinese intelligence operation will be set up in proximity of a figurative “happy hunting ground,” a high-tech firm, laboratory, academia, political network, foreign, national security, economic, trade policymaking office, agribusiness, and aviation, and energy business to list only a handful. In addition to propinquity, there will be a common functionality of any Chinese owned business that may establish themselves in the hunting ground, and very apparent efforts to create employee links by them with their likely targets. 

Control remains essential in the authoritarian (totalitarian) regime of the Communist Party of China and therefore there is a certain specificity intrinsic to every operation–despite nuance in design, methods, and other imaginative approaches attendant–that will presumably allow for monitoring, oversight, and audits. If it ever was detected that an odd Chinese intelligence network was skillfully mixing tactics, techniques, procedures, and methods in operations conducted following an aggregate rollup of known Chinese intelligence efforts in the US, it is unlikely that particular network’s approach, while perhaps creative to the extent possible, will never stray too far from any observances that would be laid down by their respective Chinese intelligence services. If the tactics, techniques, procedures, and methods used by Chinese intelligence networks are really so similar, one could say their operations will likely have a common “DNA.” The adversary’s known practices are undoubtedly cataloged by US counterintelligence services. It will be necessary to more closely study the common functionality of networks and operations. As much information on their operations must be collected as possible. Study what has been learned by allies. Identify common vulnerabilities in every network. Identify, study, and exploit their deficiencies.

As much of what the networks Chinese intelligence services are exactly doing day-to-day in the US remains unknown publicly at least, it is impossible to say with certainty how the COVID-19 pandemic has impacted their operations. One can imagine there has been some impact. Nevertheless, given that reality, in considering how COVID-19 factors into their efforts, one must again enter the world of supposition in which one analysis of how those networks are not only operating, but more specifically, how managers of those networks are communicating with Beijing and with their officers, operatives, and informants, can be just as good as another.

Even before COVID-19 hit, for Chinese intelligence networks on the ground in the US, managing communications in any direction was imaginably no mean feat. As it was discussed in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).” Perhaps, the main lesson for Chinese intelligence services was that it was not safe to continue creating and maintaining secret communications or reports, any truly important documents, electronically. It was the same as leaving an open door to foreign intelligence service penetration. The transition back to paper would be the best answer and easy enough. Indeed, the use of hard documents and files was what the most seasoned foreign intelligence and counterintelligence officers were most familiar with using. Moreover, they are very likely individuals of conservative habits, and never became so familiar with computer work as their younger counterparts. The return to paper files would certainly lead to the collection of what would now be thought of as considerable amounts of documents. File rooms and vaults have very likely been rebuilt or returned to service. Urgent issues concerning diplomatic matters were likely communicated via encrypted transmissions. There was very likely a sharp increase in transmissions once the consulate received notice that it was being forced to close. Use of that medium would provide some reasonable assurance that content of the communication would be protected. Nothing of any real importance was likely communicated by telephone given that the US would surely successfully eavesdrop on the conversation. 

One might venture to say that a likely move to hard documents may have been evinced when the world observed presumably Ministry of Foreign Affairs security officers and MSS intelligence officers using fire bins to burn bundles of documents inside the compound of the People’s Republic of China Consulate in Houston, Texas as it prepared to close. It might be the case that burning the documents is standard operating procedure for Chinese diplomatic outposts in such instances as an evacuation. MSS counterintelligence would hardly think that US intelligence and counterintelligence services would pass up the fortuitous opportunity to search through or even keep some or all of the documents consulate personnel might try to ship or mail to China while evacuating the building, even if containers of documents were sent as diplomatic pouches.

From what is publicly known, it appears that Chinese intelligence networks do not recruit after simply spotting a potential operative or informant. If that were the case, the success rate of US counterintelligence services against them would be far higher given the opportunities such activities would present and given the experience of their organizations in dealing with such a basic set up. Chinese intelligence services clearly work wholly on their own terms, investigating only those “targets” who they choose to investigate, essentially ignoring anyone that may have the slightest appearance of being dangled before them. It is a benefit for them to operate in what could be called a target rich environment in the US. Recruitment is “by invitation only.” If one is not on the figurative guest list, one does not get in! As part of their investigations of targets for recruitment, doubtlessly it is important to identify the psychological profile of a person, his political orientation, his attitude towards his motherland, China or towards the US, where he or she has become a citizen or visiting for school or long-term employment. And then, after accumulating a sizable amount of material (based on a whole array of undertakings: plain observation, audio- and video-surveillance of the places of residence, agency-level scrutiny, including “honey traps”), on the basis of the analysis, a decision is made about a transforming the investigation into a recruitment with appropriate conditions (such as through compromising materials or a voluntary agreement) or about wrapping up the whole matter by “educating” a foreigner, conveying a favorable message on China and the wave of the future, Chairman Mao Zedong’s vision of Communism.

After studying what is being specifically done by a network long enough, one will begin to see dimly what a network or specific operation is driving at. After finding a few missing links, an entirely connected case will not always, but can be obtained. Once a clear picture emerges, one can start developing attack vectors against Chinese intelligence networks with a forecast of nearly assured fruits. Lately, the identification and aim at any networks has clearly been far less than accurate. Do not use individuals lacking good judgment and sanguine required based on one’s own standard. Create the best team possible. Know your people well. Keep a close eye on neophytes. (As touched on in the discussion of Olson’s “Ten Commandments of Counterintelligence” of Chapter Four in greatcharlie’s review of To Catch a Spy, a supposition verging on the ridiculous must be seen as such by a supervisor and appropriately knocked down. A keen interest must be kept on how subordinates, especially novices, are reasoning with facts. A supposition verging on the ridiculous might involve imputing criminal motive or involvement on a party that could not have been part of a criminal conspiracy or ascribing characteristics to an individual who could not possibly possess them or has not displayed them. A good case could be blighted by such wrongheadedness.)

Gnawing a bit further at the matter of using young, novice counterintelligence officers on such delicate cases concerning Chinese intelligence, one should avoid the pitfall of allowing them to manage surveillance work for a case and turn it into something that might more reflect the work of a security service in a totalitarian country to soothe their egos. Be mindful of the use of time, energy, and budget by them such as placing heavy, wasteful surveillance on the street not to advance the casework but to prove some immature point of power. Casting some wide net will bring in nothing but a lot of extra things that time, energy and money cannot be wasted upon. Differ nothing to their judgment. Every mistake or misstep made by US counterintelligence, whether the result of a manager’s use of some clever misdirection or whether self-inflicted, represents a success for a Chinese intelligence network manager. Keep firmly in mind the managers of Chinese intelligence networks are flexible enough in their thinking that they appear to be able to change horses in midstream while maintaining the metaphoric helm on a steady heading so to speak. 

Concerning contractors, by their nature, they are owned and managed by businessmen out to make money as priority. That focus among many of them can be boiled down to the  precept, “minimum effort, maximum gain” and that can be most apparent in how they conduct their so-called operations on the street. As already alluded to here, their “operatives,” often poorly vetted before being “hired,” many times find it difficult in the field, physically surveilling a target or trying to open a clandestine conversation, to be their higher selves. They are often too aggressive, even ruthless, and engage in what could politely be called “aberrant behavior.” Strangely enough, for many contractors, the reality that their operatives display these characteristics is a point of pride.. As it was discussed in greatcharlie’s January 31, 2020 review of To Catch a Spy, the negative behavior of contractors witnessed in the field by an adversarial intelligence service’s officers, operatives, and informants could very likely have an impact on their impressions of US counterintelligence services beyond what has already been inculcated within them by their masters. It should be expected that any negative impressions could have the deleterious effect of negatively impacting a decision to defect or be recruited if the idea might ever cross their minds. It is impossible to calculate, but it surely can be imagined that a number of potential defectors and recruits may have been deterred from taking the first step over this very issue. Recognizably, there is a reduced ability to effectively oversee what contractors are doing at all times on behalf of US counterintelligence services. At best, the managers of a particular counterintelligence operation that they may be hired to support will only know what the contractors divulge about their efforts. Close observance of them in operation, done furtively by managers of US counterintelligence services, would doubtlessly substantiate this.

Those in US counterintelligence services considering what is noted here might cast their minds back to the observation of the renowned 17th century French philosopher Blaise Pascal in Pensées (1670): “Justice without power is inefficient; power without justice is tyranny. Justice without power is opposed, because there are always wicked men. Power without justice is soon questioned. Justice and power must therefore be brought together, so that whatever is just may be powerful, and whatever is powerful may be just.”

Surely at one time the relationship between contractors and US counterintelligence services was quite beneficial as they provided real assistance through manpower and talent, but again, the situation has since changed considerably. They are shadows of what they once were in terms of quality.  Beyond some possible invaluable assistance they may be providing through precious outside of the bureaucracy analysis and advice on Chinese intelligence activities in the US, in the China case, US counterintelligence services should severely minimize or eliminate contractors if possible. There may be a place for such contractors and their ways in counternarcotics, organized crime control, human-trafficking or some other kind of criminal investigations. However, up against the sophisticated intelligence services of a determined adversary as China, those contractors are not a credit to US counterintelligence services. They are nothing but a liability. The China case is too important to indulge in any uncertainties. On an additional point, technical intelligence tools must be utilized effectively and appropriately. Monitor only those who need to be monitored. Resist the urge to play George Orwell’s “Big Brother.” That urge is another weakness. Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.)

The continued success Chinese intelligence services and counterintelligence services in being able to conceal their massive espionage efforts may suggest that conceptually, they may approach establishing their presence in the US with the thought of “peacefully coexisting” in the same environment as US counterintelligence services. The relationship that they seem to have sought with US counterintelligence services in order to ensure the security of their networks and operations is not “cat and mouse” or combative. It is strangely, but logically, symbiotic. 

That symbiotic relationship, however, is malignant, and designed to be parasitical. To that end, managers of Chinese intelligence and counterintelligence services in the US likely respond to any detection of the presence of US counterintelligence personnel or activity not by avoiding them, but by connecting in some smart way to them. Connecting to them, to give a couple of simple examples means having operatives work for a contractor engaged in physical surveillance, or take on low level employment in or around offices of those contractors. From such positions and similar ones, they would enable themselves to monitor the most well-orchestrated, well-conducted activities from the inside. Some operatives, finding work as operatives in the agencies of contractors for US counterintelligence services  could actually become, and have very likely actually been, part of those operations. Note that operatives of Chinese foreign intelligence and counterintelligence services directed to get close to US counterintelligence services personnel and activities may not necessarily be ethnic Chinese. (For a fuller discussion of that matter, see the July 31, 2020 greatcharlie post “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”) Such a precaution would likely be deemed less necessary by managers of Chinese foreign intelligence and counterintelligence services for operatives placed within or close proximity of contractors offices and personnel as those managers have likely become well-aware of the astonishing lack of due diligence and security practiced by them. Surely, US counterintelligence activities of greatest interest would be those against Chinese foreign intelligence networks and operations. However, there would undoubtedly be significant and considerable value in being aware of physical surveillance activities by US counterintelligence services against the other adversaries of those services. There is every reason to believe cooperative relationships exist among the intelligence services of US adversaries. To say the least, there would be some monetary value in information collected by China of that kind.

Much as some parasites, those operatives who might successfully penetrate any organizations of or pertaining to US counterintelligence services would never act directly  to destroy those personnel or organizations but would rather only nourish themselves off  of them by collecting critical information from them for the security and survival of Chinese Intelligence activities in the US. Reminding again of what might be called Olson’s maxim from To Catch a Spy, “Penetration is the best counterintelligence.” One can almost be certain that senior executives and managers in adversarial foreign intelligence services surely believe that, too! That is something for US counterintelligence services to be very concerned about.

With regard to working with quantitative data, broken down to the essentials, it must continually be used to keep US counterintelligence officers cognizant and well appraised of activity by confirmed Chinese intelligence officers, operatives, and informants tied to diplomatic missions. With quantitative data, users ought to drill down on data concerning their daily and hourly activity from communications to commuting. One must be able to discern even the slightest changes in activity, whether increased or decreased. Data should be reviewed daily to identify the slightest changes from the aggregate numbers. Revisiting data that has already been rolled up and aggregated is also advised. It should be mined through for more details, clues. (One should never get so caught up with data to believe that an opponent’s actions can be reduced to an algorithm. The opposition’s leaders are living, breathing, agile, flexible and–despite working in Communist China–potentially unconventional thinkers.)

Getting Results

Measures of success of the practices suggested here may hopefully be a marked increased prospective opportunities to: neutralize; displace; and, intercept, even recruit, from a targeted Chinese intelligence network.

1. Displace

If the purpose of US counterintelligence is to displace a Chinese intelligence network or operation, the rapid shutdown of an operation would be a sign of success in that endeavor. The threat of intercept or the very public revelation that an officer, operative, or informant in the network has been apprehended would naturally spur such an action. If the environment is made hot enough for the network, its managers and the remainder of their string of officers, operatives, and informants will indubitably go to ground with the hope of resurrecting their network with its diffuse operations at a more favorable point in time. However, if an operation has packed up and moved out, there will be a palpable change in the working atmosphere for the counterintelligence officer who has had their noses to grindstone working the case. In a frenzied rush to exit the US, individual suspected Chinese intelligence officers, working in academia or industry, in physical isolation from their compatriots, or ones that may appear to be operating independently and farthest away from their network compatriots and resources, may no longer see the need to carry on with any pretenses. It is also interesting to see that there is never mention of any effort by Chinese intelligence officers, operatives, or informants to figuratively throw dust in the eyes of those investigating, plant false leads or use other means to misdirect, as they make their escape.

Interviews can be used as a psychological tool to prompt displacement. For the network manager who is logical, visits to the residence or workplace of a subject of investigation by US counterintelligence officer to invite them for an interview in the respective office of their service, or to interview them at that location, may be viewed as probing based on some insight possessed by the adversary. There is the odd chance a network manager might believe a US counterintelligence service was on to something. However, it would seem they would more likely think a US counterintelligence service would “hold its cards a little closer” if it had something solid to act on. If the network manager is thinking in that way, it would mean  he or she has been trying to see through all things cooked up by US counterintelligence. Surely, for the Chinese intelligence  services as much as those of the US, studying their oppositions modus operandi is as important a task as anything else.

Operatives and informants, on the other hand, may become jittery. However, such a visit may not unnerve the network manager. The reaction of a network manager may be no visible  reaction at all. He or she will likely continually display nerve and knowledge. The possibility of such interviews has likely already crossed the managers mind. The network manager has likely already assessed how officers, operatives, and informants in his or her retinue will act or react when approached. The task of the network manager will be to deduce what triggered the interview, reason from cause to effect what is the likely course of events to follow, and act accordingly. That being stated, activities and especially the communications of those approached for interviews must be monitored. New travel plans by individuals with some association to those interviewed, scheduled closely by date, must be examined.

2. Neutralize

To assist in determining where to interdict, stand up a “Red Team” on a non-stop basis, using templates properly constructed from everything known and insights and inferences on Chinese operations and to continue to build up a legend for de créature imaginaire with the objective of achieving increasing accuracy. Among tools that should be made available for use in neutralizing Chinese intelligence officers, operatives, and informants, should be heavy financial rewards for “coming forward”; and whistle-blower-like protections. Casting one’s mind back to the “Chieu Hoi” program used to contend with the Viet Cong during the Vietnam War, US counterintelligence services, using an approach certainly not the same but conceptually similar to that, may very well be able net a few long-time operatives and informants of China see intelligence services with deep involvement in their efforts, who may have had their fill of the whole business and want to get out, but safely. Cela n’a rien d’évident. (The fact that the Chieu Hoi program was implemented in an Asian country is purely coincidental. No deliberate connection regarding a region, race, or political philosophy was made. The parallel is that much as the Viet Cong, Chinese foreign intelligence officers in particular, but any operatives and informants as well are often “true believers,” who act out of conviction. Similar to the Viet Cong, they are driven by a deep-seeded ideology. In their unique case, it is usually the erroneous belief that China is the champion of the oppressed and will become the dominant power in the world.) In case the point has been misunderstood, heavy financial rewards for them would mean steep rewards. Ideally, the result will be to threaten the rewards structure, financial and psychological, of the Chinese foreign intelligence and counterintelligence services. If money would not be the elixir to turn any Chinese intelligence officers, operatives, or informants, US counterintelligence services would only need to pose the question to themselves: Deployed to the US and caught in the business of spying, what else would truly satisfy them enough to cause them to  defect or to become a double? If the situation becomes desperate enough, ask the targeted Chinese intelligence officer, operative, or informant: “What do you want? Name it!” (In other words, at least to get things moving, do whatever it takes, but within reason!) Turning Chinese operatives and informants should ideally take on the appearance of something akin to a business enterprise while actually being a counterintelligence task, if successful. Cela encore n’a rien d’évident. (Note, however, that money can become poisonous in both directions, creating temptation among those in service ranks unfortunately disposed to transgressions. Therefore, its distribution must be very carefully supervised.)

To be succinct, the hope of US counterintelligence should be to come in contact with an officer, operative, or informant with an albeit idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. Pretio parata vincitur pretio fides. (Fidelity bought by money is overcome by money)

3. Intercept

Non capiunt lepores tympana rauca leves. (Drumming is not the way to catch a hare.) This could be entirely off the mark, but it appears that aggressive counterintelligence appears to have been directed at targets of opportunity versus the industry-centric networks of Chinese intelligence in the US. While there may be a meretricious benefit to this practice, it accomplishes nothing in terms of tearing down Chinese intelligence networks or smothering greater espionage operations. Again, elevated thinking is required. There must be an inflexion point at which US counterintelligence services become the fox, and the days of being the chicken come to an end. Better use must be made of tools available and good practices. There must be better use of deception. To lure Chinese intelligence networks into traps, network managers and higher ups in the Chinese system must be convinced that the figurative cheese in the trap is something worth the risk of trying to take. Psychological operations must be used to draw them closer to targets US counterintelligence can cover while remaining concealed. As part of the information warfare campaign with China, an effort must be made to surreptitiously “assist” Beijing in discovering a novel target worth pursuing. Chinese intelligence services have enjoyed a halcion season of success. They apparently have no intention of being thrown off their pace and streak of victories by what they in all likelihood suspect are attempts by US counterintelligence to score a victory against their effort during their moment of glory.

US counterintelligence officers must do their utmost to go beyond the normal scope in determining what will attract Chinese intelligence network managers. They must not proceed by pretending to know. There is no room for guesswork. Approaches developed must not be derivative. They must put as much time as necessary into developing them to become as certain as humanly possible that any new approaches will work. Any enticement or manipulation must not give off any indication of being a plant nor chicken feed. It must appear as genuine gold dust. Under extremely controlled circumstances, it may need to be actual gold dust! What is left is to wait for the network to show itself. There is nothing else to do otherwise. Efforts to stoke or prompt the adversary will lead to blowing the entire set up. Impatience is what the Chinese will look for because that is what every other foreign intelligence service expects of US counterintelligence.

Logically, it would be a capital mistake for Chinese Intelligence services to adulterate what could likely be characterized as an operation in which every aspect was well-known with individuals of ultimately unknown character, loyalties, or reliability and targets of likely no immediate unknown value and of no prior interest or desire. As senior executives and managers in Beijing might assess, if anything suddenly put before them was truly of any immediate value or desirable to China, the individuals or the information would have respectively been recruited or stolen already. Assuredly, that is the pinch for US counterintelligence services when it comes to getting decent double-agent operation off the ground.

John le Carré, the renowned author of espionage novels of the United Kingdom who served in both both the Security Service, MI5, and the Secret Intelligence Service, MI6, during the 1950s and 1960s, offers the statement in The Honourable Schoolboy (Alfred A. Knopf, 1977): “A desk is a dangerous place from which to view the world.” US counterintelligence officers must be mindful of what may be perceived in the conference room as an advantage over the opposition intelligence network manager may be the ugly product of groupthink. They must judge perceptions in view of what is  actually known about that opponent, even if he or she remains de créature imaginaire and how that manager may act in response to what they plan to put in his or her way. Use of aggressive tactics or overwhelming superiority can be turned into a liability by an agile thinker. It is also important to understand that no matter how the Chinese intelligence network or operation may be approached, everything done, particularly if successful, will be studied by superiors in Beijing so that all gaps that may have been exploited in a disrupted, displaced, or destroyed network will be rapidly and quietly set right in all remaining networks. Operational missteps that might have been exploited will be identified and never made again. (Be observant for changes in practices among networks and operations being traced.) In view of what Beijing may learn from an initial attack, adjustments in the next US counterintelligence strike against a Chinese intelligence network or operation must be considered even before the first is executed. In a cycle, this approach to attacking Chinese intelligence networks and operations must be adjusted for each new situation and repeated.

To go a step further, one might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them. 

It is unlikely that the senior executives and managers of Chinese foreign Intelligence services are sitting back and gloating about their victories. Rather, it is very likely that everyday they work harder and harder to make their networks and operations better and more effective, pushing their espionage capabilities far-beyond the reach of the counterintelligence services of the countries in which they operate. All of that being said, one might still imagine that soon enough, in a gesture aimed at figuratively putting some dirt in the eyes of US counterintelligence services, the Chinese foreign intelligence services may spend some hours planning some upheaval that their networks could cause in the US to embarrass US counterintelligence services. It would imaginably be designed to knock them well-off track and symbolically mark China’s domination of their opponent on his own home ground. China would also be sending a message concerning its dominance throughout the espionage world. Of course, despite its meretricious effect, whatever such a potential ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would feel enabled to plausibly deny China’s connection to the action. (These are only some thoughts, ruminations, on the situation. Hopefully, this should not cause any undue concern. Or, cela n’a rien d’évident.)

The Chinese have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. To that extent, it is unlikely Beijing wants its intelligence services reaching after anything when their plates are already full follow up on leads they created for themselves. It is possible that the Chinese foreign intelligence services have never seen US counterintelligence services get anything substantial started against their networks in terms of penetration. However, the Chinese will unlikely mistake quiet for security. They probably never really feel secure in the US. It is hard to imagine what might ever be worth the candle to Chinese intelligence services to reach after. Assuredly, impatience in any US operation would be anathema.

People’s Republic of China President Xi Jinping (above). Given the success of Chinese intelligence services in the US, China might soon enough choose to send a message to symbolically mark China’s domination of their opponent on his own home ground. and its dominance in the espionage world. Chinese foreign intelligence services operating in the US may spend some time planning an upheaval that would figuratively put some dirt in the eyes of US counterintelligence services. Despite any meretricious effect such an act might have, whatever such a potential deplorable ploy might be, it would doubtlessly be conducted in such a way that the government in Beijing and the Communist Party of China would be able to plausibly deny their connection to the action.

The Way Forward

Month after month, US counterintelligence services discover another set of occasions when China has incommoded a federal agency, a private firm, an academic institution, or research institute by stealing from them classified information or intellectual property most often vital to the national interest. Leave it to say, having engaged in an empirical study of public facts coming in what has been transpiring, the potential trajectory of China’s malign efforts is breathtaking. By 2021, it should have been the case that MSS networks were being regularly penetrated by US counterintelligence and rolled up in waves at times chosen by US counterintelligence services. Ongoing and developing MSS operations should have already been heavily infiltrated and those infiltrated operations which are not destroyed should be used as conduits to push disinformation back to China. As for individuals recruited by MSS, many should have already been identified as a result of US counterintelligence infiltration of MSS networks and at appropriate moments, those operatives and informants should have been intercepted, neutralized, and recruited as counterespionage agents. However, that is not the case. Perhaps in some allied country, success against China will be achieved showing US counterintelligence services the way forward. With a long history of successfully defending the United Kingdom from foreign spies, it may very well be that MI5 will not have the Cabinet, the Prime Minister, the exalted person herself, wait much longer for good news.

Whether this essay for some will cause a journey from unawareness, curiosity, or a lack of clarity to knowledge, remains to be seen. There has been more than enough talk about how bad the problem with China is. That becomes by the by. There must be more talk about how to defeat it. The US must move from the defensive to the offensive, and take the game back to China and destroy all of its networks. It could be the case that US counterintelligence officers must relearn and hone the skill of lying before the water course and awaiting the big game. Many plans can be developed to advance against a problem. However, choosing the right plan, the one that will work, is the challenge. Much as with physicians, for investigators, every symptom must be told before a diagnosis can be provided. In a very small way here, greatcharlie has sought to contribute to development more effective approaches to defeat Chinese intelligence collection efforts in the US. Before writing this essay, greatcharlie fully understood and accepted that there are those singular US counterintelligence services that would be completely uninterested in, and even shun, any voice or meditations from outside the bureaucracy that would dare offer assistance to them in their struggle with China’s intelligence services. (It must be stated that greatcharlie has either been retained to supply any imaginable deficiencies of US counterintelligence services nor has it been retained for anything by any of them.) Often in the US national security bureaucracy, perspectives on adversaries can become too austere. Over time, even unknowingly, walls are built around those perspectives, fending off an effort to more accurately understand an adversary at the present that may shake the foundations of them. That sort of mindset, as suggested,, perhaps an unconscious bias, can creep its way in and become comfortable. That can spell disaster. This may very well be the case with Chinese foreign intelligence activity in the US.

With a near endless chain of losses, the following theft sometimes being a greater defeat than the one proceeding it, greatcharlie feels compelled to ingeminate the position expressed in the conclusion of its August 31, 2020 greatcharlie post US counterintelligence services should consider hiring individuals from outside the bureaucracy who are already known due to demonstrated interest in the subject matter and recognized as possessing some ability to present what may be unorthodox innovative, forward-looking perspectives. New thinkers can rejuvenate the analytical process, effectively serving to unearth directions and areas for examination and offer hypotheses, good ones, that otherwise would be ignored. In effect, surface layers could be peeled off to reveal what may have been missed for a long time. From the inside, one might characterize observations and hypotheses offered by outsiders as mere surmisals and suppositions from those perceived lacking the necessary depth of understanding that long time analysts bring to an issue. With no intent to condescend, one might assess responses of that type would be defensive and emotional, and least likely learned. The purpose of using such perspectives is to have a look at issues from other angles. Thinking outside the bureaucracy would hopefully move away from the usual track, the derivative, the predictable, especially in special cases that may be hard to crack. Indeed, what outsider brings to the analysis of an issue, through the examination of people and events and interpretation of data, is the application of different sensibilities founded on knowledge acquired after having passed through a multitude experiences that might very well have thwarted the recruitment of the outside the box thinker. One could say the length and breadth of that knowledge and experience allowed for an alternative understanding of humanity. Such an understanding also could have been sought through personal study. 

The suggestion should not seem so exotic at this point. Even the adversaries of the US would likely imagine the possibility that some assistance from an unexpected source and direction could pose the greatest threat to their success. Perhaps some US counterintelligence services will never brook the idea of receiving such assistance from outside the bureaucracy. However, in the end, the US counterintelligence service which opens itself up to new, thinking, new insights, new approaches, will very likely bag its tiger. Vigilando, agendo, bene consulendo, prospera omnia cedunt. (By watching, by doing, by consulting well, these things yield all things prosperous.)

Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)

In a nine-count US Deparment of Justice indictment filed in an Atlanta federal court in 2017, the four members of the People’s Liberation Army (PLA) in the FBI poster above were accused of hacking into the Equifax credit reporting agency’s systems, creating a massive data breach that compromised the personal information, including Social Security numbers and birth dates, of about 145 million people, nearly half of all US citizens. There is little need but for citizens to read reports in the news media to know foreign intelligence services were operating inside and outside the US with the intention of causing the country great harm. In To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), James Olson places the efforts of dangerous foreign forces front and center. He explains the efforts being taken by US counterintelligence services to unthread the complicated nature of foreign intelligence activities in the US and drive away the dangers they pose.

There is little need but for US citizens to read reports in the news media to know foreign intelligence services were operating inside and outside their country with the intention of causing the country great harm. In To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), James Olson places the efforts of dangerous foreign forces front and center. However, more importantly, Olson explains the efforts being taken by US counterintelligence services to unthread the complicated nature of foreign intelligence activities in the US and drive away the dangers they pose. As the former chief of Counterintelligence for the Central Intelligence Agency (CIA), Olson is eminently fitted to represent US counterintelligence officers and present their work. In defining counterintelligence, Olson states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” Reportedly, over the years 80 countries, to include allies and friends, have engaged in espionage operations against the US.

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use aggression and force to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so.

From what Olson explains, counterintelligence organizations worldwide must detect necessary attributes of an actor, certain indicia, before initiating a counterintelligence investigation on a suspected “foreign spy” or operative or informant or  foreign intelligence service. The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. That process may not always be easy going. A foreign intelligence officer’s tradecraft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some. Counterintelligence may very well be the greatest manifestation of the paranoia business.

Regarding his career, again, for over thirty-one years, Olson served in the Directorate of Operations of the CIA, mostly overseas in clandestine operations. He was deployed overseas for several assignments, and eventually became chief of counterintelligence at CIA headquarters in Langley, Virginia. At the time he wrote To Catch a Spy, he was retired and working as a Professor of the Practice at the Bush School of Government and Public Service of Texas A&M University. Robert Gates, the former Director of Central Intelligence, 1991-1993 remarked about Olson: “James Olson is a legend in the clandestine service, having served in some of the most difficult, dangerous, and complicated assignments at the height of the Cold War. As director of Central Intelligence, I trusted him without reservation when he was chief of counterintelligence not only because he was enormously capable but also because I knew he thought deeply about the ethical and moral dimensions of what we did every day. Amid the countless books and memoirs of retired spies, especially at this time, this one is essential reading.” Olson was born and raised in Iowa. He studied mathematics and economics at the University of Iowa. Following college, he took a commission in the US Navy, serving aboard guided missiles destroyers and frigates. After a period, he would return to Iowa to study law at the University of Iowa. Apparently, Olson had every intention of practicing law in a small county seat town in Iowa. However, the CIA approached him and invited me to apply for a position in the clandestine service.That us when the story of his life in counterintelligence began.

This book has immediate historic significance because Olson is recognized as an authority among intelligence circles worldwide. There are not so many that have been written so well by former professionals. While others may have their preferences, three of special note and highly recommended by greatcharlie are: Raymond Batvinis, Hoover’s Secret War Against Axis Spies: FBI Counterespionage During World War II (University Press of Kansas, 2014); David Martin, Wilderness of Mirrors (HarperCollins, 1980); and, Scott Carmichael’s True Believer: Inside the Investigation and Capture of Ana Montes, Cuba’s Master Spy 1st ed. (Naval Institute Press, 2007) which Olson refers to in To Catch a Spy.

In Hoover’s Secret War Against Axis Spies–reviewed by greatcharlie on April 30, 2014, the historian, Batvinis, a former Federal Bureau of Investigation (FBI) special agent, presents a crucial chapter in the history of World War II during which the FBI really began and refined its counterintelligence mission. He discusses the FBI’s then new reliance on intrusive investigative techniques (wiretaps bugs, access to bank and financial transaction records), and the evolution of the Bureau’s liaison relations with the British, Canadian, and US military intelligence agencies. (In a proceeding book, his acclaimed, Origins of FBI Counterintelligence (University of Kansas, 2007), Batvinis went off from scratch to tell the reader about the situation.) In Wilderness of Mirrors, Martin tells the story of how an ex-FBI agent William “King” Harvey identified the notorious Soviet double agent Kim Philby in conjunction with James Jesus Angleton, the CIA’s chief of counterintelligence responded to the betrayal of family friend Philby’s betrayal and descends into a paranoid wilderness of mirrors. Wilderness of Mirrors set a benchmark for studies, memoirs, and all other written works on US counterintelligence. It was once required reading for some intelligence professionals–and perhaps it still is. The author of True Believer, Carmichael, was a senior security and counterintelligence investigator for the Defense Intelligence Agency and the lead agent on the successful spy hunt that led to Ana Montes. He provides an inside account of how his espionage investigation, with the eventual help of the FBI, progressed over a period of several years to develop a solid case against Montes. She is the only member of the US intelligence community ever convicted of espionage for the Cuban government. Every twist and turn is all the more intriguing as truths become lies and unlikely scenarios are revealed as reality.

To Catch a Spy is not Olson’s first book. He is also the author of Fair Play: The Moral Dilemmas of Spying (Potomac Books, 2006) Fair Play examines ethical challenges facing US intelligence officers as they attempt to operate within a standard of acceptable moral behavior. That examination is couched in an insightful summary of intelligence history through fifty reality-based scenarios.

To Catch a Spy, 248 pages in length, was released by Georgetown University Press on April 11, 2019. Since then, many others have already formed their own opinion of Olson and his work. For those who may excavate through To Catch a Spy to thoroughly consider points of exposition concerning both himself and activities in which he was engaged, the book has doubtlessly been substantially edifying. The reader is provided with an amazing opportunity to see it all through the prism of a master craftsman as he discusses his profession. Indeed, as with Fair Play, everything Olson provides in To Catch a Spy is founded on his experience during a lengthy career in US counterintelligence. Nevertheless, To Catch a Spy is not a memoir of his life or of his career. That has yet to be written, and perhaps may not be. Still, if one were to go off anyway and measure Olson’s book against the memoirs of Cold War Soviet, Eastern Bloc adversaries of the US there is a decided difference. Those memoirs have a tendency to be anecdote laden, picturesque and exciting. While those who have professionally analyzed them judge them as omitting much, their books typically provide enough nuance to allow for extrapolation, inference, and conceptualization of their tactics, techniques, procedures, and methods. They also often point to their bad choices, pitfalls and ways to minimize losses after encountering them, commonplace wrong turns and remedies to them. That is really what the neophyte needs to receive most.

The author of To Catch a Spy, James Olson (above). Olson is eminently fitted to represent US counterintelligence officers and present their work. For over thirty-one years, Olson served in the Directorate of Operations of the Central Intelligence Agency (CIA), mostly overseas in clandestine operations. He was deployed overseas for several assignments, and eventually became chief of counterintelligence at CIA headquarters in Langley, Virginia. In defining counterintelligence, Olson states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” Reportedly, over the years 80 countries, to include allies and friends, have engaged in espionage operations against the US.

Surely for readers thrilled by spy novels, there was enough provided by Olson to allow them to live vicariously through his anecdotes. In the genre of fiction and nonfiction spy stories, there is an artistic milieu in which–often under the demands of publishers who are intensely interested in selling books–writers seek to position themselves amidst. It cannot be denied that human nature instinctively finds entertainment more compelling than edification. Perhaps even among them, there may be some who will decide after reading To Catch a Spy, that there is nothing so outré about counterintelligence. However, often things seem simple once they have been explained.

Among professionals, not only in the US, but worldwide, To Catch a Spy was likely anticipated with baited breath. That stands to reason that this category of reader would be aware that Olson possesses a huge body of thoughts that most US counterintelligence officers on the job today. There was considerable satisfaction among professionals with his first book, Fair Play. They could have only imagined that To Catch a Spy would be another gem. One might perceive while reading To Catch a Spy that Olson subtly takes on the role of instructor, introducing somewhat nuanced details about certain matters in his lecture as if he were trying to impart the full benefit of his experience to prescient, young CIA counterintelligence officers. To that extent that he does all of this, there is a trace of something akin to a pedagogy for developing the reader’s understanding of the world he is moving them through. A quote widely attributed to one of the most influential artists of the 20th century, Pablo Picasso: “Learn the rules like a pro so you can break them like an artist.” To that extent, novice US counterintelligence officers must master the fundamentals, and the foundation will be laid to explore one’s potential with confidence and an assured step with knowledge and experience of those who came before.

One might expect copies of To Catch a Spy, that may be possessed by US counterintelligence officers from the various services, are treasured and well thumbed. Spotted among reviews of the book on Amazon.com are comments from US intelligence officers in which they attest to the value, positive impact To Catch a Spy had on their thinking and their work. Alex J. Vega IV, Joint Counterintelligence Training Activity (JCITA), Defense Intelligence Agency, and Former U.S. Army Attaché, U.S. Embassy, Moscow, Russia wrote: “Jim Olson has shared with us his accumulated wisdom, lessons learned, and roadmap for the future. To Catch a Spy is the new U.S. counterintelligence standard. It is a must read for serious professionals and anyone interested in the spy world. Jim has done a tremendous service, not only to our generation, but also to those of the next who choose to answer the call to join the counterintelligence battle.” Henry A. Crumpton, a twenty-four-year CIA veteran, author of The Art of Intelligence: Lessons from a Life in the CIA’ s Clandestine Service (Penguin Press, 2012), and CEO of Crumpton Group LLC. remarked: “The author, America’s counterintelligence guru, has crafted a remarkable, indispensable book rich in heartbreaking detail and sharp analysis–serving as a clarion call for a stronger response to the unrelenting, sophisticated, and successful foreign espionage assault on our nation.” Robert M. Gates, Director of Central Intelligence, 1991-1993, stated: “Amid the countless books and memoirs of retired spies, especially at this time, this one is essential reading.”

One could safely state that To Catch a Spy has not been everyone’s cup of tea. Despite such glowing expressions of satisfaction and appreciation, there is a view of the book in which it is asserted that Olson really did not dig down so deep on issues in the text to display his full capabilities as a counterintelligence thinker. He could hardly be so profound, or candid at all. Some professionals worldwide who may have acquired a copy of To Catch a Spy were disappointed when they discovered that the text is not heavy with inferences and insights, and analysis supported by references. In fact, such are rather sparse in the book. In Mark Soares’ review of the book in the scholarly journal Intelligence and National Security, (Mark Soares (2020) To Catch a Spy: The Art of Counterintelligence, Intelligence and National Security, 35:7, 1079-1081, DOI: 10.1080/02684527.2020.1746125), he begins by saying: “James M. Olson has written a deeply personal composition of his extensive career to counterintelligence with the Central Intelligence Agency  (CIA) using a loose and relaxed format not typically seen in intelligence literature.” Explaining Olson’s purpose in writing the book, Soares remarked: “To Catch a Spy serves as Olson’s caution to future US intelligence practitioners and to his country as a whole to pay far more attention to counterintelligence matters rather than focusing all efforts on collection.” However, Soares would eventually judge the book critically, stating: “Though To Catch a Spy is undoubtedly an entertaining read, scholars and academics will be disappointed by the absence of references, with Olson opting instead to use informal notes to add background details to organizations,  individuals, tradecraft terms, or historical events mentioned in the book (pp. 203-217). Many of the events described by Olson could have been referenced more properly given the abundance of information available on such topics.”

For security reasons, Olson admits to having doffed his cap to his former employer so to speak by submitting To Catch a Spy to his former employer, CIA, for review. It is a requirement for officials from the US Intelligence Community with backgrounds as Olson. In Olson’s case, his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any information that would provide some nuance on how the US detects and catches spies would be of the utmost interest and importance to the foreign intelligence services of adversaries as well as allies. One can only imagine an individual with his wealth of knowledge is holding back considering how much more he could have potentially ruminated upon in the book. Under such circumstances, it is understandable that Olson’s lack of profundity would disconcert some.

If Olson were writing only for intelligence professionals, he would have a diminutive audience. While some US counterintelligence professionals might nonetheless view it as their book, To Catch a Thief is a book published for the largest audience possible. To that extent, Olson does not take for granted how much the reader can absorb from what he teaches. It is evident that he takes control of that process, apportioning how much of the story he feels would be appropriate. When he feels the reader should be ready for more, Olson increases the quantity and complexity in his anecdotes.

Even after what could be sardonically characterized as Olson’s generous effort to spoon-feed some readers, other concerns about how the book was written were voiced by reviewers from outside of the profession. In the New York Journal of Books, Michael McCann wrote: “To Catch a Spy struggles to the finish line far behind many other, better publications in terms of immediate relevance. Which invites an important question: Who is Olson’s intended audience?” On that point McCann goes on to state: “To Catch a Spy will provide a useful textbook for students taking Olson’s courses at the Bush School. No doubt they will be quizzed on his ten commandments, the three principles of workplace counterintelligence, and other key points. It will also help them write summaries of important counterintelligence cases over the years and the lessons learned from them.” Leaving no doubt that he was disappointed by the book, McCann states: “For the general reading public, however, To Catch a Spy doesn’t really appeal. Those looking for “juicy new disclosures” will be disappointed as they wade through material just as easily accessed at no cost by googling for it online.”

In its review, greatcharlie, using its understanding of the subject as a nonpracticioner, observing from outside the bureaucracy, follows those aspects of the book closely. The last outcome greatcharlie wants is for its review to boil down to discussion of “Olson left this out. He left that out. He did not elaborate enough here or there.” Despite any concerns about what was missing in the text, in its review of To Catch a Spy, greatcharlie explores what one can appreciate and learn about Olson’s thinking process from what he does provide in the text. However, what is most impressive about To Catch a Spy to greatcharlie is the manner in which it stimulates thought on the issues presented. Books that can stir a fire inside the reader, and a passion for a subject, are the most memorable and most enjoyable to sit with. To that extent, included in the review are greatcharlie’s own thoughts about counterintelligence topics covered by Olson which hopefully will assist some readers in better understanding what Olson is presenting to them. It is also hoped that thoughts shared by greatcharlie will encourage readers to weigh  their own impressions on those topics and develop of their own insights on them whether they may be actual intelligence practitioners or just enthusiasts. Additionally, greatcharlie offers its own thoughts on those topics to assist in giving context to the work of US counterintelligence to the US public, nonprofessional readers, in particular, and, in turn, offer some perspective to the counterintelligence professional on how the ave4age US citizen perceives his or her work. With any luck, what is presented will appropriately resonate among both sets of readers. Rationale enim animal est homo. (Man is a reasoning animal.)

The Headquarters of the Russian Federation SVR in Yasenevo (above). The first three chapters of To Catch a Spy  form a compendium of efforts Olson spotlights of respective Chinese, Russian, and Cuban foreign intelligence services against the US. This is a matter that absolutely merits treatment particularly for the sake of the intelligence enthusiasts and the nonpracticioner. It is great that Olson broached the matter early in his book. The intelligence services of China, Russia, and Cuba are driven by the same concepts and intent that typically drive the leadership of their respective authoritarian countries: greed, cruelty, and lust for power, even world domination. It is fairly well-known outside of the intelligence world that China has concerned the US greatly of late.  Olson’s compendium of adversarial intelligence services activities essentially provides a run down of those respective adversaries’ intelligence operations, both successes and defeats. Much of the information on the cases used to support any small assertions by Olson on the nature of these adversaries’ respective efforts has already been made public. In fact, they were presented in some detail via US Department of Justice indictments and criminal complaints for those cases.

Country Reports on the Main Adversaries of the US

The first three chapters of To Catch a Spy  form a compendium of efforts Olson spotlights of respective Chinese, Russian, and Cuban foreign intelligence services against the US. This is a matter that absolutely merits treatment particularly for the sake of the intelligence enthusiasts and the nonpracticioner. It is great that Olson broached the matter early in his book. The intelligence services of China, Russia, and Cuba are driven by the same concepts and intent that typically drive the leadership of their respective authoritarian countries: greed, cruelty, and lust for power, even world domination. It is fairly well-known outside of the intelligence world that China has concerned the US greatly of late.  Olson’s compendium of adversarial intelligence services activities essentially provides a run down of those respective adversaries’ intelligence operations, both successes and defeats. Much of the information on the cases used to support any small assertions by Olson on the nature of these adversaries’ respective efforts has already been made public. In fact, they were presented in some detail via US Department of Justice indictments and criminal complaints for those cases.

Suspected spy for the Communist Party of China, Christine Fang (above). It was revealed in 2020 that Fang had established contacts and some relationships with several political officials from mayors and local council members, to Members of the US Congress as part of an effort by China to infiltrate US political circles. Olson explains that the Chinese have been trying to influence US political campaigns through illegal contributions since at least the 1990s. Olson says China is in a class by itself in terms of its espionage, covert action, and cyber capabilities. He admitted the US was not doing enough now to prevent China from stealing its secrets. Olson reports that the goal of China’s massive espionage, cyber, and covert action assault on the US is to catch up with the US technologically, militarily, and economically as quickly as possible.

China

Olson explained that China is in a class by itself in terms of its espionage, covert action, and cyber capabilities. He admitted the US was not doing enough now to prevent China from stealing its secrets. Olson explains that the goal of China’s massive espionage, cyber, and covert action assault on the US is to catch up with the US technologically, militarily, and economically as quickly as possible. Olson asserts that if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

There were four important disclosures by Olson on Chinese espionage, which, despite claims from some reviewers were well-known, in greatcharlie’s view can at least be said to have been given “proper” additional light in his discussion. They include the restructuring of the Chinese intelligence services, the political work they do in the US, concerns that a possible mole is ensconced in the US Intelligence Community, and again, the enormity of Chinese espionage. Regarding the Chinese intelligence apparatus, he explains that it was restructured in 2015 and 2016. The principal Chinese external intelligence service is the Ministry of State Security (MSS)., which is responsible for overseas espionage operations. The Ministry of Public Security (MPS) concentrates on domestic activities but also occasionally runs agents abroad. The MSS and MPS were relatively unaffected by recent organizational changes in the Chinese intelligence community. The major impact has been on the People’s Liberation Army  (PLA), which since the 1950s has been heavily engaged in intelligence operations. The PLA in theory has concentrated on military intelligence, but it has actually defined its role more broadly. Olson reports that it has competed with the MSS in a wide range of economic, political, and technological intelligence collection operations overseas, in addition to its more traditional military targeting. The PLA is still responsible for the bulk of China’s cyber spying. However, Olson points to indications that the MSS has been assigned an expanded role in this area as well. Concerning how it is all organized, Olson reveals that the PLA’s human intelligence (HUMINT) operations are managed by the Joint Staff Department, and comes under the Central Military Commission. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence like certainly capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission.Thus, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), the rough equivalent of the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare have been rolled into the new Strategic Support Force. Olson explains that much as all intelligence services worldwide, both the MSS and the PLA make regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. They aggressively use Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection. Olson takes the position, disputed by some experts, that Chinese intelligence services take a vacuum cleaner approach and collect literally any kind of data they can get their hands on in the US.

Olson explains that the Chinese have been trying to influence US political campaigns through illegal contributions since at least the 1990s. He points to the huge row raised in 1996 when the Washington Post reported that the US Department of Justice was investigating possible illegal Chinese contributions to the Democratic National Committee (DNC) in an effort to influence both the Presidential and Congressional election that year. After getting into a handful of pertinent details about two Chinese businessmen, Johnny Chung and John Huang, Olson explains that the FBI determined that the 1996 illegal funding operation was coordinated from the Chinese Embassy in Washington. Olson says the issues at stake for the Chinese government are not difficult to devine: US support to Taiwan, intellectual property law, trade policies, the environment, human rights, and Asian security. China denied any role in the influence buying. Going a step further, Olson warns that candidates of both political parties have been targeted for influence buying. Chinese hackers have been detected in the campaign websites of both candidates in every presidential election since 2000, another indication that the threat of Chinese election tampering has not gone away. In 2016, Virginia governor Terry McAuliffe was notified by the US Department of Justice that he was the target of investigation for allegedly accepting a questionable campaign contribution of $120,000 from Chinese businessman Wenqing Wang. McAullife was not charged with any crime. There has been considerable controversy lately about alleged Russian tampering in the US presidential Election of 2016. Such allegations, Olson duly notes, should  be investigated thoroughly, of course, but he points out that the Chinese have been engaged in such activities for 20 years.

Olson notes that in a May 20, 2017 New York Times article informed that 18 to 20 of the CIA’s best spies inside China had been imprisoned or executed. The New York Times based its information on “ten current and former American officials” who chose not to be identified. According to Olson, the losses actually occurred between 2010 to 2012 and effectively wiped out the CIA’s excellent stable of assets inside the Chinese government. Olson proffers, “If true, this disaster is eerily reminiscent of the decimation of the CIA’s Soviet agent program in 1985.” The fact that Olson would even discuss the New York Times report in To Catch a Spy, gives the story far greater credence than it would have otherwise. With regard to what occurred from 1975 to 1985, the CIA built up a remarkable inventory of well-placed agents inside the Soviet Union–only to see them disappear, one by one, because of what Olson describes  “the perfidy” of Edward Lee Howard and Aldrich Ames. According to the New York Times report, the CIA’s counterintelligence theories about what went wrong in China have mirrored the same avenues that  it explored after 1985. Olson laid out a few of the questions that were asked by US counterintelligence services: “Could our compromises have been the result of sloppy tradecraft? We’re we being beaten on the street? We’re our secret communications being intercepted? Or did we have a mole?”

Olson says arrests in rapid succession in a compressed period usually point to a mole. In fact, a former CIA case officer, Jerry Chun Shing Lee, was arrested by the FBI in January 2018 and charged with espionage. After Lee left the CIA in 2007, he moved to Asia with his family and was doing business there. In 2010, he was allegedly approached by Chinese intelligence officers. If, as alleged, Lee gave up the identities of CIA spies in China, Olson believes he either took notes with him when he left the agency in 2007 or remembered who they were. Olson reports that the FBI, as part of its investigation, was looking closely at deposits made to Leeds bank account. It took 9 years to catch Ames. Olson states: “I hope it will not take that long to figure out what happened in China and, if the problem is in fact human, to bring the traitor to justice.

Olson submits to the reality that enormity of the Chinese espionage effort is staggering, noting that the FBI announced in 2015 that it had seen a 53 percent increase in economic espionage against US companies over the previous year, and most of it from China. US companies remain extremely vulnerable despite being aware of the Chinese threat. According to Olson, the MSS and PLA primarily play the ethnic card in their recruitment operations. They target a large number of ethnic Chinese–the “overseas Chinese”–who live in the US and virtually every other country in the world. Still, the MSS and PLA would also engage in nonethnic recruitment of US citizens. Those nonethnic recruits, Olson says are few in number, have done serious damage given reports on their activities.

Olson presents the statistic that approximately 4 million ethnic Chinese in the US are only a generation or less from the mainland and great numbers of them still have relatives in Communist China. He says many of them also still feel pride and sympathy for the culture and accomplishments of China, particularly the build up of economic and military strength under Mao and his successors. Olson states that the common tactic is to play on loyalty to Mother China and to exert pressure via relatives still living in China. A Chinese-American working in the US government or in a high-tech firm would usually be approached on that basis, but he notes that venality and greed can also play a large role in any recruitment of a spy. Olson says that all US citizens who visit China are assessed as potential recruitment  targets–and those who he access and show susceptibility are singled out for aggressive development. To emphasize how well Chinese recruitment efforts work, Olson provides a partial listing of Chinese-Americans who have fallen to this trap, the information they were instructed to collect, and where they were located: US Navy Lieutenant Commander Edward Lin, caught providing classified military information; Szuhsiung Ho, caught recruiting six other US engineers to provide nuclear technology to China; Peter Lee, caught providing naval technology and defense information to China; China Mak, caught passing classified information on surface ships and submarines; Fe Yei, caught stealing computer microprocessor technology for China; Walter Lian-Heen Liew, caught providing chlorides-route titanium dioxide production technology to China; and, Greg Chang, caught providing proprietary information on the US space program to China. Olson then devotes a page and a half to the case of Katrina Leung, whose objective was not to steal technology but to infiltrate US counterintelligence. His account provides less about tradecraft, having been errantly recruited by the FBI as a counterespionage agent, she used and told more about the details of her relationship with two FBI counterintelligence officers, James Smith and William Cleveland.

As for nonethnic recruits of the MSS and PLA, Olson presents summaries of the cases of Benjamin Bishop, caught passing classified defense information to his young Chinese girlfriend; Candace Claiborne, having served in Shanghai and Beijing as a State Department employee, she was caught cooperating with Chinese intelligence; and, Glenn Duffie Shriver, recruited by MSS while visiting China as a student was caught delivering stolen military technology to his intelligence handlers. Curiously, even though Olson explains that he has presented only a partial list of ethnic and nonethnic recruits caught by US counterintelligence services, the list appears rather diminutive given his own admission that there is a vast Chinese intelligence collection effort currently underway in the US. There would surely be some reason for US counterintelligence services to be proud of the outcome of investigations into the activities of those captured. However, far more will need to be done before they begin to even stem Chinese espionage in the US. (A discussion of the transition from ethnic to non-ethnic recruitment by can found in greatcharlie’s July 31, 2020 post entitled “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”

Olson touches on two recurring themes in discussions on Chinese intelligence: students and cyber attacks The question of Chinese students in the US, is especially pertinent. According to another statistic that Olson offers, in 2016-2017 there were 350,755 Chinese nationals studying at US colleges and universities, accounting for approximately one third of the total of international students in our foundry. He points to that fact that a large majority of Chinese students are studying science or engineering, fields that have direct relevance to China’s industrial and military aspirations. Olson reveals that many Chinese students are encouraged by Chinese intelligence to remain in the US, to obtain employment, and to acquire lawful permanent resident status. Lawful permanent residents can apply for US citizenship after five years of residence, three years if they are married to a US citizen. Naturalized US citizens are eligible for US government security clearances after five years of citizenship. Olson says these regulations represent a trade off between our need for certain skills–particularly technical skills–and security. Olson notes that the US Intelligence Community feels any intelligence service worthy of the name would jump at the chance to infiltrate its officers and co-optees into government agencies, national laboratories, and high technology firms of a priority target country. While admitting that he had no data to support that position, he says it is inconceivable to him that the MSS and PLA would have overlooked this enticing and easily exploitable path to access.

Regarding cyberattacks from China, Olson notes that they are nothing new. The first major attack was discovered in 2005, but it was quickly determined that infiltrations of US government computer networks had been going on since at least 2003. Olson relates that the 2003 operation, dubbed Titan Rain, was a coordinated attack by Chinese cyber spies to download sensitive Data from networks at the US Departments of Defense, State, Energy, and Homeland Security, as well as a host of US defense contractors. In one day, the hackers stole reams of sensitive aerospace documents with schematics of propulsion systems, solar paneling, and fuel tanks for NASA’s Mars Reconnaissance Orbiter. Other targeted locations included the US Army Information Engineering Command, the Naval Oceans Systems Center, the Missile Defense Agency, and US national laboratories. Olson says cyber attacks such as Titan Rain present a unique challenge in terms of attribution. In the case of Titan Rain, however, Olson explains that it is not credible to conclude that a multifaceted and sophisticated operation of this magnitude could be anything other than a Chinese government-sponsored activity.

In 2010, Google announced that the company had detected a “highly sophisticated and targeted attack on [its] corporate infrastructure originating from China that resulted in the theft of intellectual property from Google.” While China’s involvement in cyber attacks was by no means surprising, Olson supposes Google’s decision to publicize the breach was unusual. Typically, companies are wary of publicizing such leaks for fear that perceptions of insecurity could negatively affect their business. The explanation may lie in the fact that Google executives, who had continually met resistance from the Chinese government regarding censorship since the company had entered the Chinese market in 2006, finally decided enough was enough.

Google first learned of the attack from Chinese human rights activists in the US who had reported that their Gmail accounts had been accessed by unknown users. As details of Operation Aurora, as it was called, surfaced, it became clear that the attack was highly tailored and complex. The cyber spies exploited a flaw in Internet Explorer 6.0 to gain access to targeted computers. Once the vulnerability was identified, the hackers determined which officials at various companies had access to sensitive information. Emails that, once opened, installed malate on the target computers were then sent from servers in Taiwan to the chosen company officials. The hackers from then on had unfettered access to the officials’ computers and could steal any information they deemed valuable. Google was not the only US firm targeted by the Aurora cyber spies. No less than 34 companies, to include Yahoo, Symantec, Adobe, North run Grumman, and Dow Chemical, were victimized. The Washington Times reported, “Each of the companies was targeted differently, using software developed from the attackers’ knowledge of the individual networks and information storage devices, operating systems, the location of targeted data, how it was protected, and who had access to it.” According to federal cybersecurity experts, attacks of Aurora’s precision and sophistication could be achieved only with substantial the government’s support.

Perhaps the most egregious of all the attacks on US computer systems became public in June 2015, when the Office of Personnel Management (OPM) announced that its database had been breached by unknown persons. The personnel records of 21.5 million US government employees, past and present–including Social Security numbers, biographical information, and the results of security background investigations–were stolen. The information, in Olson’s informed view, would be a gold mine for any intelligence service seeking to spot, access, and develop US government employees for future recruitment. The US Intelligence Community placed blame for the attack squarely on China. Beijing denied any official responsibility for the breach and, in fact, announced in December 2015 that it had arrested a small group of nongovernmental hackers for having committed the crime. No information was provided on the hackers’ identities, place of deployment, or sentencing. Skeptics suspected a convenient cover-up to ease tensions with the US before a scheduled visit of People’s Republic of China President Xi Jinping. Olson s that the only Chinese entity, state sponsored or otherwise, that he could think of that would have a motive for stealing all the OPM data is the MSS. The administration of US President Barack Obama signed a bilateral agreement in September 2015 pledging that neither side would use cyber attacks to steal intellectual property for commercial purposes. According to Olson, a US cybersecurity company documented a Chinese cyberattack on a US company the day after the agreement was signed. In the three weeks that followed, there were at least seven more attacks from China against US high-tech companies. 

The current director of the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Sergey Naryshkin (above). Second place on Olson’s list of  counterintelligence threats to the US goes to the Russian Federation Following the Soviet Union’s collapse, the monolithic Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. was divided into two new agencies, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB and Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Despite the democratic posturing and economic liberalization of the early years, in the end, not to much changed about Russian activity in the US. Many of the KGB’s old and young guard stayed on and simply moved into new offices in Yasenevo for the SVR or the Lubyanka for the FSB.

Russia

Second place on Olson’s list of  counterintelligence threats to the US goes to the Russian Federation (Russia). Despite the democratic posturing and economic  liberalization of the early years following the collapse of the Soviet Union, Russian security services did not change much. Intelligence was reorganized in Russia in 1991. The monolithic Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. was divided into two new agencies, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB and Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Unlike the former satellite countries of the Eastern Bloc (e.g., Poland, Bulgaria, Czechoslovakia, East Germany, Romania, Hungary, Latvia, Lithuania, and Estonia), where intelligence services of the new democratic regimes purged old Communist apparatchiks, many of the KGB’s old and young guard stayed on and simply moved into new offices in Yasenevo for the SVR or the Lubyanka for the FSB. The Russians did not consider it professionally disqualifying for someone to have served previously in the repressive and undemocratic KGB.  When Olson mentions that organization, it must be made clear that he viewed it as “a ruthless and vicious organization that oppressed its own people, crushed religion, sent political dissidents to gulags or psychiatric hospitals, and killed its enemies.” Olson describes the FSB as being responsible for Internal security in Russia, specifically counterintelligence, counterterrorism, domestic unrest, state crimes, and border security. Meanwhile, the SVR is responsible for external intelligence collection and covert action. With this structure Russia has aligned itself more closely to the US and United Kingdom models , in that the FSB is the rough equivalent of the FBI or the Security Service (popularly referred to as MI5) and the SVR corresponds to the CIA or the Special Intelligence Service, popularly known as MI6. (An explanation of the United Kingdom’s nomenclature of MI5 and MI6 is provided in some detail in greatcharlie’s December 11, 2020 post.) Russian military intelligence is the responsibility of the Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU which has operated under that name since World War II. 

Olson says that there was real optimism, even a belief in some quarters, that the US Intelligence Community could forge a new relationship with the Russian intelligence services on the basis of trust and cooperation, particularly in areas of common concern, transnational interests. They included counterterrorism, narcotics, and organized crime. Olson said that some of the early talks between representatives of the two services were so encouraging that “the US side decided it did not want to jeopardize this potential intelligence détente by getting caught in any kind of provocative spying against our new ‘friends.’” The problem with that line of thinking was illustrated by Olson when pointed to the episode of former KGB archivist Vasil Mitrokhin. Mitrokhin provided MI6 with a gold mine of documentary intelligence on Russian espionage information from the revolution to the 1980s. However, Mitrokhin had initially attempted to provide the information to the CIA, but Olson explained he was rebuffed based on the rationale that the CIA did not want to antagonise the SVR given its aims of establishing a cooperative relationship with that Russian intelligence service. 

Then what Olson describes as an avalanche of bad news came when it was discovered that both the SVR and the GRU intelligence operations against US personnel and installations worldwide had never ceased. They were in fact being conducted aggressively. Olson then points to the cases of CIA officers Aldrich Ames, Edward Lee Howard, Harold James Nicholson, FBI special agents Earl Edwin Pitts and Robert Philip Hanssen, and the US Army’s George Trofimoff.

Another Russia concern to which Olson draws the reader’s attention was the case of a group of illegals–described by Olson as professional intelligence officers living in the US under false identities–intercepted by the FBI in 2010. The case was made very public and news stories on it garnered considerable public interest, with focus placed on a divorce, Anna Chapman, who held dual Russian and United Kingdom citizenship. Olson remarks on the politics of the illegals detainment, trial, and exchange. Olson also gives attention to Russian information warfare, which he explains supplements their human intelligence efforts. 

Cyber spying is widely used by Russia to interfere in the politics of other foundries, to manipulate their populations, to spread disinformation, to conduct unconventional warfare, and to collect intelligence. The Russian objective is to harass, to discredit, to disrupt, to deceive, and to spy on rival states. The last ten years have seen not only a dramatic increase in the frequency of Russian cyber activity, but also, what Olson alarmingly characterizes as a quantum leap in the brazeness, sophistication, and destructiveness of the attacks.

Olson reports that the FSB has taken the lead in launching denial-of-service attacks on foreign governments and sponsoring anonymous “web brigades” that bombard political blogs and other forums with disinformation and pro-Russian propaganda. The GRU’s cyber capabilities are primarily directed at supporting military interventions, but the GRU is suspected of also having carried out cyber attacks on non-military objectives, such as the German Bundesamt and French television station. The lines of responsibility between the FSB and GRU are blurry and overlap, leading to a possible duplication of cyber efforts. The SVR uses cyber operations to support human intelligence operations. Although it is not as directly involved in cyber operations  as the FSB and GRU are, it plays a planning role in overall cyber strategy.

According to Olson, Russian cyberspying first surfaced on the world stage in a big way in Estonia in 2007. Russian-Estonian relations fell to a new low over the removal of a Russian war memorial. At the height of the controversy, Estonia was hit by a massive denial-of-service attack on government offices, political parties, banks, and media outlets. In 2008, as a prelude to the Russian armed forces invasion of the Republic of Georgia, the voluntary was victimised by well-orchestrated cyber attacks creating disarray. Internet services were rerouted and blocked, websites were defaced with pro-Russian propaganda, and news agencies websites were attacked, and in some cases brought down. The Russian annexation of Crimea in 2014 was followed by waves of sophisticated cyber attacks against Ukraine’s central government in Kiev. Separate attacks on energy suppliers, the power grid, the financial sector in Ukraine, as well as the Ministry of Defense in years since.

Olson asserts that unlike Chinese espionage, which he characterized as being based on China’s cold, objective attitude toward the US, an impersonal self-interest, Russian spying is predicated on a certain animus toward the US. Olson concludes that Russian Federation President Vladimir Putin “does not like us,” and says his grudge is personal. Olson believes that in sheltering Edward Snowden, who he describes as a “contemptible US turncoat,” Putin is showing his disdain for the US.

Olson informs that when the US Intelligence Community is interviewing applicants for employment today, it sometimes refers to the “Big Five” foreign languages that are in highest demand: Chinese, Arabic, Farsi, Korean, and Russian. The Russian language is still on the list for good reasons, not the least of which is that the SVR and the GRU are all over us. Olson believes that Russia will remain a major counterintelligence concern for the US for the foreseeable future. He concludes that the US would be naive in the extreme to believe that it could ever expect good faith from Putin.

Ana Montes (above) was a Defense Intelligence Agency analyst arrested in 2001 on charges of committing espionage on behalf of Cuba. According to Olson, the Cuban DGI was the most effective intelligence service the US counterintelligence faced. A noteworthy aspect of Cuban intelligence activity in the US is the quality of the tradecraft. In the case of Montes, for 16 years she passed the DGI everything she could get her hands on related to US counterintelligence efforts against Cuba. It was no small feat for the Cubans to run her case and others as long as they did and in hostile territory under the noses of US security and counterintelligence officials without getting caught. (Olson gives the Montes case substantial treatment in Chapter Eight.)

Cuba

Olson’s review of the Cuban threat was perhaps the best written of the three assessments. Olson declares that the Cuban Intelligence service may be the most effective service that US counterintelligence services face. The Cuban Intelligence Directorate, formerly known as General Intelligence Directorate or DGI was established by the First Secretary of the Communist Party of Cuba, one time Cuban Prime Minister, then Cuban President, Fidel Castro, in 1961 to preserve the Revolution; to collect intelligence on Cubans enemies, both foreign and domestic; and, to carry out covert action operations as directed. Castro was aware as early as 1961 that President Kennedy and his brother Robert Kennedy, the US Attorney General, were trying to have him assassinated through a variety of CIA plots that never came anywhere near fruition. The DGI reportedly became Castro’s tool of choice to carry out his vendetta against the CIA and the US.

Olson states the Cuban DGI cannot compete with the Chinese or the Russians in terms of overall damage to US national security, but that is primarily a function of its smaller size, narrower objectives, and limited resources. However, perhaps  it should  have been added, as Olson is surely aware, under furtive cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked or position themselves, to support the intelligence efforts  of other countries when there is a common interest or considerable benefits of all kinds. Reportedly, friendly foreign intelligence services are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and  inside the US. Many foreign intelligence services of other countries, particularly medium to small sized organizations actually love being brought into US intelligence operations of any kind. It gives them the opportunity to have a place at the table with the US, there will usually be important lessons learned, supposedly good relationships with US counterparts will be enhanced or created, and most of all, there will be financial benefits courtesy of the US taxpayer.

In their recruitment operations against the US, Olson reveals that the Cubans, much as the Chinese, often benefited from non-monetary inducements, ideological  in the case of the Cubans, ethnic in the case of the Chinese. That sort of recruitment is often facilitated by the fact that many of the US citizens who worked for the DGI and the MSS essentially volunteered their services. Another noteworthy aspect of Cuban intelligence activity in the US that Olson points to is the quality of the tradecraft. The longevity of an espionage operation is largely a result not only of the skill of the handling officer but also the techniques and equipment used to run the operation securely.

Olson reveals that in 1998, the FBI broke up a large Cuban espionage operation in South Florida called the Wasp Network (Red Avispa). This network consisted of fourteen or more Cuban spies who had the mission of penetrating anti-Castro organizations in Florida. Evidence against some of the members was too thin for prosecution, but five ringleaders stood trial and we’re convicted of espionage and other crimes. One of the Cuban-American groups, the Wasp Network, infiltrated was an organization named Brothers to the Rescue. Brothers to the rescue flew aircraft in and around Cuban airspace to assist people fleeing in boats and to drop anti-Communist propaganda leaflets. The organization was clearly a thorn in Castro’s side. As the story goes, a member of the Wasp Network found out the flight plan of Brothers to the Rescue flight to Cuba in February 1996. Cuban fighter aircraft shot down the plane in international airspace, and all four Cuban-American on board were killed. (It stands to reason that the Soviet Union, which in its day essentially armed the Cuban military and security forces, would have provided Cuba with more than a rudimentary capability to monitor nonmilitary flights from the US that did not use electronic countermeasures as well as the weapons systems to shoot down from the ground and fighter-jets that could scramble and intercept Brothers to the Rescue missions. Perhaps there was a greater reason to shoot down the 1996 flight, due to someone in particular being on board or to demonstrate Cubans capability to some operatives or informants that supported the collection of the flight plan, that led to what occurred.)

While Olson gives the case of Ana Montes greater treatment in Chapter 8 “Counterintelligence Case Studies,” notes in this chapter that due was a Defense Intelligence Agency analyst arrested in 2001 on charges of committing espionage on behalf of Cuba for at least 16 years. During that period Montes passed the DGI everything she could get her hands on related to US counterintelligence efforts against Cuba. Olson writes that the tradecraft the Cubans used in handling Montes was fantastic, a credit to the art of espionage. Olson comments that it was no small feat for the Cubans to run cases as long as they did and in hostile territory under the noses of US security and counterintelligence officials without getting caught. Montes was sentenced to 25 years in prison. 

Interestingly, Olson notes here that the CIA could penetrate the KGB and sometimes count on it to make tradecraft mistakes, but it was not so fortunate when dealing with the the DGI. Perhaps Olson was a bit exuberant about presenting the DGI as a formidable foe or maybe there was some simple oversight, but the notion that the Cuban intelligence was somehow less able to make mistakes somewhat contradicts what was one of the more remarkable aspects of the Montes case as recounted in the text. As Olson describes in Chapter 8, Montes was coached by DGI on tradecraft to include erasing everything incriminating from her hard drive. He notes that Montes either did not follow instructions or they did not work because the FBI recovered a treasure trove of espionage traffic on her Toshiba laptop.

Olson goes on to discuss the case of a retired State Department official, Kendall Myers, and his wife, Gwendolyn Myers, who were arrested on charges of having been DGI agents for almost 30 years. Myers joined the US Foreign Service with a top secret clearance in 1977. Later he was given even higher clearances when he was assigned to the highly sensitive Bureau of Intelligence and Research  at the State Department. Myers sympathised with the Cuban Revolution and believed that the US was subjecting Cuban government and people to unfair treatment. His response, probably beginning in 1979, was to spy for Cuba. With help from his wife, Gwendolyn, he engaged in a full-fledged espionage relationship with the DGI. Until Myers’ retirement in 2007, he passed top-secret documents and other classified material to the DGI in a sophisticated system of dead drops and brush passes. During their trial, it became known that the Myers had received personal congratulations from Fidel Castro. The damage they did to US national security was incalculable.

As for the CIA’s recruitment of DGI officers, it was more likely that there would be a walk-in, attempting to escape from problems of their own making with the DGI. The case Olson points to is that of Florentino Aspalllaga Lombard. Referred to by Olson as Aspillaga, he was the highest ranking defector from DGI that the US ever had. Olson was directly involved in his case. In 1987, while Olson was posted to the US Embassy in Vienna, he was summoned to his office by an agreed parole indicating that there was a walk-in. That walk-in was Aspillaga, and he was accompanied by a teenaged girl who was his mistress and the daughter of an official of the Cuban Embassy in Prague. Aspillaga, had left his wife and three children and was on the run, hoping to find a new life as a couple in the US. Aspillaga offered their services to the CIA as barter.

In what Olson called a sensational revelation, Aspillaga told the CIA that former CIA officer Philip Agee had cooperated with the DGI and had been paid close to $1 million. Agee’s role as a DGI agent was later confirmed by former KGB officer Oleg Kalugin, citing his memoir, Spymaster: My 32 Years in Intelligence and Espionage against the West (Smith Gryphon, 1994) as his source. Kalugin said Agee had walked into the KGB in 1973, had been turned away as a suspected provocation, and then had gone to the Cubans. Agee, a graduate of the University of Notre Dame, joined the CIA in 1957. He served in a series of undercover assignments in Latin America in the 1960s, supposedly becoming more and more disillusioned by what he considered CIA support of right wing dictatorships. While assigned to Mexico City in 1968, Agee resigned from the agency, moved to Europe, and began his new career of neutralizing the CIA. In 1975, he published a book, Inside the Company: CIA Diary, a detailed description of his career and exposé of CIA activities in Latin America. Most damaging of all, he included the names of 250 CIA undercover officers and foreign agents (operatives and informants). thereby disrupting CIA officers’ clandestine careers and subjecting them to considerable personal risk. The foreign agents he identified were exposed to the even worse fate of possible imprisonment or execution. The CIA chief of station in Athens in December 1975, shortly after he was outed by Agee. Agee’s guilt has never been proved conclusively, but few CIA officers believe that the timing of Welch’s killing was a coincidence.

Olson states that Agee’s US passport was revoked in 1979, but he still traveled widely, mostly in Europe, for the next several years using passports provided by the leftist governments of Grenada and Nicaragua. In subsequent books and magazine articles, Agee continued his denunciations of the CIA and the US government and disclosed the identities of an additional one thousand CIA officers and agents. Olson states here that it was clear at that point that he was not operating on his own but was getting help from a foreign intelligence service. Olson does not explain or support this fact with any data. Hopefully, he is not theorizing on a hunch but is rather presenting an inference that he can support. Whenever one theorizes in such a way without fact, one makes a capital mistake. Olson goes on to explain, unfortunately, under US law at the time, the unauthorized disclosure of the names of undercover US personnel was not a crime, so Agee could not be indicted and extradited to the US. Additionally, he remarks that Agee was operating on behalf of the DGI could not be denied after 1989. Then by Olson to state Agee’s involvement with the KGB was a near certainty  because of the close relationship that existed between the DGI and the KGB. To support this, Olson points to a statement by Kalugin in Spymaster that he read reporting from Agee that the DGI passed to the KGB. Olson claims it is inconceivable to me that the KGB would let its client service run a source of this magnitude without inserting itself into the operation.

Yet, despite what Olson inferred, the data may suggest otherwise. By Olson’s own admission, the KGB rejected Agee for recruitment in 1973. Senior executives and managers at Moscow headquarters would need to reverse a decision. They may not have been that flexible. The DGI apparently rejected the KGB’s original evaluation of Agree. That seemed even more interesting to consider. Olson then reveals that in 1989, Agee played a key role in a DGI operation against the CIA. He posed as a CIA official from the inspector general’s office in a fiendishly clever recruitment operation against a young CIA officer stationed in Mexico City. Mexico City was once Agee’s beat for the CIA, at least until 1968. Still, Agree was completely unrecognizable to US Embassy security as well as Mexican authorities. Mexico City was also being watched closely as it had a well-known role as launch pad for Soviet and Eastern Bloc operations against the US, particularly California, Nevada New Mexico, Arizona, and Texas. Reportedly, Agee contacted the CIA officer and told her that he was conducting a sensitive investigation of alleged wrongdoing by the CIA in Mexico City, possibly involving senior management. He asked for her help in carrying out a discreet investigation that would not alert the targets. Agee ordered her on behalf of the inspector general not to discuss his approach with anyone. He managed to elicit significant information from the young officer.

As far as recruiting DGI officers, Olson did not provide any information on such operations being successful. Rather, from another revelation by the DGI walk-in, Aspillaga, it was discovered that all 38 of the Cubans the CIA thought it had recruited over the previous 26 years were double agents, controlled and running  against the US by the DGI. This was a devastating indictment of CIA counterintelligence, one of the worst and most embarrassing compromises we ever had. Olson laments, “The DGI beat us–and beat us soundly.” According to Olson, the CIA’s damage assessment was long and painful. The intelligence that the CIA disseminated from  the bogus agents had to be recalled since it was all DGI-concocted disinformation. The CIA’s tradecraft handling the controlled agents had been completely exposed to the DGI, which later ridiculed the CIA in a TV special for the agency’s alleged amateurishness and sloppiness. The CIA lost all the clandestine equipment it had provided to the Cuban assets, including a then state-of-the-art burst satellite communications system. Olson also considers that the cash that the CIA paid to the Cuban doubles in salaries and bonuses, ended up in the DGI’s coffers.

In a rare expression of analysis in this segment of To Catch a Spy, Olson looks at how the CIA could have walked so far into the DGI’s counterintelligence trap. Olson pointed to the following factors. First, he explains that the CIA was so eager to have sources in Cuba that looked the other way when none of the agents produced any real intelligence of value. Many of the double agents reported that they were “on the verge” of meaningful access, but they never quite got there. The CIA settled for chicken feed. Second, intelligence officers always want their recruitment service to turn out well. They do not want to admit that they have been duped by a double agent. In their desire to succeed against the Cuban target, the CIA’s handling officers rationalised away the questionable reporting, anomalous behaviors, and ambiguous polygraph results of their agents. Third, the quality of counterintelligence at the CIA during much of this period was undermined by the poor leadership of James Jesus Angleton, whose obsessive focus on the KGB and overall paranoia blinded him to other counterintelligence threats. Fourth, the CIA grossly underestimated the skill and sophistication of the DGI.

A few low key remedies may have mitigated or capitalized on the possibility the CIA’s double agents were still working for the other side. Perhaps one might be added to what Olson offered by noting that there should have been an established practice of constantly interviewing agents, even in debriefings to collect intelligence and discuss requirements. It would put extra pressure on those controlling them to try to alleviate what may be concerns of fidelity, and either improve what is being offered to placate or across to board changes in methods of communicating indicating some central control exists for all that are active. The CIA could have suddenly asked that all active agents from DGI  produce information away from the area of an existing expressed interest and measure the timing it took each to deliver the information, the sources they used to gather the information, and interview the agents to discover what background they agents would use to assure the quality of the source and identify similarities that sounded more like a scripted story. It may not  immediately smoke out and identify who were  the double agents and who was true, and none were true in the Cuban case, but it might have gone a long way to encourage the CIA to consider the possibility of deception and that their double agents were fake. 

Perhaps to go a step further, the CIA needed to ensure that those handling agents were not biased pro or con toward the double agents, and were open minded to consider the possibility of deception in a way that would not color interactions with them. (That would recognizably have been less possible in a less socially conscious agency of the past.) In some cases, CIA officers perhaps could have very steadily, yet gradually sought to convince their double agents that they, themselves, might be open to recruitment by DGI. The task then would be to wait and see if there would be an effort by their double agents to manipulate and push them to some DGI operative or officer to size them up for recruitment or whether a DGI officer would simply step up out of nowhere to size them up for recruitment. That surely establishes the double agent’s loyalties, but may lead to the opening of an entirely new door to penetrate the DGI’s operations in the US. Potential must be seen in all directions when sources are limited as in the Cuban case then, and the China case now.

These three chapters are among those in which complaints arose over Olson’s decision not provide enough answers to, and copious insights on, the many “whys” of adversarial foreign intelligence activities, left gaps in understanding the reasoning behind them. For example, there is no discussion of how within not only the respective bureaucratic system, but also under the political systems in which those adversarial intelligence services work, unwavering parameters for operating are set. From that one might better conceptualize how ongoing and future operations of those services could be sorted and categorized from apples to nuts. From that analysis, antecedents in US counterintelligence would be better enabled to understand and effectively fashion operations to defeat in going and future efforts by those adversaries.

However, it must be reminded that Olson, as he reveals in his introductory Acknowledgements, submitted To Catch a Spy to his former employer, the CIA. The Publications Review Board surely stopped anything from going into the text  before it got too close to classified information. That preliminary screening might explain why some reviewers commented that the book reads at points much as a heavily redacted document

In Olson’s case, his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any information that would provide some nuance on how the US detects and catches spies would be of the utmost interest and importance to the foreign intelligence services of adversaries as well as allies. Facts are somewhat easy to judge as they may be classified and one can reasonably determine what their value might be to an adversary. Hypotheses and arguments are a bit more challenging to judge for security reasons as certain facts, even if left out, can be viewed as being confirmed by them, seeing that those facts might alone be the sole solid basis upon which a particular inference could logically be made. Surely those hypotheses and arguments might be helpful to an adversary in developing any Red Team exercise. To that extent, security considerations may be the main reason why Olson avoids drawing too many inferences and presenting too many theories in the text. Olson would hardly be the type to neglect any precaution. However, his former employer likely preferred to be safe, not sorry.

All of that being stated, greatcharlie would to some degree concur that the portraits Olson paints of the Russian, Cuban and Chinese intelligence services are somewhat two dimensional. Drawing a perspective from military science, recall that an opposing force should not be viewed as some inert, non thinking body, waiting to be acted upon. There is an aphorism trained into the minds of mid-level Army officers at the Command and General Staff College that “the enemy has a say.” It falls in line with a teaching of the 19th Century Prussian military thinker, Carl Von Clausewitz, that: one’s opponent (in just about any endeavor, not just war) is “a living force” and military plans must factor in that what is being planned is “the collision of two living forces.” One must have respect for what an opponent thinks to be successful. More specifically, one must objectively gauge what the opponent thinks and what the opponent can do. What greatcharlie would have preferred to read would be an exposition of his presence of mind, inspiring insights, written in a clear and elegant style that would make Marcus Aurelius proud and would fit in beautifully in Meditations or Epictetus’ Discourses. One might have expected that along with an insistence the novice US counterintelligence officers become and remain dedicated to improving themselves. Such will always be a worthy theme and purpose of an offering from the expert veteran to the junior worm.

Olson’s Ten Commandments 

Of interest to greatcharlie was Olson’s discussion of his Ten Commandments of Counterintelligence. Those commandments ostensibly reflect the general sensibilities, perspectives, strategies, and tactics of US counterintelligence services. In his conclusion of this chapter, Olson states: “These are my Ten Commandments of Counterintelligence. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as a counterintelligence community, we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics or the priorities. What we should all agree on, is that strong CI must be a national priority. He then proceeds to set out what he views as the Ten Commandments of Counterintelligence. Previously published in 2001 as an article in the CIA’s periodical, Studies in Intelligence, these commandments include such concepts as playing offense rather than defense, owning the street, paying attention to analysis, and not staying in the profession too long.

The 20th century French Algerian philosopher, author, and journalist. Albert Camus, in his Notebooks, 1935-1942 stated: “You cannot create experience. You must undergo it.” Olson is not attempting to promote such through his efforts at this point in To Catch A Spy. Indeed, at this point in the text, Olson presents future and novice counterintelligence officers a leg up by providing a heads up on what they might expect. Understood is his desire to prevail upon the novice to heed certain realities and precepts that would not be included in their initial training. Two issues are in play in Olson’s discussion of his commandments, competence and commitment. Looking at each issue covered by a commandment, he seeks to instruct and counsel in advance, but he wants officers to focus on being competent in their work and understand the commitment that counterintelligence work requires. This is all very handsome of Olson. Clearly, a fair and decent man of honorable intent. His scruple does him great honor.

A concern for greatcharlie however is that at no point in his discussion of his Ten Commandments does Olson offer a thought about innocent citizens caught in a US counterintelligence web. With so many investigations that can get underway when so many foreign intelligence services are working hard in the US, as indicated in Olson’s first three chapters concerning People’s Republic of China, Russian Federation, and Cuban operations, innocent private US citizens can get caught in the mix erroneously with calamitous results for the citizen through no fault of their own. In a Constitutional republic, that is a grave error and greatcharlie believes such matters if utmost importance must be broached with those moving along in the counterintelligence track. Nil magnum nisi bonum. (Nothing is great unless it is good.)

Unpacking everything about Olson’s commandments here would require dedicating too much of this review’s analysis to it and shift its focus. It may be enough to say that greatcharlie found some disconcerting and a few exceedingly problematic. The information provided by Olson in his discussion of them sets off a kind of warning light that flashes “Beware” to free citizens of a Constitutional Republic. His commandments of particular note are: The Tenth Commandment; the Ninth Commandment; and, the Eighth Commandment. By focusing on these three of his ten commandments, the opportunity to understand and taste what creates concern is provided. They are presented in reverse order here to better illustrate the cascading development of Olson’s perspectives within them on some key matters.

Captured FBI turncoat Robert Hanssen (above). Olson states from the outset that it is a profession in which officers will go for months and even years without perceptible progress or accomplishments. Olson explains: “A typical CI [counterintelligence] investigation starts with a kernel, a fragment, or a hunch that is hard to grab onto but that demands attention. He further explains: “There is no statute of limitations on espionage, and we should not create one with our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep.” Still, he calls attention to a misdirected investigation tied to the counterintelligence case against special agent Robert Hanssen that uncovered him as a Soviet spy, He notes that investigation went on longer than it should have because time and energy wasted on chasing an innocent man. Olson does not comment on how much harm and torment, the innocent man suffered as a result of the wrongful investigation of him as a spy. No matter how singular one’s percipience, until one personally suffers an injustice of a wrongful counterintelligence investigation, one cannot really fathom how damaging, even life changing, it can be.

In his “Tenth Commandment,” Olson explains that counterintelligence requires tenacity and persistence, and that is a slow, plodding process that rarely rewards its practitioners with instant gratification. He advises that one chooses to pursue a career in counterintelligence, one should know from the outset that it is a profession in which officers will go for months and even years without perceptible progress or accomplishments. Olson explains: “A typical CI [counterintelligence] investigation starts with a kernel, a fragment, or a hunch that is hard to grab onto but that demands attention. He lists what types of information qualifies as such. He then explains how counterintelligence investigations usually start with little and face an uphill fight.” He further explains: “There is no statute of limitations on espionage, and we should not create one with our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep.” As for a rationale behind what could very well turn out to be Quixotic search for evidence that is not there against a target who may very well be innocent, Olson states: “If we keep a CI [counterintelligence] investigation alive and stay on it, the next defector, the next penetration, the next tip, the next piece of CI analysis, the next wiretap, the next surveillance report, the next communications intercept, i.e. the next four will break it for us. If US counterintelligence ever had a mascot, it should be the pit bull.” Readers must be reminded that this would all be done at taxpayers’ expense.

Hypotheses and conclusions should be predicated and driven by hard evidence, not appearances, presumptions, and surmisal, supporting a preconception of guilt. A type hubris ensnares and overwhelms the investigator much as the fisherman in Ernest Hemingway’s The Old Man and the Sea (Charles Scribner’s Sons, 1952). When moving into the realm of conjecture, anything becomes a possibility. In that realm, everyone is entitled to a hypothesis. Each one, within reason, is likely equally correct or incorrect. Less elevated reasons may have a familiar ring to some involved in counterintelligence: “Somethings got to be there because I can tell!”; “I know he is bad because I feel it!” To get an investigation of a subject where a counterintelligence officer wants it to be, the focus can shift from The actual matter at hand to a secondary search through extraneous matters–sifting through dust figuratively–for “good” information that is just not there. That will lead those officers to settle for something close enough to the truth that should never pass muster among somber and astute supervisors, but it could for others.

Preconception is abhorrent to the cold and precise mind. The pure objective truth must be the focus. It may be harder to find, but it is the true pathway to success in an investigation. True evidence must be there. Must be predicated only on a reasonable standard, logic, and the law. A thorough review of superiors, auditors is needed not simply to curtail but to provide another voice, extra eyes on the matter. Sometimes an ally looking into a matter to see and call attention to issue an investigator too close to it may overlook. The situation worsens when bent information, which can always be found or sought, may be used to support very wrong ideas. Intuition and hunches can be colored, or better yet poisoned, by extraneous matters. Before placing the full force of the powers of secret intelligence services upon a citizen to impinge on his or her rights, something more than a hunch or feeling must guide the pursuit. Tools available to US counterintelligence services for surveillance and investigation have become far more powerful and intrusive than the US Congress and even the federal courts could have imagined or conceptualized while promulgating laws on their use. A tragic consequence of a lack of strong supervision is that the punishing weight of government power that can potentially be placed on the subject with those tools, who may actually be innocent, can be harmful, damaging, and destructive. There must be constraint on the use of powerful, highly intrusive government tools to pursue a subject of an investigation. Knowing when to say when, especially since a human life is in the balance, is the mark of a true professional in any field. There must be an inner-voice or one from a supervisor that warns that an investigation could be going down a totally wrong path. In his Discourse on the Method of Rightly Conducting One’s Reason and of Seeking Truth in the Sciences, 17th century French-born philosopher, mathematician, and scientist, Rene Descartes, explained: “The first precept was never to accept a thing as true until I knew it as such without a single doubt.”

Conducting a heavy-handed counterintelligence investigation of an individual not yet found guilty of anything in a court of law can ruin that individual’s life permanently. The damage counterintelligence services can do to a subject’s psyche is well understood to be grave and considerable. Use of surveillance methods of all kinds, invasion of privacy, discussing the subject with family, friends, work colleagues in a manner that skirts defamation or fully crosses the line, using informants among neighbors work colleagues, friends, as well as family, eliminating the possibility of normal human contact, and more, all ensures nothing normal with be left in the subject’s personal life. The soul and the spirit of the subject is typically seared. Reversing the damage, is extraordinarily difficult, if not impossible. The psychological capsule in which strong willed subjects will seek refuge in order to hold on to the remainder of themselves, to survive, is never easy to break open in an effort to find them. However, there seems to be little sensitivity with US counterintelligence services to the harm done to the innocent from wrongful investigations. Olson actually calls attention to a misdirected investigation tied to the FBI’s famed counterintelligence case against Special Agent Robert Hanssen that uncovered him as a Russian [Soviet] spy, He notes that investigation went on longer than it should have and essentially glosses over the fact that time and energy was wasted chasing an innocent man. Nowhere does he mention how much harm, how much torment, the innocent man suffered as a result of the wrongful investigation of him as a Soviet spy. That speaks volumes. No matter how singular one’s percipience, until one personally suffers an injustice of a wrongful counterintelligence investigation, one cannot really fathom how damaging, even life changing, it can be.

Habet aliquid ex iniquo omne magnum exemplum, quod contra singulos, utilitate publica rependitur. (Every great example of punishment has in it some tincture of injustice, but the wrong to individuals is compensated by the promotion of the public good.) The failure to practice what the US Constitution preaches regarding life and liberty and law is reflective of an individual engaged in an investigation going off the rails. However, that individual’s frustration or any other internal conflicts, must not allow for devaluation of the system, and a devolution that can comfortably lead US counterintelligence services to regularly mimic the tactics, techniques, procedures, and methods of an authoritarian security service as stated earlier. The way of life in the US, the country’s values and interests, are not being defended. Indeed, something very different would be happening. The US and liberal democracies must be different. Government actions are founded under laws that amplify morals, Judeo-Christian values of its founders. If all that Olson declares as essential to a counterintelligence investigation is permissible as a practice in a free society, a liberal democracy as US, it stands to reason the possibilities and capabilities make the potential for harsh behavior in search of enemies far worse in China’s authoritarian–arguably totalitarian–regime.

Olson begins the discussion of his Ninth Commandment in his purest tone with the statement: “Counterintelligence is a hazardous profession. There should be warning signs on the walls of CI [counterintelligence] offices around the intelligence community: ‘A steady diet of CI can be dangerous for your health.'” Following some interesting anecdotes about officers and senior executives in CI who seemed to lose themselves in the work, Olson explains: “I do not believe anyone should make an entire, uninterrupted career out of CI. All of us who have worked in counterintelligence have seen the old CI hand who has gone spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling prey to creeping paranoia, distortion, warping, and overzealousness in one’s thinking. It is precisely these traits that led to some of the worst CI disasters in our history.” In addition, Olson notes that following a lunch with a CIA colleague who had worked for a time in counterintelligence said: “Jim, after doing CI for two years I felt the occupational madness closing in on me. I had to move on and do something else before I lost my bearings.”

Olson argues that differences in sensibilities and approaches among CIA case officers, FBI special agents, and military intelligence officers are great/disparate enough that when working together on a case, insular thinking is mitigated. Thereby, he suggests officers from different US counterintelligence services should rotate among their offices to exploit the benefits cooperation can bring. However, despite some differences among the officers in some lines of thinking, they are all from the same national security bureaucracy and their collective thinking would more likely tend to manifest greater commonalities, more similarities, than differences, having been trained and functioning in the same system. That may not be as discernible from the inside. To be frank, but not impolitic, so far, in the case of Chinese intelligence efforts in the US, no marked positive impact has been evinced from the aggregated efforts of the services.

With all of the pearl clutching being done among senior executives in the US counterintelligence service about Chinese intelligence successes in their country, taking the approaches presented in those “Ten Commandments,” out of sort of desperation, overlooking, or turning a blind eye, to aberrant situations, prolonged investigations, “tabs” being kept on former operatives and informers for no logical reason or constructive reason, obsessive surveillance, use of dirty tricks, services ou les activités pour traquer ou nuire à autrui. They can often end up becoming huge expenditures with no constructive results, only destructive ones. Being able to claim that one is on the trail of some questionable former ally might achieve some meretricious effect in a meeting to review cases–the errant officer may want to create the appearance of being a sleuthhound with a never surrender attitude–but such efforts will typically accomplish nothing to protect the US from its adversaries or enhance the country’s national security. The dreadful consequences for those incorrectly targeted, would be, as has been, the recipe for disaster. US counterintelligence, not a foreign adversary, has, and will always be, harming innocent, private US citizens in those cases. 

Supervisors and those managers of US counterintelligence services close enough to the rank and file and their operations in the field must judge the actions of officers against US citizens based on the seriousness and dignity of the claim. If there are strong concerns, there may be other avenues along which the potential problem could be managed. Suffice it to say that an investigation of a private US citizen using tools designed for trained foreign intelligence officers and networks have no good reason to be used on a citizen in a Constitutional republic. That will always be a dangerous and destructive undertaking in terms of the well-being of the US citizen. (One wonders how inspired those US counterintelligence officers who are often anxious to spend so much time, energy, and especially money on chasing tenuous leads and entertaining the slender appearance of a private US citizen’s guilt or complicity, if money was short and was being appropriated from their personal accounts. Perhaps none!)

As for another pitfall reality that taking such a harsh, seemingly ego driven approach to counterintelligence in the present day, it could lead to self-inflicted walk down a garden path and into the hands of US adversaries. Newly minted MSS counterintelligence officers in “on the job training,” which is how they do it, may very well be actually working in the field, using decoys under their trainers direction as a type of net practice for gaining and retaining the attention of foreign counterintelligence services and luring their resources, energies, and time, into endless, fruitless pursuits. The indications and implications of what is provided in Olson’s, albeit well-meaning, “Ten Commandments” are that US counterintelligence services would be susceptible to such a ploy. MSS counterintelligence could surely offer just the right amount of chicken feed here and there to support a misguided belief that the perfect “kernel” of information will be found to make a case. Such an effort could effectively distract, divert, and disrupt elements of US counterintelligence officers from engaging in more worthier pursuits against what may very well be in many cases, potentially vulnerable networks and operations of Chinese intelligence services in the US. (Interestingly, in public announcements by the US Department of Justice of a Chinese intelligence and counterintelligence operation being cracked or disrupted, there is never mention of any apparent plot to lure US intelligence services into a trap. Perchance, since Chinese intelligence services have been so successful in the US, there is no reason, no impetus to play such games. In the eyes of senior executives and managers of the MSS and senior commanders of the PLA, US intelligence and counterintelligence services may no longer be worth the candle.)

Taking draconian steps against a US citizen for allegedly, presumptively, or imaginably being tied to a foreign intelligence service when that is in reality not the case could very well compound an already difficult situation with regard to recruiting adversarial intelligence officers, operatives, and informants. The rationale for making that representation is if a US counterintelligence service accused a US citizen of providing some assistance to a specific foreign intelligence service, and the assertion is false, no group other than that adversarial service would know for a fact that the accusation is false. Even more, observing the US counterintelligence service initiate some severe, intrusive investigation of the citizen, ostensibly to better understand US practices. Surely such behavior, such practices by some US counterintelligence services would create a decidedly negative impression of the US among members of an adversarial foreign intelligence service.

“Once upon a time” there was a near universal notion of the US being “the good guy,” known for its largesse. That reputation has become a bit tarnished over time quite possibly as result of such aggressive actions by a US counterintelligence service against their own innocent citizens. If a foreign intelligence officer, operative, or informant would ever consider what would befall him or her if they left their service and country and turned to the US, the individual would need to ask himself or herself: “If they treat their own people that way, how would they treat an adversary.” Through Olson’s compendium of US activities by adversaries and his case studies, one could infer that since the end of the Cold War, foreign intelligence officers were more likely to turn to the US only if they ran afoul of their own organizations after making some egregious, irreconcilable misstep on a professional or personal level, either by their own volition or through entrapment. Such individuals would prefer to save their skins in any way possible with an intelligence service willing to accept and protect them, rather than face their superiors. One might speculate on how many occasions the choice was made by a foreign intelligence officer to turn to another country’s intelligence service such as the United Kingdom’s Security Service or Secret Intelligence Service rather than walk-in into a US Embassy or Consulate to prostrate himself or herself. Perchance some venturous officer in a US counterintelligence service might want to apply a bit of the preceding logic to the Chinese intelligence conundrum.

Perhaps one should also consider that adversarial foreign intelligence officers may chalk up actions of US counterintelligence officers performed against them, such as monitoring an opponent’s telephone and electronic communications, surveilling their movements, or striking up clandestine conversations, as a matter of them simply doing their jobs. Such thinking would form the basis of a tacit, or even an explicitly agreed upon, modus vivendi. However, it is another thing altogether for US counterintelligence officers to use “dirty tricks” against adversarial foreign intelligence officers or their families and make their circumstances unviable in the US while deployed under official cover. Boiling it all down, there must be hope, even assurance, that there will be an intelligent connection for the one who defects not a bullying connection with a US counterintelligence officer. The one coming over of course wants help in doing so, needs help in betraying his own. Those individuals are the proverbial “bigger fish to fry.”

Infamous former chief of CIA Counterintelligence, James Jesus Angleton (above). Olson initially mentions Angleton in Chapter 3 when he discusses how his obsessive focus on the KGB and overall paranoia blinded him to other counterintelligence threats. In his Ten Commandments, Olson makes note of the counterintelligence failures and abuses of Angleton, the FBI’s J. Edgar Hoover, and their subordinates, reminding of the obsessive harassment of Martin Luther King in the 1950s and 1960s, Olson states “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness. To take the discussion of such problems further, he notes: “Counterintelligence officers must be wary of what I call the ‘self-righteousness trap,’ that is, our objective cannot be so righteous and our motives so pure that we can justify inappropriate and illegal methods.”

In his explanation of his Eighth Commandment, Olson begins by reminding readers of what was mentioned in his “Second Commandment” that “some people in the intelligence business and elsewhere in the US government do not like counterintelligence officers.” He makes note of the counterintelligence failures and abuses of the CIA’s James Jesus Angleton, the FBI’s J. Edgar Hoover, and their subordinates and reminding of the obsessive harassment of Martin Luther King in the 1950s and 1960s, and then states “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness. To take the discussion of such problems further, he notes: “Counterintelligence officers must be wary of what I call the ‘self-righteousness trap,’ that is, our objective cannot be so righteous and our motives so pure that we can justify inappropriate and illegal methods.”

To explain the reaction within the national security bureaucracy and among government contractors to counterintelligence officers, Olson simply states that case officers, special agents, commanders, and other managers have a natural tendency to resist counterintelligence scrutiny. As a rationale for that, Olson asserts that they believe that they are practicing good counterintelligence themselves and do not welcome being second guessed or told how to run their operations by so-called counterintelligence specialists who are not directly involved in the operation and not in the chain of command. He acknowledges that defense contractors and other civilian bureaucrats running sensitive US government programs have too often minimized counterintelligence threats and resisted professional counterintelligence intervention. As a rationale for that perspective, Olson says they view counterintelligence officers as only stirring up problems and overreacting to them. They perceive counterintelligence officers “success” in preventing problems as being invisible and their damage assessments after compromises as usually being overblown.

In the face of such resistance, Olson proffers that counterintelligence officers must act heroically, stating: “A counterintelligence officer worthy of the name must be prepared to speak unpopular truth to power, even at the potential cost of poor performance appraisals or missed promotions. It is not an exaggeration to say that a good CI [counterintelligence] officer must be a nag–and as we all know, imperious managers do not like persistent and vocal dissent.” Intriguingly, In this discussion, Olson leaves the reader with the impression that all counterintelligence investigators are first class individuals, straight as a dart. Across all of the US counterintelligence services, a majority probably are. However, in his Ninth Commandment, he clearly indicates personal problems among them are known to arise as a consequence of the work, to repeat  included:  creeping paranoia, distortion, warping, and overzealousness in one’s thinking.  To reiterate what he writes even in this “Eighth Commandment,” Olson mentions the “self-righteousness trap” and acknowledges: “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness.” When Olson recalls from his experience how senior executives and managers in CIA shied away from acceptance of counterintelligence officers in their divisions and shops, surely he is fully aware that they could only express that choice through tidy, plausible and professional statements such as those. He also had to know that they were very likely aware of the same problems Olson, himself, indicated could exist among some counterintelligence officers. Not presuming or expecting to learn of a connection between stories of aberrant behavior by counterintelligence officers and concerns that raises among managers of departments and units, the issue may escape the impressions of many readers. To that extent, Olson, perhaps unconsciously, does say enough to invite such concerns to be among reader’s impressions either.

Iniqua raro maximis virtutibus fortuna parcit; nemo se tuto diu periculis offerre tam crebris potest; quem saepe transit casus, aliquando invenit. (Unrighteous fortune seldom spares the highest worth; no one with safety can long front so frequent perils. Whom calamity oft passes by she finds at last.) With such problems among counterintelligence officers in mind, as a “good shepherd,” the goal of any attentive and prudent manager would be to keep a potential source of undue trouble from his flock. Letting counterintelligence officers in has really become a high stakes gamble. The slightest suggestion that a manager might refuse to receive a fellow officer due to unsubstantiated concerns that he or she may be potentially psychologically unfit to carry out his or her duties appropriately or concerns that he is she may be of questionable judgment–again, based on Olson’s own statement about problems that can arise among counterintelligence officers, it could always be a possibility–could lead to sanction from the top. Olson surely must have understood was likely a tad sympathetic to such underlying sensibilities among managers within the CIA and the other national security bureaucracies about counterintelligence. If there is so much concern within the federal bureaucracies over US counterintelligence, certainly the unsuspecting, unprotected citizen has far more to fear from it. Gnawing again at the subject of the “potential” abuse of power by US counterintelligence officers, as long as there is the actuation and potential for transgressions of innocent citizens’ rights exists, there may be less to fear about China expropriation of the US role as the dominant power in the world and its usurping of citizens rights, primarily through infiltration of elite circles and election interference, than the prospect of being torn to pieces as a result of the acts, benign or malicious, of a few trusted men and women in the intelligence services and law enforcement.

Very easily the innocent, with no connection to the hideous business of a spy ring, can be caught in the same net as the guilty. It is among the innocent, carrying on by appearance in the same manner as them, that the foreign intelligence officer, operative, and informant conceals himself or herself. Suppositions based on assumptions can result in an officer initiating a case green-lit with all the necessary approvals from the top. Sentimentality to the concept of beginning, middle, and end should not compel the endless pursuit of one who may upon informed consideration may equally be found innocent. Wrongs already done cannot be righted, but an energetic effort should be made to prevent future wrongs of the same kind. Pause for thought! 

Once the track to find an individual is guilty has been taken, no one among the officers in the shop will aim to prove the individual’s innocence. The individual’s innocence becomes by the by. In these matters, perception errantly means more than reality. That imbalance in thought unfortunately has likely served to allow all formulations based on available evidence, easing in tragic results. Surely adversarial foreign intelligence services would prefer US counterintelligence service would become immersed in an investigation of an innocent party than put their time and energy on any actual part of their networks. As discussed in somewhat greater detail in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2),” it cannot be overemphasized that misidentifying an innocent citizen as an  agent of an adversarial foreign power engaged in espionage or some other act on its behalf by initiating an investigation against the individual, to include securing warrants for the most intrusive and egregious acts contrary to his or her First and Fourth Amendment Rights under the Constitution is a tragedy of unimaginable proportion and can have enormous consequences upon the life of the one mistakenly, even wrongfully targeted. 

In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. As the investigation into his alleged espionage began, Lee was fired from his job at Los Alamos by the University of California, Los Angeles (UCLA) on March 8, 1990, under pressure from the US Department of Energy, which oversees the laboratory. The news media was informed of his dismissal by an unknown source and the stories were widely reported. While his alleged espionage was being reported, the FBI had determined that Lee could not plausibly have been the source of information on the W88 passed to China. The normative hope, yet perhaps a bit of an optimistic one given the players involved, would be that once exculpatory information is discovered that could prove one’s innocence, a FBI investigation would have been halted. However, the FBI moved forward with its investigation of Lee. Although the original espionage charge was dropped by the FBI, Lee was still charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Later, Lee filed a lawsuit against the US government and five news organizations–the Washington Post, New York Times, Los Angeles Times, ABC NEWS, and the Associated Press–for leaking information that violated his privacy.

Lee and his supporters have argued that he was unfairly singled out for investigation because he was Chinese-American. Wen Ho Lee was not the enemy but has been called a victim of the blind, unfettered power of a few men with authority. That bit of humanity that should exist in each human heart was in such insufficient quantity in the counterintelligence special agents handling his case. In his book Securing the State, David Omand, former United Kingdom intelligence and security coordinator, wrote security intelligence operations—such as counterterrorism and counterintelligence—require cooperation between security officials and civilian populations among whom threats wish to hide. In the case of Chinese intelligence, this includes ethnic Chinese émigré communities, which, at least in the US, are now suspicious of the FBI. The botched investigation of Wen Ho Lee, in Ormand’s view, appeared to be politically (or racially) motivated witch hints rather than the serious security investigations they were. To Chinese-Americans, these suspicions and resulting investigations are the natural result of an unwillingness to analyze Chinese intelligence more rigorously on the basis of evidence.

Intelligence enthusiasts may find it interestingly that in a September 25, 1977 New York Times interview, John le Carré, the renowned espionage novelist of the United Kingdom who served in both MI5 and MI6, just after publishing The Honourable Schoolboy (Alfred L. Knopf, 1977), was asked about a view implied in his earlier works that no society was worth defending by the kind of methods he had set out to expose in his books. In reply, the author stated in part: “What I suppose I would wish to see is the cleaning of our own stable and the proper organization, as I understand it, and the sanitization, of the things that we stand for. I hope by that means and by those examples perhaps to avoid what I regard as so wrong with the Soviet Union.”

Double-Agent Operations and Managing Double-Agent Operations

Olson follows his commandments with a chapter on preventing counterintelligence incursions through the development of better workplace security. Improvement may be achieved, he explains, by following his “Three Principles of Workplace Counterintelligence”—careful hiring, proper supervision, and responsible promotions. Afterward, comes the chapters of To Catch a Spy that greatcharlie appreciated the most were “Chapter Six: Double-Agent Operations” and “Chapter Seven: Managing Double-Agent Operations.” In these two chapters, Olson finally presents a classical series of demonstrations. Indeed, in both chapters, Olson provides nothing less than a mini manual for precisely what the titles indicate. Readers are favored with many of the logical principles that Olson would practice and expound during training while working in CIA counterintelligence. He provides a list of benefits US counterintelligence seeks to gain from a double agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Nihil est aliud magnum quam multa minuta. (Every great thing is composed of many things that are small.)

The tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination possessed and creative ways in which double-agents were dangled to garner interest from the adversarial intelligence service, the transmission of chicken feed, ostensibly useful yet actually useless information, for the adversary to grab, and management of nuanced communications between the double agent and his handler. Olson does not indicate whether any among the practices discussed was used by him to achieve some crowning glory of his career. Again, for readers such as greatcharlie, what was presented in this chapter was meat and drink. None of the precepts included were beyond the understanding and the abilities of most readers who would be interested in the book. He tells it all in an apposite way.

Case Studies

In “Chapter Eight: Counterintelligence Case Studies,” Olson goes into some greater detail on the principles and methods of counterintelligence. Olson carefully avoids offering what may seem to some as a mere series of tales. However, it seems that Olson’s relaxed writing style, present throughout the text in fact, may distracted some previous reviewers’ attention away from the instructive nature of the discussion. In the 12 case studies he presents, Olson also illustrates the tradecraft of counterintelligence, and where counterintelligence breaks down or succeeds. He presents, to the extent that he could, how US counterintelligence officers became fully engaged on each matter. To some degree, Olson also looks at the other side of things and discusses why people spy against their country.

Each case study is followed by a “lessons learned” section. Lessons learned are the pertinent qualities and deficiencies that Olson ascribes to each case pertinent to the ongoing work of US counterintelligence services. The lessons learned are given greater value for Olson selects only what he deems most pertinent from what he witnessed, experienced, and endured as is not presumed. Again, nothing presented in To Catch a Spy is considered in the abstract. Some might observe that absent again is the severe reasoning from cause to effect that helps to solve the case. Instead, he highlights a few points of interest in each and considerable focus is put into placing color and life into his discussion of them. Two good examples of his case studies are those concerning Ana Montes and Richard Miller.

Scott Carmichael (above) was the senior security and counterintelligence investigator for the Defense Intelligence Agency and the lead agent on the successful spy hunt that led to Ana Montes. Concerning the Montes case, Olson does not deny the fact that the DGI had done the thing very completely. Of the lessons learned, the three most important to Olson appeared to be that the DIA was wrong not to require polygraph of its new employees. He applauded the DIA for having in place a policy that encouraged employees to come forward with any workplace counterintelligence concerns that they had. The report of Montes’ suspicious behavior in 1996 turned out to be inconclusive but still served the purpose of putting her on the counterintelligence radar of DIA investigator Scott Carmichael, who he heaps praise upon. Olson also notes that penetration is the best counterintelligence. Without the FBI source to raise the alarm and put Carmichael back on the scent, Olson says Montes might have stayed in place.

Ana Montes

Concerning the case of Ana Montes, which Olson touched upon in his country report on Cuba in Chapter 3, he leaves no doubt that it was a very complicated and abstruse case. He does not deny the fact that the DGI had done the thing very completely. Olson referred to Ana Montes as a classic spy. Montes worked for Cuban intelligence for sixteen years. She was indeed the embodiment of an ideological belief concerning US policy in Latin America and most of all, a pro-Cuba sentiment, as she carried out her espionage duties for the DGI diligently and effectively. Before the smash of her unmasking, Montes was believed to be a thoroughly trustworthy officer. When colleagues learned of Montes’ betrayal, it was a crushing blow to them.

Olson reports that Montes’ views against the US role in world affairs were hardened while she studied abroad in Spain as a student of the University of Virginia. Nevertheless she would eventually find employment in the US Department of Justice and receive a top secret security clearance required for her position. The espionage problem started outright when Montes, already a federal employee, began attending night courses at the Johns Hopkins School of Advanced International Studies in Washington. Montes, likely spotted by someone working for Cuban intelligence once she was heard voicing her negative views toward US policy in Central America during the administration of US President Ronald Reagan. The Cubans, appreciative of her enthusiasm, Olson believes, Cuban intelligence insisted that she leave her job at the US Department of Justice and move to a national security organization. She secured a job with DIA. Starting as an analyst on El Salvador and Nicaragua, Montes rose to become the senior DIA analyst on Cuba.

As for her espionage work for the Cubans, Montes would memorize contents of documents she saw, summarized it at home, and encrypt the material on diskettes. She received instructions from Havana by shortwave radio broadcasts, which she deciphered on her Toshiba laptop using a special program the Cubans provided her. She would contact her handler by calling from a public phone booth and sending a coded message via her pager. She would have dinner with her handler once or twice a month with her Cuban handler in a Washington restaurant to provide him with the diskettes. Montes was lavished with praise but never accepted payment.

In 1996, an alert DIA employee, practicing good workplace counterintelligence, reported his concerns about Montes to DIA counterintelligence officer Scott Carmichael. The employee noted that Montes appeared sympathetic to the Cuban cause,  and inappropriately aggressive in seeking expanded access to sensitive intelligence on Cuba. Carmichael interviewed Montes and eventually dropped the matter. However, as Olson explained, he filed away his suspicions of her for future action. In 2000, Carmichael became aware that the FBI was looking for a Cuban mole inside the US intelligence community. Only soupçons were known about the identity of the spy, except that he or she was using a Toshiba laptop to communicate with Cuban intelligence. Carmichael immediately thought of Montes, but he had little evidence to support his suspicions against her that he had great difficulty in convincing the FBI to open an investigation.

Carmichael remained persistent in pushing the FBI to open an investigation (never give up), egged on by further aberrant pro-Cuban attitudes displayed by Montes, and his efforts finally succeeded. In May 2001, the FBI threw its notorious full court press at Montes, starting with extensive physical surveillance. It did not take long for the FBI to conclude that she was involved in illegal activity. First, she was obvious and amateurish in her surveillance detection routes, often entering a store by one door and quickly leaving by another. Second, she made a succession of one minute phone calls from public phone booths, even though she owned a car and carried a cellphone. Montes’ behavior was suspicious enough to the FBI that it was able to obtain a warrant for surreptitious entry of her apartment on May 28, 2001. She was away on a weekend trip with her boyfriend. The FBI knew that this entry would be particularly dicey if Montes was a Cuban trained spy, she could have trapped her apartment to determine the intrusion. There was, however, no evidence of trapping and the entry was successful. The FBI found a shortwave radio of the type used by spies to listen to encrypted broadcasts and a telltale Toshiba laptop. On the hard drive, which the FBI drained, were multiple messages from the Cubans to Montes on her intelligence reporting, giving her additional tasking requirements, and coaching her on her tradecraft. Olson says he is certain that the FBI computer experts chuckled when they read the instructions from the Cubans to Montes on how to erase everything incriminating from her hard drive. He further comments that she either did not follow the instructions or they did not work because the FBI recovered a treasure trove of espionage traffic. One message thanked Montes for identifying an undercover US intelligence officer who was being assigned to Cuba. It was later determined that she gave the Cubans the names of other US intelligence personnel in Cuba. She blew their cover and sabotaged their mission.

As the remainder of the story goes, the FBI continued its surveillance of Montes for another four months in hope of identifying her Cuban handler or handlers. That effort was not successful, but the FBI was able to search her purse when she was out of her DIA office to attend a meeting. Inside her purse the FBI found more incriminating material, including the page rhinestone number she used to send short corded messages to the Cubans. Olson said the fear was that if Montes detected the surveillance, she would flee. When Montes was about to gain access to US war planning for Afghanistan in the aftermath of September 11, 2001, the FBI and DIA decided that they could wait no longer. Montes was arrested at DIA Headquarters on September 21, 2001. She pleaded guilty on October 16, 2002  and was sentenced to 25 years in prison. 

Of the lessons learned, the three most important to Olson appeared to be that the DIA was wrong not to require polygraphs of its new employees. He applauded the DIA for having in place a policy that encouraged employees to come forward with any workplace counterintelligence concerns that they had. The report of Montes’ suspicious behavior in 1996 turned out to be inconclusive but still served the purpose of putting her on Carmichael’s counterintelligence radar. Olson also notes that penetration is the best counterintelligence. Without the FBI source to raise the alarm and to put Carmichael back on the scent, Montes might still be in place. DGI’s activities in the US were really a mystery. Olson did well in presenting readers with a sense of the elusive nature of DGI operatives. 

As it turned out, the case did not reach its optimal potential for counterintelligence officers engaged in the investigation were unable to use available information to track down and capture Montes’ handlers or any other elements of the Cuban espionage network of which she was a part. In his investigation, the DIA counterintelligence officer, Carmichael, was able to observe, reflect, and intuit connections based.on facts not conjure a false reality based merely on appearances. Again, it is always a capital mistake to theorize in advance of hard facts. Nevertheless, it is a common errant practice. With hard facts, one is better enabled to grasp the truth.

With regard to Olson’s suggestion that the FBI computer experts likely chuckled over the failure of Montes to eliminate incriminating evidence from her Toshiba laptop, a concern is raised. Perhaps some in US counterintelligence services may feel greatcharlie is making the whole matter seem more urgent and important than it really is, but the proper comportment, displayed and demanded by supervisors and line managers, would instead have been to remain collected and aplomb with noses to the grindstone in the squad, knowing that an unexpected opportunity to exploit a failing on the part of the adversary has shown itself. It may signal that other missteps by the adversary may be present that will allow counterintelligence officers to net an even greater quarry of foreign intelligence prey. Recognizably, stresses can cause attention to shift. (Take charge of your emotions!) However, there is the need to concentrate solely on performing the duty of the moment as best as possible. Once the case is resolved, there would be time then to reflect on its many aspects. The reputation of US counterintelligence services will not suffer shipwreck over this particular matter. Olson surely did not view at all out of order as he freely revealed it in the text.

When Montes’ handlers and the managers of her undiscovered network evaded capture, they took with them all their lessons learned. (Recall her activities were not a small matter in the DGI as the informative walk-in Olson dealt with in Prague, Lombard, was read-in on her fruitful work while he was posted in Vienna.) One could have no doubt that meant it would certainly be decidedly more difficult, after the DGI presumably made necessary corrections, to uncover their activities of officers, operatives, and informants in their networks on later occasions. Surely, they would be back. (Rather than display any good humor about the matter, it should have been handled from start to finish with solemnity, especially given the indications and implications of the case.)

KGB operative Svetlana Ogorodnikov (above). As described by Olson, Richard Miller was a disaster as a counterintelligence officer, and an FBI special agent in general. However, that aspect is key to understanding the lessons the case presents not only to senior executives and managers of US counterintelligence services, but among the rank and file of each organization. Working out of the Los Angeles FBI Office, Miller was tasked to monitor the Russisn émigré community in Los Angeles. In May 1984, a well-known member of the Russisn émigré community called Miller suggesting that they meet. It turned out the caller, Svetlana Ogorodnikov, was a KGB operative dispatched in 1973 to infiltrate the Russian emigre community in Los Angeles. She got her hooks into Miller. Miller, figuratively tied to a tether right in front of the KGB, was exactly the type of FBI Special Sgent that an adversarial foreign intelligence officer would look for.

Richard Miller

As described by Olson, Richard Miller was a disaster as a counterintelligence officer, and an FBI special agent in general. However, that aspect is key to understanding the lessons the case presents not only to senior executives and managers of US counterintelligence services, but among the rank and file of each organization. Miller was a door left open that an adversarial foreign intelligence service, in this instance the KGB, was happy to walk through, and one could expect in similar circumstances that will almost always be the case.

Olson notes that Miller was hired by the FBI in 1964. After having spent time in a number of FBI field offices, Miller landed in the Los Angeles FBI Field Office where he should have found peace. However, as Olson explains, Miller, as a result of his own incompetence did not find a happy home in that office. Olson leaves no doubt that Miller was a disaster as an FBI special agent. He was a laughingstock at the office. His FBI colleagues scratched their heads in disbelief that he had been hired in the first place. In the buttoned down world of the FBI, he was totally out of place. He was poorly dressed and noticeably careless with his grooming. His weight and physical fitness did not meet the FBI’s rigorous standards. At 5’9″ tall and weighing as much as 250 pounds, he never came close to matching the stereotypical profile of the trim and athletic FBI special agent. 

To make matters worse, Miller was hopelessly incompetent. Olson says Miller begged his FBI colleagues to give him assets because he was incapable of developing any on his own. At various times, he lost his FBI credentials, gun, and office keys. His performance reviews were consistently bad, but somehow his career chugged on. In Olson’s own words, Miller was part of the FBI culture that did not turn on its own, even at the cost of carrying dead weight. With eight children, on a special agents salary, Miller was always on the lookout for extra income. Reportedly, he stole money from his uncle in a far fetched invention scam. He pocketed money that was supposed to pay assets. He ran license plates for a private investigator. He sold Amway products out of the trunk of his office FBI vehicle. He even bought an avocado farm to profit from but it went under. Miller would eventually be excommunicated from the Church of Latter Day Saints for adultery and divorced while serving in Los Angeles.

Miller’s initial work in the Los Angeles FBI Field Office was in criminal work but he was unsuccessful at that. He was transferred to goreign counterintelligence where it was ostensibly though he would receive vlossr supervision and mentorship from the Gordian counterintelligence chief. Olson notes that additionally, foreign counterintelligence was considered a dumping ground for under performing employees Counterintelligence was not highly regarded and the best people stayed away.

In foreign counterintelligence, Miller was given the job to monitor the large Russian émigré community in Los Angeles. To do that job he was expected to mingle with the émigrés and develop contacts inside that community who could keep him informed of any indications of Russian espionage. It was not hard to imagine how Miller was perceived by the Russians with whom he came in vintage. There is no indication that Miller did anything significant during that period. His career and personal life was still spiraling downward. He would later tell estimators he sometimes took three hour lunches at a 7-Eleven store reading comic books and eating shoplifter candy bars. Viewing Miller’s behavior was becoming increasingly erratic he was counseled by his supervisor and sent in for a mental health assessment. Although found emotionally unstable, and subsequently suspended for being overweight, Miller was krot pn at foreign counterintelligence. He was allowed to hang on until he reached retirement age of 50.

In May 1984, one of the well-known members of the Russisn émigré community called Miller suggesting that they meet. The caller,, Svetlana Ogorodnikov, immigrated from the Soviet Union in 1973 with her husband Nikolai. She worked as a low level source for the FBI at one point but dropped out. Her husband worked as a meatpacker. It turned out that Svetlana was a KGB operative, dispatched in 1973 to infiltrate the Russisn emigre community in Los Angeles, and if possible, assess and develop US citizens gir recruitment. She was known to make trips to the Soviet Consulate in San Francisco which the FBI would later assess were occasions when she met her KGB contact.

Olson assesses due to the timing of Ogorodnikov’s call, she likely was aware from her contact in the community that Miller was in trouble at the FBI and his personal life had become a shambles. Olson also supposes that the KGB green-lit her call after they were satisfied with an assessment of him. After traveling to the Soviet Union, where Olson believes she met with the KGB to discuss Miller, Ogorodnikov returned to the US and continued contact with him in August. She promised him cash for secrets and Miller agreed. He supplied her with secret FBI documents to prove his bona fides. Miller then met with a KGB officer. Olson explained that the KGB was not immediately satisfied with Miller. He gave his FBI credentials to Ogorodnikov who presented them to heathen  contacts in the San Francisco Consulate. The KGB wanted Miller to travel to Vienna with Ogorodnikov to meet with more intelligence officials. However, the FBI never allowed that to happen; other special agents became aware of Miller’s unauthorized relationship with Ogorodnikov. Miller was placed under surveillance by use of wiretaps, bugs, and operatives on the street.

Olson assumes Miller detected the surveillance. On September 27, 1984, he tried to convince the FBI that he was engaged in his own effort to catch Ogorodnikov. However, while being polygraphed he admitted to his malign activities. He gave Ogorodnikov a secret document. He then started keeping several other documents in his home and was prepared to present them to the KGB. Miller and the Ogorodnikovs plead guilty to conspiracy to commit espionage on October 3, 1984.

In his lessons learned, Olson focuses on the decision of Miller’s FBI superiors to keep Miller in place. He does not fault the other special agents in the office for not reporting him because Miller’s situation was well-known in the office. Olson, to some extent in the role of apologist, offers reasons for such behavior among Miller’s colleagues. Misfortune can easily come at the hands of an evil influence such as alcohol. Miller had a weakening nature to which his supervisors should have responded. Perhaps they figured they had to stretch a point in favor of a man who served for so long. However, by keeping Miller on the job, his supervisors and managers, surely inadvertently compounded the problem. They went too far to screen his many disqualifications from their own superiors, presumably to allow him to reach retirement. Miller seemingly marked his zero point when he was approached by the KGB. It stands to reason that an astute counterintelligence officer may often discover weaknesses and blind spots in himself or herself. An effort to correct the deficiency would then be in order. However, Miller was different. By all appearances, he was spent, no longer qualified to serve, but he was kept on.

On reflection, the matter seems almost ridiculous. Miller was exactly the type of FBI special agent that an adversarial foreign intelligence officer would look for. He was not a dangle, nor was he really on the prowl. He was simply a door left open to the achievement of some success by the KGB, figuratively tied to a tether right in front of them. Perhaps at the time their agents presented him as a prospect, in Moscow, they could hardly believe their luck. The opportunity was there, and the KGB operatives among the émigrés supplied the audacity to take advantage of it. 

Through his own insufficient and perhaps sympathetic investigation, he discovered no one and nothing significant among the émigrés. Anyone getting involved with an émigré community as part of a counterintelligence investigation must gird one’s loins, for with some certitude adversarial foreign intelligence services will very.likely be quietly operating among both suspicious and unwitting émigrés. The powers of such officers or operatives may seem far superior to opportunities that may present themselves, but they are deployed among the émigrés nonetheless. The erstwhile KGB and DGI, and current SVR and MSS, each organized special departments for such work. Indeed, an emigre community can very often be a milieu for spies. Perhaps Miller’s FBI superiors thought he would unlikely find trouble in the Russian émigré community, and Miller had effectively been sent to some empty corner of the room. However, they confused the unlikely with the impossible. By their experience and instincts, his supervisors should have been against Miller’s conclusions. Nevertheless, they were satisfied with his totally erroneous conclusions.

Given his history of behavior, it is very likely that during his contacts with the Russian émigré community, Miller betrayed himself with an indiscretion or two. Whatever it may have been, it was clearly significant enough to cause KGB operatives–who he was unable to detect as tasked under his original counterintelligence mission–to seize upon him as their prey. The case highlights the KGB’s–and presumably now the SVR’s–ability to figuratively pick up the scent of blood much as a shark, and recognizing there can be a good soup in an old chicken. Even more relevant to the discussion in proceeding parts of this review, it illustrated the real possibility for errant officers ro exist in plainview within the rank and file of other hardworking, diligent counterintelligence officers. Such license could only lead to some great evil. The KGB Rezident at the time would have been derelict of his duties if he had not recruited Miller, a wayward FBI special agent, who due to that errant choice made by his superiors, was placed in counterintelligence. And, given his deficiencies, it would have been a serious blunder for the KGB not to exploit all possibilities with Miller to the maximum extent.

It is likely that any other KGB comrades, who may have concealed themselves in the same roost among émigrés in which Svetlana and her confederate had set themselves and had perhaps taken to their heels once they learned those two and Miller were captured, is unclear. Further, it is unclear whether any concern was raised that there was any increased concern that other KGB operatives had continued to secrete themselves among Soviet emigre groups throughout the US. For whatever reason, Olson does not go into such details on what would have been legitimate counterintelligence concerns.

No one should imagine that this review, or any other for that matter, fully covers what Olson offers in To Catch a Spy. It presents the essence of the book, but there is so much more to discover. As humbly noted when the review started off, there nothing that greatcharlie appreciates more about such a book than its ability to stir the readers curiosity, inquiry into the author’s judgments, greater consideration of their own views on the matter, and elicits fresh insights based on what is presented. That is exactly the type of book that To Catch a Spy is. One can ascribe these positive aspects to it and many others. What one finds in To Catch a Spy is of the considerable quality. The book remains steady from beginning to end. Readers are also enabled to see the world through the lens of a man with years of experience in the world and a thorough understanding of humanity.

Whenever greatcharlie feels so enthusiastic over a book, the concern is raised that its review may be written off as an oleagic encomium. However, that is not the case, and readers will understand once they sit with the book. Despite concerns about what To Catch a Spy is missing, it would be worth reading to see what appears to lie at the base of such positions and take one’s own deeper look into Olson’s discussion. Having engaged in that process itself, greatcharlie found it thoroughly edifying. It is assured that after the first reading To Catch a Spy in this manner, one would most likely go back to the book and engage in that stimulating process again and again.

With To Catch a Spy, Olson confirmed his reputation as an excellent writer in the genre of intelligence studies. The book will also likely serve for years as an inspiration to future author’s on the subject of counterintelligence. As aforementioned, the book will surely be consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. The rudiments of counterintelligence tactics, techniques and procedures, and methods offered by Olson, to some degree, may also serve as a source for guidance Indeed, much of what is within can aptly serve as a foundation upon which they will construct new approaches. 

Further, both by what he includes and ironically by what he omits in the text, became the supplier/purveyor of a foundation upon which an honest discussion can be had among people inside and outside of counterintelligence services in free societies–well-known constitutional republics and liberal democracies in particular–can look at themselves and their organization’s work relative to the rights and interests of the citizens of the respective countries they defend. It is a conversation to which greatcharlie believes To Catch a Spy can lend support. It is a conversation in current times, especially within the US, that many citizens greatly desire to have. Without hesitation, greatcharlie recommends To Catch a Spy to its readers.

By  Mark Edmond Clark

Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago

A most apparent sign of the presence of Chinese intelligence services in Hong Kong is this plaque outside the People’s Republic of China National Security Office there (above). This essay is as a companion piece to greatcharlie’s proceeding essays on Chinese intelligence services. For the scholar who is a regular reader of greatcharlie, the essay will hopefully be an interesting discussion on the function of intelligence services in China with respect to functions of services in the United Kingdom and the US. However, this essay has the additional purpose of serving as a vehicle to assist students. For students, this essay aims to ignite an inner-conversation of issues reviewed, in this case concerning intelligence, to promote their recognition of additional parallels and the development of further insights. Hopefully, students will evoke thoughts from their respective sources and lessons, but also from personal experience, and worldviews, and produce strong insights.

For a one man shop as greatcharlie, reviewing a voluminous quantity of sources in the preparation of the July 31, 2020 and August 31, 2020 posts entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 1 and 2 respectively), was, to a degree, an exercise in large data processing. Yet, while engaging in that consuming, yet satisfying process, the thoughts of greatcharlie’s founder and editor hearken back to an assignment received as an undergraduate at Columbia College, Columbia University in a course “The Politics of Policymaking.” The course instructor, Roger Hilsman (1919-2014), who was also the student advisor and mentor of greatcharlie’s editor, asked students to construct an essay or, as he dubbed it, a “thinkpiece,” in which they were required to present their “observations, meditations, ruminations, assumptions, and hypotheses” that billowed up after reading a primary or secondary source directly related to a foreign and national security policy topic covered in his class. (The source greatcharlie’s editor used, at the suggestion of Hilsman, was Glenn Paige’s The Korea Decision (June 24-30, 1950) (Macmillan, 1968).) However, Hilsman’s goal with the assignment was to encourage students to move away from simply regurgitating what was studied and writing the derivative college essay. Instead, he wanted students to evoke thoughts from their respective sources and lessons but also from personal experience, and their albeit youthful worldview, and draw from them their best insights on the topics they chose. For Hilsman, a phenomenal educator, the assignment was not founded upon some understanding of the requirements of analytical work in international affairs developed in the abstract, but rather, developed upon substantial experience preparing his own analyses and supervising and mentoring subordinates and colleagues in their analytical work in the US military, intelligence, and diplomatic arenas; real world! More specifically, Hilsman’s background included: studying at US Military Academy; service in Merrill’s Marauders and command of an Office of Strategic Services guerilla warfare battalion in Burma in World War II (Hilsman’s valorous service is superbly related in his memoir, American Guerilla: My War Behind Japanese Lines (Brassey’s, 1990)); his work as a military planner for NATO and the Supreme Headquarters Allied Powers Europe; service in the administration of US President John Kennedy as Director of the Bureau of Intelligence and Research for the US Department of State; and, service as Assistant Secretary of State for Far Eastern Affairs in the administration of US President Lyndon Johnson.

Hilsman would not only transmit his sagacity through his “The Politics of Policymaking” course, but through discussions on policymaking and analysis that he had with students during seminars held at his residence were marked not only by the inspiration and encouragement he would give to students in their research and career plans, but also by a frankness and realism that would give them a leg up in future endeavors. The reminiscences Hilsman would share directly with greatcharlie’s founder and editor during office hours were from those periods of his life that are perhaps the most intriguing in his biography. During lectures, he would always provide a riveting anecdote from his experiences during the 1962 Cuban Missile Crisis to accompany his “pearls of wisdom.” The student-teacher relationship between Hilsman and greatcharlie’s founder and editor was mentioned in a March 8, 2016 greatcharlie post entitled, “An Look at Stephen Marrin’s ‘Improving Intelligence Studies as an Academic Discipline’ and Remembering a Professor and Friend, Roger Hilsman.”

For student readers, this essay, divided into three segments, aims to ignite an inner-conversation of issues reviewed, in this case concerning intelligence, to promote their recognition of additional parallels, and to stimulate the development of further insights. Hopefully, by focusing on the topics discussed, students will evoke thoughts from their respective sources and lessons, but also from personal experience, and worldviews, and produce strong insights. The essay also aims to foster conscious critical reading of scholarly works by student readers. Some emphasis is placed on the sources themselves. Hopefully, reading about spies and spying makes this unsolicited bit of mentoring all the more interesting. For scholars who are regular readers of greatcharlie, the aim of the essay is to provide an edifying discussion on the function of intelligence in China relative to intelligence functions in the United Kingdom and the US. This essay also stands as a companion piece to greatcharlie’s preceding essays on Chinese intelligence services. While as a thinkpiece this essay may be limited in scope, greatcharlie surely has not touched bottom of its well of ideas on the subject of Chinese intelligence services. For greatcharlie, this “multipurpose” essay is only a part of its process of worming out the story of Chinese foreign intelligence and counterintelligence. Rapiamus, amici, occasionem de die. (Friends, let us seize the opportunity from (of) the day.)

MPS officer finger-wags a warning to photographer in Beijing (above). Except for experienced hands on China policy and the Chinese intelligence services and national security via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either. MPS is an organization under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, is responsible for foreign intelligence, counterintelligence, and internal security as well.

I. MPS and MSS: Keystones of Chinese Intelligence

Two relatively quiet but absolutely key elements of the Chinese government that impact its foreign and national security policies: the Ministry of Public Security (MPS) and the Ministry of State Security (MSS). Except for experienced hands on Chinese foreign and national security policy and Chinese intelligence services via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either. MPS is an organization under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems firstly through providing consumers in Beijing of analyzed information to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, government ministers, senior executives of relevant ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions. They additionally share what is collected and analyzed with the People’s Liberation Army (PLA). At times, that information is also collected and analyzed with the help of the military. The impact of the MPS and MSS is also demonstrated through contacts their officers and operatives respectively have daily with officials and staff of foreign governments as well as personnel at all levels of Chinese and foreign businesses engaged in international trade, high-tech-firms, defense contractors, financial institutions, academia, and organizations from all fields in China and worldwide.

The true foundations for MPS and MSS were laid during the revolutionary period in which the Communist Party of China sought to establish its rule. In the early 1930s, two intelligence services existed. One was centered in Shanghai and the Communist Party, the other was based in the Chinese Communist government that existed in Shaanxi where Mao Zedong established his base after the Long March. The later intelligence service proved to be the stronger of the two. By the late 1930s, it was replaced by a newly created Social Affairs Department (SAD) within the Communist Party. Within the years of struggle against Imperial Japanese forces in China, there was the Yan’an Rectification, from 1942 to 1944, in which Mao consolidated his paramount role in the Communist Party of China. Yan’an was also the part of the ten year period in which: Mao established his premier role in the Party; the Party’s Constitution, endorsing Marxist-Leninism and Mao Zedong thought as its guiding ideologies, was adopted (Mao’s formal  deviation from the Soviet line and his determination to adapt Communism to Chinese conditions); and, the postwar Civil war between the Communists and the Kuomintang. Prior to 1949, the Communust Party of China’s main intelligence institution was the Central Department of Socialism Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces in 1949, a full array of government intelligence organizations were created to supplement Party-based intelligence services such as SAD. CDSA would draw information from foreign news agencies and open sources.

The Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. CDSA fell into the hands of Li Kenong, a Deputy Chief of Staff to People’s Liberation Army (PLA) Chief of Staff Chou Enlai and a vice minister for foreign affairs. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. According to Xuezhi Guo in China’s Security State: Philosophy, Evolution, and Politics (Cambridge University Press, 2012), it took on the role of a security service in a manner based on Soviet and Eastern Bloc models. It eventually received responsibility for all aspects of security, from regular police work to intelligence, counterintelligence, and the suppression of anti-Communist political and social groups. That led to receiving  official jurisdiction over counter subversion, counterintelligence, and the conduct of espionage in Macau, Hong Kong, and Taiwan. Overseas during the 1950s, most Chinese diplomatic missions accommodated the MPS with an Investigation and Research Office for intelligence collection staffed by CDSA personnel, with analysis performed by the Eighth Bureau, publicly known in 1978 as the China Institutes of Contemporary International Relations. In 1953, CDSA became the Central Investigation Department (CID). In China, the MPS presence was nearly ubiquitous, as it kept a watchful eye on China’s population. It was energetically engaged in monitoring Chinese who returned from abroad. To cope with what it determined to be errant citizens, MPS ran labor reform camps. MPS personnel were known for behaving harshly among its own citizens. 

MPS made its way through the turbulent 1960s with the Cultural Revolution and dynamic changes in politics in the 1970s with the loss of Mao and the coming of Chairman Deng Xiaoping. By 1983, there was considerable frustration within the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to a new organization known as the Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS. The Communist Party of China’s first big mission for MSS was to place focus on students in both China and abroad. Students had left no doubt that there was reason for the Chinese leaders to hold such concern after the Tiananmen Square protests. Chinese leaders struggled to deal with fallout from it. The sense of danger that students posed to the country was promoted with the announcement by Chinese authorities that some 200 Chinese had been accused of spying for the Soviet Union. When the reorganization of MPS was completed in 1983, it was temporarily left with only traditional police functions. Nevertheless, the change turned out to be quite positive as both organizations were allowed a new beginning so to speak.

In the West, certainly the most significant, largest, and most powerful intelligence services reside in the US. However, the foundational intelligence services that was the model upon which the main US intelligence services have been based–as well as the services of many other countries–are those of the United Kingdom, namely the Security Service, known popularly as MI5, and the Secret Intelligence Service, known popularly as MI6. To provide a common point of reference regarding the type of intelligence services and activities performed by MPS and MSS, greatcharlie, perhaps going out on shaky ground, points to parallels between their roles in China and the roles of the Security Service and Special Intelligence Service MI6 for the United Kingdom. Before going forward with discussion here, it seems appropriate to at least broach some of more apparent distinctions between the services of the two countries. Two prominent works, central to the discussion here, are Christopher Andrew, Defend the Realm (Knopf, 2009) and Stephen Dorril, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000). Both scholars undertook Herculean tasks respectively and managed to fulfill them marvelously and masterfully. Both texts respectively hold richly textured accounts of intelligence activities at home and around the world, the British Empire as it still was for a time in the 20th Century. Both are major contributions to the scholarship on intelligence in the United Kingdom.

A clear-cut comparison of MI5 and MI6 side-by-side with MPS and MSS is admittedly not possible. Plainly, there is no moral equivalence between MI5 and MI6 and their opposites, MPS and MSS. What the United Kingdom and Chinese intelligence services would call successful operations based on the respective goals of political authorities are quite disparate. Officers of the respective countries’ intelligence services are certainly not birds of a feather. Additionally, and importantly, MI5 and MI6 are the opponents of MPS and MSS, and visa-versa. Enlarging on the point of the political authorities they obey, the respective societies and political authorities, that the intelligence services of the United Kingdom and China serve, are considerably divergent, and founded on disparate philosophies. The United Kingdom is a parliamentary democracy under a constitutional monarchy. Despite having the structure, the veneer, of being a multiparty system at the national level, for all intents and purposes, China is a single party, Communist, police state. 

Quaeritur belli exitus, non causa. (Of war men ask the outcome, not the cause.) At a basic level with regard to intelligence services, moral principle and philosophy, in this case whether recognized as being based on Judeo-Christian values, Liberalism, Capitalism, Communism, Socialism, Maoism, or otherwise, is not method. Method is method. Philosophy is philosophy. Moreover, in the intelligence industry, results are what matter most. To that extent, at the basic level, the work of the two services are going to have sufficient likenesses to suggest parallels and comparisons. It is on such a basic level that the parallels and comparisons have been made in the discussion here. With this in mind, hopefully scholars will be open to considerations presented.

Two MPS officers operating high-tech optical equipment in Beijing (above). To provide a common point of reference regarding the type of intelligence services and activities performed by MPS and MSS, greatcharlie, perhaps going out on shaky ground, points to parallels between their roles in China and the roles of the Security Service and Special Intelligence Service MI6 for the United Kingdom. Before going forward with discussion here, it seems appropriate to at least broach some of more apparent distinctions between the services of the two countries. A clear-cut comparison of MI5 and MI6 side-by-side with MPS and MSS is admittedly not possible. at the basic level, the work of the two services are going to have enough likenesses to suggest parallels and comparisons. It is on such a basic level that the parallels and comparisons have been made in the discussion here.

Using MI5 as a Yardstick to Gauge MPS and Its Activities

The Security Service, known informally and hereinafter referred to in this essay as MI5, is the United Kingdom’s government agency assigned with managing the country’s internal security. It is authorized to investigate any person or movement that might threaten the country’s security. Although MI5 is responsible for domestic counterespionage, it has no powers of arrest. MI5’s motto is: Regnum Defende (Defend the Realm). The Secret Intelligence Service, known informally and hereinafter referred to in this essay as MI6, is the United Kingdom’s government agency responsible for the collection, analysis, and appropriate dissemination of foreign intelligence. MI5 has only a few thousand employees. It is headquartered in London, at Thames House. MI5 is a component of a vast intelligence apparatus in the United Kingdom. Reportedly, command and control is directed via no less than four entities: the Central Intelligence Machinery, the Ministerial Committee on the Intelligence Services, the Permanent Secretaries’ Committee on the Intelligence Services, and the Joint Intelligence Committee. Communications intelligence is the responsibility of the Government Communications Headquarters (GCHQ), which works closely with the Communications Electronics Security Group, while a number of agencies manage military intelligence under the aegis of the Ministry of Defense. Even London’s Metropolitan Police, or Scotland Yard, has its own Special Branch concerned with intelligence.

While MI5 is the agency responsible for the internal security of the United Kingdom, it primarily provides security services and intelligence operations within England and Wales. Its current role was best expressed by the Crown Minister in 1945, with regard to its postwar raison d’être: “The purpose of the Security Service is defense of the Realm and nothing else.” MI5 reports to the Home Secretary of the Home Office. It may be confused as being a domestic law enforcement organization, but it is far from that. To perform the internal security function, MI5’s activities include: domestic counterintelligence; counterespionage; counterterrorism, counterproliferation, and cyber work within the country and protective details for many top government officials. Its officers do not have authority to arrest citizens. When needed, MI5 will work in close cooperation with London’s Metropolitan Police Service (headquartered at New Scotland Yard) and other local police agencies within England and Wales. This is especially when it concerns their efforts to fight domestic terrorism. MI5 may also interface with MI6 when foreign intelligence and domestic intelligence activities intersect.

It cannot be overemphasized that MI5 is a secretive organization. Well back in 1931, the firm instruction to a new employee was: “No one, not even our own families, should be told where we worked or for whom.”  The existence of MI5 was not acknowledged officially until 1979, when Mrs Thatcher unmasked Sir Anthony Blunt as the Fourth Man in a statement to the House of Commons. Its head was publicly named for the first time in 1991. It was also at that time when some previously classified information about MI5, such as the number of its employees and its organizational structure, was made public. During the past three decades, MI5 worked its way through a number of scandals–to include incessant hunts for apparently nonexistent moles–that further tarnished its reputation in many circles. Reflective of British culture, members of the intelligence services, from top to bottom, were unwilling to display any disappointment or hurt and never looked to cry on anyone’s shoulder. They remained reticent about attitudes toward them and placid, straightforward, as they performed their work. Somewhere along the line, a solution was found. The decision was made to release their stories, not to drain themselves out, but let little bit find its ways into the public marketplace to unmask appearances public relations-wise. Through the use of surrogate voices, a sudden fracture in the marble reveals the interior. The inner life. Studies were commissioned to tell their stories, to the extent possible.

Most relevant in Andrew’s Defend the Realm to the examination of MI5 in this essay, are anecdotes loaded with insights on events that were in their time of the utmost importance. Those cases chronicalized, carefully selected from MI5’s storied past, and detailed the complex nature of MI5’s modern day work is revealed. Additionally, from Andrew’s work, one receives a picture of MI5 as a tightly-knit institution, in which many officers keep body and soul together, and others actually thrive, in its atmosphere of secrecy. Based on what has been made public, in an investigation of a threat to the United Kingdom, MI5 officers will usually seek to gather covert intelligence directly. Often, they operate openly and declare themselves as representatives of foreign intelligence services to their host country. The methods used by MI5 officers vary widely, and are often limited only by their ingenuity. Armed with a suite of the latest high-tech tools for surveillance, they will use it to eavesdrop, tap telephone calls and communicate secretly. Normally, MI5 officers will recruit spies to obtain intelligence on their behalf. 

More formally, a spy working for MI5 is known as a “covert human intelligence source,” but in the United Kingdom, spies are more commonly referred to as agents (Interestingly, in the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA), a covert human intelligence source is called an “informant” rather than an “agent.” Such agents have been consistently referred to as operatives by greatcharlie.) MI5 agents will do far more than just inform about people and events. Agents secretly provide private information to which few or no others might have access, as well as classified information to an officer. An agent will probably not be a professional “spy” but an MI5 intelligence officer will usually provide them with some basic instruction in tradecraft, espionage methods. The human relationship between intelligence officers and their agents remains a key element of espionage.

MI5’s earliest precursor was a secret service formed in 1569 by Sir Francis Walsingham, who later became secretary of state to Elizabeth I. What came to be called MI5 was formed in 1909 under the leadership of Vernon Kell, then a captain in the British army, to identify and counteract German spies then working in the United Kingdom. It performed that task with great effect. MI5 originally stood for “Military Intelligence [Department] 5.” (In fact, there were a number of departments within the Directorate of Military Intelligence–MI1 through MI19–which dealt with a range of issues. MI1, for instance, was responsible for code-breaking, and MI2 handled Russian and Scandinavian intelligence. The responsibilities of these departments were either discontinued or absorbed into The War Office, MI5 and MI6 and, later, the Government Communications Headquarters.) After World War I, MI5 remained in place as part of the United Kingdom’s effort to centralize control of intelligence functions. In 1931, MI5 was renamed the Security Service, but was still commonly known as MI5 then as it is today. About the time it was renamed, MI5 was paired with MI6, under the Defence Ministry and functioned with a “combined staff” of only two men. Kell, MI5 founder, remained in charge of the agency until 1940. During World War II, with far more staff, MI5 enjoyed a considerable number of successes. One was the Double-Cross System, which fed disinformation to Nazi Germany. For the most part, however, it is recognizably difficult to measure MI5’s success, since it can only be judged by things which do not happen, such as the prevention of sabotage. 

There was initial period of confusion at the start of World War II as a MI5 was inundated with work and had too few staff at all levels to handle it. Missteps led to “life-saving” reforms with the coming of Sir David Petrie in April 1941. MI5 is better known in the war as having achieved great success in uncovering Nazi agents in the United Kingdom. Captured Nazi records studied after 1945 indicated almost all of the Nazi agents working against the United Kingdom were captured. The exception was ine the committed suicide. MI5 managed to recruit a number of the enemy agents to become counterespionage agents for the service and fed false information to the enemy concerning military strategy during the war. MI5 executed the famous “Double Cross” system which was a deception that supported the success of the D-Day Invasion at Normandy in 1944. A proud episode for MI5 was its defense of Gibraltar from enemy agents and saboteurs throughout the war.

MI5 engaged in a hard fought struggle with Soviet, Eastern Bloc and Chinese espionage efforts in the United Kingdom. The situation was made more difficult was the rise in IRA terrorism during the Troubles. One MI5 renowned victories was its uncovering of Soviet Union’s most valuable agents was exposed. However, MI5’s record during the Cold War, actually was mixed. There were a number of widely publicized blunders during that period. The Soviet Union was found to have deeply penetrated MI5, as well as MI6 which reportedly undermined the public’s confidence in the organization.

Low morale reportedly plagued MI5 after the end of the Cold War and the Good Friday agreement of 1998, which led to massive cutbacks. The agency’s focus would eventually shift after the Cold War from counter-espionage and counter-subversion to counterterrorism. That shift was given greater emphasis following the September 11, 2001 terrorist attacks in the US, and counterterrorism became a role of the utmost importance following the July 7, 2005 and July 11, 2005 terrorist bombings in the United Kingdom. MI5’s ranks were filled out rapidly, and within it was a renewed sense of purpose. Today, counterterrorism operations still account for much of MI5’s activities. 

Not all of the anecdotes that Andrew offers spotlight the valor of its officers. There are some of the rather lurid intrigues. They include a cast of cheats, schemers, supplanters, unsavory allegiances, and unimaginable acquaintances. One dare not imagine the sensibilities of the errant individuals behind them. In the discussion of the work done within the analytical shops of MI5, the finer shades of analysis and deduction are spotlighted. Information was looked upon pathologically as the source of motives, clues, indications, and implications. With that analyzed information, MI5 leaders would speak truth other power, whatever it came upon, no matter how offensive, it was told straight.

Zhao Kezhi, State Councilor of the People’s Republic of China and the Minister and Party Committee Secretary of the Ministry of Public Security, with the top police officer rank of Police Commissioner General (above). MPS senior executives are influential members of the Communist Party of China senior ranks, What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. That is the type of relation that Chinese intelligence services have with the Communist Party from their very beginning.

Intelligence Work of MPS

If one placed the history of Chinese intelligence alongside that of the United Kingdom, one would find that the craft of intelligence was studied in China long before the idea of formally organizing intelligence activity was manifested in 16th century England. The most illustrious expressions of intelligence concepts and methods in China was in Chapter 13 of The Art of War, a treatise dating from the 5th century by the Chinese military strategist Sun Tzu. Chapter 13 focused on the importance of developing good information sources, and identified five specific types of intelligence sources along with ways to best manage each. However, the lineage of modern Chinese intelligence services,  as noted earlier, have more recent beginnings in the era of Mao. Similarities between MPS and MI5 exist insomuch that it is the Chinese intelligence service charged with internal security and domestic counterintelligence activities of China. It investigates and acts against any person or movement that might threaten China’s security, but unlike MI5, its officers have the power to arrest. In addition to its performing those standard domestic functions as an intelligence service, MPS is very much tied to the Communist Party of China to maintain control of the population and maintain the Communist order. To that extent, it has remained obedient to the ever shifting requests and requirements the Party issues to it. To be more specific concerning the responsibilities of MPS, they include: preventing, stopping and investigating criminal activities; fighting against terrorist activities; maintaining stability and order; administering to transport, fire fighting and dangerous objects; administering to household registration, identification cards, nationality as well as entry, status and exit of Chinese and foreign nationals; maintaining border security; protecting persons, venues and facilities as designated by the state; managing gatherings, parades and demonstrations; supervising public information networks; supervising security concerning state organizations, social organizations, enterprises, institutions, and large construction sites; and, guiding community security commissions.

The Communist Party of China has hardly proven to be pristine in practicing what it preaches. What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. Normally, finding the truth is sine qua non among intelligence and counterintelligence services, and law enforcement. To fail to find the truth, well-aware that one holds a paucity of facts, information and data, is to fail oneself. Naturally, being aware of the existence of information that contradicts one’s initial hypothesis and doing nothing to dig deeper is counterintuitive.  Having stated that, in the intelligence industry, the slightest deviation from the course ordered on an investigation to satisfy the requirements of the powers that be throw the rules out of the window. However, when tasked directly by the Communist Party of China, the truth lies in what the Party says the truth is. If MPS officers were to present findings from an investigation that held information contradicting the truth as declared by the Communist Party of China, they would unlikely garner understanding from their respective national provincial, or municipal senior executives and managers. In the best case scenario, the ironic admonition might come from on high to stick with the primary problem instead of rooting around at “extraneous matters.” That is the type of relationship that Chinese intelligence services have had with the Communist Party from their very beginning. They are charged with the responsibility for ensuring the tranquility of order. From outside of China, one can freely call the well-experienced intelligence officers who fill the ranks of MPS as tragedians, specializing in a very tragic role for their country.

Manifestations of Political Pushes from Behind in MI5’s Past

In examining MPS, it cannot be stressed enough that it is a political creature of the Communist Party of China. MI5’s circumstances are not remotely similar. MI5 is not an organization designed intrinsically to service the political interests of political authorities. However, there have been occasions when political authorities have misused the vital security arm by using pressure to influence its actions, for purposes that were questionable. Shockingly, the MI5 carried out secret surveillance of the colonial delegations which came to London to discuss terms for independence in the 1950s and 1960s. Andrew gives a disturbing account of the stealthy gathering of intelligence on the delegates attending conferences which negotiated the independence of Cyprus and Kenya. The Home Secretary, Rab Butler, cynically condoned these operations on the grounds that “obviously the product was of great importance and of great value to the government negotiators”.

In most of the British Empire, claims Andrew, MI5 contributed to a smooth transfer of power through the work of its liaison officers. However in Guyana, where United Kingdom Prime Minister Sir Winston Churchill wanted to “break the Communist teeth,” a shameful exception was witnessed. MI5 obediently provided support for the United Kingdom and US covert action to oust the democratically-elected Cheddi Jagan from power. Andrew claims that the dominant intelligence agency in the years leading up to Guyana’s independence in 1966 was the Central Intelligence Agency (CIA). However,  MI5, and thereby the government of the United Kingdom, nevertheless had a hand in the affair. 

In the present day, such outcomes are certainly not intended in MI5, an organization tasked and trusted to protect and serve the United Kingdom. To ensure that remains so, the Ministerial Committee on the Intelligence Services exercises regular ongoing oversight of intelligence activities. Through this committee, the Prime Minister, with the assistance of the Secretary of the Cabinet, exercises authority over the daily operations of the British intelligence and security communities as a whole. The Home Secretary oversees MI5, as well as the National Criminal Intelligence Service and Scotland Yard. To the extent that there is always the need for such a degree of oversight from above, one must never overlook the shadowy side of the business. It is at the core of intelligence work. There is a reality that by doing the dirty work, the people of the United Kingdom are allowed to sleep peacefully at night. When the situation is dire and urgent enough, use has been made of agent provocateurs who may take direct action to maintain their bona fides within their groups for the organization’s purposes.

Today, officers join and serve MI5 with the belief that its work has much to do with the wider good. As the targets of MI5 efforts are the terrorists or the war criminals or the nuclear proliferators. There is an understanding how the need to approach a matter of the utmost importance with the most effective method available can subordinate all else. Whether or not exigent circumstances permit, there at least exists the earnest aim among them to defend the values of the United Kingdom’s liberal democracy. Unlike its counterpart in the Chinese intelligence services, MPS, causing harm to the free people of their own country, who are living within the law, is never the intended purpose of MI5. Indeed, while also ostensibly tasked and trusted to protect and serve the people of their country. MPS keeps a boot not only to the neck of criminals and true threats within China, but of groups of innocent citizens labeled as undesirable by the Communist Party of China, and doing that appalling work at the Party’s behest, to be frank, could be ascribed as an essential part of their raison d’etre.

Other Ugly Truths

As long as humans are involved in an organization and its plans and activities, rarely will outcomes be perfect. It could be expected to be imperfect shaped by mistakes, misjudgments, biases, and emotions. To that extent, there is no purpose here to establish MI5 as a paragon of moral behavior. In its history, mistakes were made. Pointing to them means admitting to the truth. (Interestingly, the historical record indicates the nearly contemporary national intelligence service has suffered from its share of mistakes.) What can be greatly appreciated in Defend the Realm is that Andrew tells the MI5 story straight. The ugly truth as told, creates some disappointment, yet from it, lessons were certainly made available that would allow for the organization’s improvement. According to Andrew, recruitment within MI5 was perhaps the most outward expression of inward thinking in the organization. It was surely not acceptable by today’s standards intellectually, morally, ethically, and professionally. Indeed, within the organization itself, MI5, a public service, did not advertise openly for recruits before 1997. Up to that point, recruitment was based on personal recommendation. This was a narrow social group, many of whom had served in India or elsewhere in the Empire. To that extent, the organization was sure to recruit “from good Anglo-Saxon stock.” Reportedly, male officers listed their recreations as cricket and hunting, while female officers were graduates of elite schools and universities

Right up to the mid-1970s, the post-war Security Service refused to recruit Jews on the grounds that a dual loyalty to both Israel and the United Kingdom might create a conflict of interest. This was “inexcusable,” Andrew rightly observes. There was also a very disturbing attitude taken toward Blacks interested in joining the Security Service. In 1949, then Deputy Director General Guy Liddell told the Joint Intelligence Committee: “It was true that niggers coming here often went to the C[ommunist] P[arty].” That fact that he held such appalling racist views were reinforced when he explained there was no doubt in his mind that “West African natives are wholly unfitted for self-rule.” There was a sour spirit to it all. Yet, that was the spirit of the moment. A sort of “pigs in clover” self-satisfaction influenced and distorted thinking in the world of that past era.

While MI5 was busy keeping some citizens out of its intelligence service, its rank and file was surprised to discover who they had let in. In 1951, as the result of the decrypted telegram of the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, that any of the Cambridge Five–then current or former all MI5 or MI6 employees, who were recruited as spies by the Soviets in the 1930s when they were young misguided Communists at Cambridge University–were identified. The bombshell revelation sent shock waves through the halls of MI5. In response, MI5 initiated an investigation that lasted 30 years in order to get to the bottom of the matter.

Among other unfortunate episodes for MI5 was the “Wilson plot” of the 1970s in which United Kingdom Prime Minister Harold Wilson was accused of being a Soviet agent–the information came from the CIA’s Counterintelligence Division, James Jesus Angleton based on claims of questionable source. MI5 investigated the claims and found them to be false. There was also the “Death on the Rock” case in 1988 in which MI5 with Spanish authorities were alarmed about three members of the Provisional Irish Republican Army (IRA) Belfast Brigade who travelled to Spain. It was presumed that they planned an attack against British troops in Gibraltar. MI5 intended to capture the IRA members with the assistance of the British Army’s Special Air Service Regiment cooperation of Spanish Authorities, but all three were killed in the process.

Zhao Kezhi, State Councilor of the People’s Republic of China and the Minister and Party Committee Secretary of the Ministry of Public Security, with the top police officer rank of Police Commissioner General (above). MPS senior executives are influential members of the Communist Party of China senior ranks, What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. That is the type of relation that Chinese intelligence services have with the Communist Party from their very beginning.

The Communist Party of China’s Political Manipulation of the MPS Today

It would appear that the leadership of the Communist Party of China is usually distressed exceedingly when even the mere suggestion is made that some underlying evil is present in the decisions and actions of the Chinese government towards its own people. There is the insistence by the Communist Party of China that it acts only in their best interests and the thinking behind each choice is gifted by what their Western counterparts would call scruple. Thus, when any reports, photos, or videos of the actual treatment of ethnic and religious minorities in China are secreted out of the country and headlined in the West or anywhere else in the world, it is nothing less than an absolute disaster. The belief among Communist Party of China’s leadership and members that China’s Communust society is near perfect and would be best for the world is a belief in a false reality. The prospect of any citizen or any foreigner, unmasking the appearance created by Beijing of China being an advanced industrialized society and superior culture truly seems to terrify the Communist Party of China. Burned rotten by somewhat regular investigative reports and exposé documentaries, written and produced in the West, they, without fail, will attempt to cover their traces rather than spill it out. Government and Party spokespeople will roar about China’s innocence and the false and bizarre nature of what is reported. Trying to figuratively get the toothpaste back into the tube has never worked though. Focusing on what it can control, the Communist Party of China engages continuously in an effort to grease the wheels of citizens thinking to ensure that it always slides in its favor and toward appreciation of the Communist Revolution. To stanch the thickening of misgivings among the Chinese people toward its actions, ever present are warnings to citizens to guard themselves against foreign agents, look upon foreigners with some suspicion, and be cognizant of the possibility of unwittingly giving cause for foreign agents to trace them and spot them as potential recruits as spies and informants through seemingly innocuous contact.

The Communist Party of China has long acknowledged that there is always a threat that could arise from the “unsuccessful” education of Chinese citizens. A symptom of that would be the attraction to materialistic symbols of success for the former bourgeoisie class apparatus of success: business success, homes, cars, things constructed around people. It was what identified them as being above the proletariat, the working class. In China, given its relative prosperity, there exists the fear among leaders of the Communist Party and government bureaucracies that the bourgeoisie existence of the West would insinuate itself in the thinking of Chinese citizens and become a preference in their minds. Any aspiration created for what the West has to offer not under controlled circumstances could figuratively spread among the people much as a virus, infecting the proletariat, potentially creating some mass disaffection toward the system. Perhaps such sensibilities reveal a secret doubt that Chinese citizens could see that so-called ideals of Maoist Thought and Marxist-Leninism had been betrayed or perhaps were simply Utopian, and that they would desire great changes. Communist Party of China leaders determined long ago that the response to this threat needed to be strong enough to match “the severity of the disease.” 

As part of its efforts at population control, the Chinese government insists that the people keep a watchful eye over threats to the new system. It was understood that the reactionary, the counterrevolutionary, most often “hiding in the shadows,” posed the greatest threat and was viewed as anathema. It was in the performance of the mission to discourage, punish and obliterate that threat that the MPS earned a reputation for being the horrifically oppressive cats paw of the authoritarian regime. The MPS has interfered in interactions and relationships between citizens, ordered citizens to spy on their fellow citizens, demanded that they betray one another, regularly performed intrusive and demeaning searches of citizens’ person, homes, and workplaces. There have been arrests of many innocent citizens, accompanied by abusive and endless interrogations. The shadow of sudden death hangs over the head of any individual in MPS custody.

As of late, what should be of greatest concern is the approach the MPS has been taking toward foreign visitors. (The matter is elaborated upon later in this essay.) As a practice, foreigners, especially, Westerners, are closely observed and often investigated by provincial offices and local MPS stations. Under such circumstances, there is always a real possibility that one might be arrested or “briefly” detained for questioning, would be created. Foreign visitors who have faced such treatment have almost immediately become the center of a frightful international incidents, which is actually the goal of Chinese authorities. Regardless of one’s status in the US, it can happen in China. Reportedly, the attempt has been made with some foreigners to persuade with the pressure of interviews, interrogation, and detainment or use certain manipulations to convince them to let themselves go and reveal “the truth.” Telling the truth would mean copping to preconceived ideas held by their interrogators about their alleged wicked missions against the People’s Republic of China. The treatment of Chinese citizens detained by the MPS for even lesser “offenses,” is always decidedly worse.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.) Spin concerning the maltreatment of ethnic and religious groups is propagated through narratives in the state-run news media of how much the Communist Party of China is doing to protect China from enemies, domestic and foreign, at the hands of which the Chinese people have suffered for so long. Nevertheless, a good number of Chinese people are aware that one cannot know with certainty what is real from what one hears from the government. However, holding a secret doubt about the system in China can lead to a solitary despair. The secret doubt becomes dissatisfaction with one’s work and one’s situation which can become a full-blown loathing of the system. Soon after may come the rejection of authorities. In response to conditions forced upon them, being subjected to humiliations, Chinese citizens of some ethnic and religious minorities have acted in protest, releasing a sense of frustration. Becoming vocal may relieve his sense of frustration for the moment will only open the door to far greater problems. To Chinese government authorities, it represents nothing less than a social dissembling within those groups.

Loyal Communist Party members can hardly understand that any other citizen’s disillusionment or disappointment in government efforts to respond to their needs could be based in logic. Thereby, the attitudes of those citizens are irrational and reactionary. Surely, those approached by MPS display intense emotions, very likely overwhelmed by great fear and sheer terror, given an expectation the worst will befall them given the organization’s reputation, would avail themselves to be apprehended and held indefinitely as their situation would immediately be converted into a psychiatric issue. After all, any charge will do. The goal is to cull the so-called threatening population by plausibly arresting benign citizens and warehousing them away from their homes. One can only imagine that it would mean for those declared to have psychiatric issues to be placed in the hands of medical professionals linked to the MPS. MPS officers are apparently not timid to draw very false, aberrant, far-fetched inferences from fact collected during investigations. Of course, no professional ethics, no moral principles founded upon religion, and no less spiritually based philosophy of humanism could not obstruct such actions. Ethnic and religious minorities must feel akin to big chickens in a world of foxes.

Tibetans detained by MPS officers facing judgment in court (above). China has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability.

A principle is a precise standard, a course of conduct you are committed to, a way of life that you live by. Adherence to principles, has little meaning to the Communist Party of China unless the principles adhered to are those of the Party. Publicly available sources show that Beijing considers Falungong, Tibetans, Uyghur Muslims, democracy activists and pro-independence Taiwanese undesirables as they adhere to principles and a way of life adverse to that insisted upon by the Communist Party of China. They have been named the “five poisons” that constitute the greatest threat to Beijing’s rule. Tibetans, Uyghur Muslims, in particular, are essentially looked upon as vindictive ill-balanced creatures of China’s hinterland.

As noted here MI5 unfortunately has a record of past mistakes and poor judgment, too, and fortunately from that history, lessons have certainly been learned. Yet still, making mistakes and misjudgments is a far cry different from being deliberately bad, acting the name of injustice and engaging in cruelty, based on a contrived motive and without any reasonable provocation. MPS currently engages in activities which, not to apportion wickedness, manifest just how different the two intelligence services really are. MPS, as an organization, espouses great anger about ethnic and religious minorities, dubbing them activists, reactionaries, counterrevolutionaries, and terrorists, and for the sake of the Communist Party of China and the Communist Revolution, has done what it does best, acted aggressively toward such “threats.” If one is of a ethnic group or religious groups at variance with the Communist Party of China, and consequently under the thumb of the MPS, one will have the sense of being in contact with an evil of an exceptional nature. In recent years, egregious abuses have increased through government policies under the pretext and justification of fighting the “three evils” of “ethnic separatism, religious extremism, and violent terrorism.” 

Tibet is an autonomous region in the People’s Republic of China. The region has historically been the home to ethnic Tibetans, among others ethnic groups. It is the spiritual home of Tibetan Buddhism and the traditional seat of the Dalai Lama. China  has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability. Omnis enim ex infirmitate feritas est. (All savageness is a sign of weakness.)

Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.” A commonality among the homelands of the different ethnic and religious groups in China is the fact that they are depressed regions with unemployment, poor infrastructure and many structures tumbled down. Interdum volgus rectum videt, est ubi peccat. (At times the world sees straight, but many times the world goes astray.) 

Uyghur citizens seated in formation in a detention center (above). Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.”

Regarding religious minorities, during the first thirty years of its existence, the Communist Party of China committed itself to making atheist Marxism the fundamental ideology of the country. depriving the Chinese people of their constitutional right of religious liberty. There is a clarity and certainty that comes from being able to know another’s origins. One place to look to identify, research, is to study a the  of culture, history, customs, that may shape the subject’s attitudes and behaviors, worldview. Adherence to religion, culture and identity as well, stiffens resistance to authoritarian pressures and coercion, and girds uncommon perseverance. To that extent, the Communist Party of China surely fears citizens’ adherence to their religions and cultures, and the rejection of Communism. In response to that threat, Beijing has formulated and implemented new policies, regulations, and legislation impacting religious freedom have been created and implemented, particularly since 1979. The idea of it all being to surgically strip citizens of their ethnicity, culture, and religion, thereby smother the individual’s identity, leaving the individual with nothing to grab onto, except Mao’s teachings on Chinese Communism. In the report of the US Congressional Executive Commission on China (CECC), 2017 Annual Report 127 (October 5, 2017), it is noted that Chinese authorities commonly prosecute Falun Gong practitioners under article 300 of the People’s Republic of China Criminal Law. That information was found on the official Chinese government “anti-cult website.” In February 2018, a woman in Beijing was convicted of “using cult organizations to obstruct the enforcement of laws” under article 300 of the Criminal Law. The woman was sentenced to one and half years in prison and a fine for publicly advocating “the evil cult Falun Gong.” Falungong, essentially an anti-Communist China spiritual group, was banned by Beijing in 1999, having been labeled an “evil cult.”  In 2014, a leader of the Church of Almighty God, a quasi-Christian group also known as Eastern Lightning, was also convicted of “using cult organizations to obstruct the enforcement of laws” and sentenced to four years in prison. That church is now officially banned.

Reportedly, MPS has detained or otherwise restricted the freedom of Catholic leaders in both the underground and official churches. The government has reportedly pushed for Chinese Catholic bishops to be selected through the patriotic religious organizations and then ordained by Chinese bishops without the involvement of the Holy See. Chinese officials have also reportedly subjected Protestant Christian beliefs and practices to a wide range of restrictions. Beijing reportedly pressured unregistered house churches to join the officially recognized religious organization, the Three-Self Patriotic Movement. Protestant house churches faced raids during church gatherings, eviction from meeting spaces, and official bans on worship. Martin Luther King, Jr. said that “The moral arc of the universe bends toward justice.” While that may be true, it surely has not bent so much in China’s direction yet. Iniqua nunquam regna perpetuo manent. (Unjust rule never abides continually.)

II. The Role of the MSS in China’s National Security Bureaucracy

As aforementioned, Chinese intelligence services, in terms of task and purpose, work within an authoritarian government and must be viewed as a different kettle of fish than the services of the United Kingdom. Having created the space and acquiring the flexibility over the past few decades to allow the service to evolve into the elite, very capable intelligence service the Communist Party of China originally wanted it to be, MSS senior executives and managers have now figuratively declared “game on” to China’s competitors and adversaries. The mission, as originally intended, has not changed much since 1983. Overall, it is now defined as collecting solid intelligence from the inner workings and the very top of foreign military, diplomatic, political, economic, financial, scientific, educational, media, communications, and social institutions. By conventional wisdom, one might proffer those are its priorities. It is surely what Beijing wants now and it is what MSS is chasing after. Its tactics, techniques, procedures and methods are surely more refined than ever before. As previously mentioned, Western intelligence services until recently have habitually underrated the abilities of Chinese intelligence services. That was a mistake. Central to greatcharlie’s understanding of China’s intelligence services and their activities are the writings of Peter Mattis. Since leaving the CIA where he was a highly-regarded analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis’ writings evince an appreciation of the depth of thought, organization, and planning Chinese intelligence services have put into building up their organizations and conducting operations in all areas. To that extent, he proffers that the West as of late has been facing very modern, competitive Chinese intelligence services that make use of tactics, techniques, procedures, and methods at a level equal and in some cases far more competitive than those of Western intelligence services. As he explained in a September 2012 article in Studies in Intelligence entitled, “The Analytical Challenge of Understanding Chinese Intelligence Services,” Chinese writings on intelligence bear remarkable similarity to familiar US definitions of intelligence functions and goals. He reminds that Sun Tzu taught that “foreknowledge” (xianzhi) allowed commanders to outmaneuver opponents. However, he notes more modern definitions range from “activating [catalytic] knowledge” (jihuo zhi-shi) to information to protect national security, domestic stability, or corporate interests in a competitive environment. Mattis goes on to state that Chinese military scholars today frame intelligence as a distinct subset of knowledge, defined by its relevance to decision makers and a competitive environment. Specifically, intelligence is transmittable (chuandi xing) and is knowledge that satisfactorily (manzu xing) resolves a specific decisionmaking problem. He further asserts that empirically, Chinese intelligence officers consistently have demonstrated the use of widely practiced professional tradecraft, having successfully exploited for political and military intelligence purposes agents with vulnerabilities familiar to anyone who follows the subject.

The Minister of State Security, Chen Wenqing (above). Chinese intelligence services target a broad range of national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities of the United Kingdom, the US, and other advanced industrialized countries. Lately, the chief feature of the intelligence war between those countries and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its corporate victims.

Using MI6 as a Yardstick to Gauge the MSS and Its Activities

Everyone on the outside has their own version of what MI6 is and does. Looking at MI6 as a yardstick to understand the MSS, the two organizations pair up to the degree that both are foreign intelligence services. The United Kingdom’s MI6, formally the Secret Intelligence Service as mentioned previously, is the government agency responsible for the collection, analysis, and appropriate dissemination of foreign intelligence. It is also charged specifically with the conduct of espionage activities outside of the United Kingdom’s territory. The MI6 motto is Semper Occultus (Always Secret), but the organization states as its mission: “We work overseas to help make the UK a safer and more prosperous place.” Much as MI5, MI6 has only a few thousand employees. It is headquartered in London, at Vauxhall Cross. It is a component of the same intelligence apparatus in the United Kingdom as MI5. 

MI6’s four main areas of focus are: countering international terrorism, combating weapons proliferation, supporting stability overseas and securing the United Kingdom’s cyber advantage. Countering international terrorism means exactly that, protecting the United Kingdom from terrorists. Performing that task entails: gathering and assessing intelligence; conducting investigations and disrupting terrorist activity; preventing people from becoming terrorists; and, protecting critical national infrastructure and crowded places. Through gathering intelligence and disrupting operations, MI6 plays an indispensable role in the United Kingdom’s counter weapons proliferation efforts directed at combatting the international proliferation of chemical, biological, radiological and nuclear weapons. Working in cooperation with key national and international partners as the US, MI6 also helps to ensure that the United Kingdom’s weapons exports never fall into the hands of terrorists. Instability and conflict overseas leads to weak governments and poor national security, and nurtures a fertile environment in which terrorists and organized crime groups can thrive. Using agents, the MI6 provides intelligence to government policymakers and decisionmakers and provides early warning indications of potentially hostile threats. Most often that information can lead to early political intervention to prevent prolonged instability. Cyber threats are a key security risk to the United Kingdom, as they have the potential to disastrously impact individuals, organizations and governments. Global and ever becoming increasingly complex, cybercrime has the unusual characteristic of having the potential to rear its ugly head and reach out from anywhere in the world. The MI6 provides secret intelligence to help protect the UK from current and emerging cyber threats across a range of adversaries such as hostile countries, terrorists and criminals. Additionally, MI6 conducts counterintelligence operations via a furtive counterintelligence section, but it is generally understood that the organization shares that work with MI5.

In order to meet the challenges of their work, MI6 officers are highly trained in the tactics, techniques, procedures, and methods of their profession. Within intelligence services, as noted earlier, it is referred to as tradecraft. High on the list skills learned and honed are espionage techniques and the use of agents. Often MI6 officers may operate openly in their host country, declaring themselves as representatives of the United Kingdom’s foreign intelligence services. Otherwise they will work covertly under the cover of other official positions such as diplomatic staff or trade delegates. Some MI6 officers may operate under non-official cover to conceal the fact that they work for an intelligence service. That usually entails posing as a business person, student or journalist for example. In some cases MI6 officers will operate under “deep cover,” meaning they will use false names and nationalities. In the intelligence industry, such officers operating under such cover are referred to as “illegals.” They operate without any of the protections offered by diplomatic immunity. MI6 officers typically seek to establish networks of agents whom they can use over a sustained period of time, so that they can obtain a reliable flow of information. As it was stated in the aforementioned discussion on MI5 agents, MI6 agents operate by exploiting trusted relationships and positions to obtain sensitive information. They may also look for vulnerabilities among those handling secrets. They may be aware of flaws in their organization’s security that they can exploit. Recruiting agents, both foreign and domestic, who can provide intelligence on terrorist plans and organizations is of the utmost importance to MI6 officers.

MI6 was constituted in its present form in 1912 by Commander (later Sir) Mansfield Cumming as part of the United Kingdom’s attempt to coordinate intelligence activities prior to the outbreak of World War I. In the 1930s and ’40s it was considered the most effective intelligence service in the world. Following the rise to power of Adolf Hitler in Germany, MI6 conducted espionage operations in Europe, Latin America, and much of Asia. When the US entered World War II, MI6 helped to train personnel of the US Office of Strategic Services (OSS). As mentioned, it was the organization in which Hilsman served. Much of OSS’ foreign intelligence and counterintelligence tradecraft was adopted from MI6. Indeed, the CIA still uses much of it today. Reportedly, many “old boys,” veterans of the OSS are fond  of saying, “The Brits taught us everything that we know, but certainly not everything that they know.” The two organizations worked closely during the war. MI6 has since cooperated extensively with the OSS’s successor, the CIA. MI6 senior executives, managers, and officers refer to the US intelligence organization the “American cousins.” Details of MI6 operations and relationships have rarely appeared in the press. In the mid-1950s, the public reacted with consternation when it was revealed that MI6 had been penetrated by double agents who had served the Soviet Union since the 1930s. It was not until the 1990s, that the head of MI6 was publicly named for the first time. Still, information about MI6 is still much more closely guarded than that about MI5, which carries out internal security and domestic counterintelligence activities. The agency has the power to censor news accounts of its activities through the use of “D” notices under the Official Secrets Act. MI6 reports to the Foreign Office.

Stephen Dorril’s work, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service, is a true reflection of the organization, its people and its history, what it has done and where it has been most influential . Dorril, a meticulous observer and chronicler of the security services, demonstrates an understanding of everything one might have thought about MI6. Through the text, readers learn that MI6’s postwar activities were mired in prewar attitudes and practices. Many in the United Kingdom imagined the foreign policy task dividing up the world with US and other global powers. Instead, the preoccupation was the Soviet Union and the Cold War. In chronicalizing the Cold War segment of MI6’s history, Dorril fills the pages with anecdotes of its most spectacular failures, stirring successes, unsavory plots and bizarre missions, the real-life cloak-and-dagger world is exposed. There is a discussion of Operation Stalin, which exploited the Russian dictator’s paranoia and led to the execution of thousands. There is another about the tunnel MI6 dug beneath the Berlin Wall. During the Cold War, in the intelligence war, it seems that there was no opportunity, in the midst of his work against the Eastern Bloc and more the Soviet Empire, to view matters from a broader or humane perspective. Surely, with the benefit of hindsight, it is easy to enumerate all of the mistakes, poor choices that were made. By 1992, influence abroad had been lost in the Middle East, most of Africa and large swathes of Asia. The United Kingdom was not exiled and isolated as some might suggest. It was then and remains a key partner to the US with its superpower status, and often takes lead from the US, the main push was to abrogate the world’s resources. In the post-Cold War era, there was once again a sense, particularly in the administration of US President Bill Clinton of the West’s entitlement to the world’s spoils. That rush to take what was available was intensified by the need to get to what was out there before the People’s Republic of China did. Political power seemed to embrace corporate power. As a consequence, there was the appearance that corporate power was supported by government power. MI6, one of the great information-gathering organizations of the world, was put to that task, placing some strains on the service.

The book presents a well of extraordinary characters. As alluded to earlier, the lion’s share of what was told is meat and drink for those who enjoy spy novels, but it is all real. Yet, in addition the book presents the similitudes of the intelligence industry with profoundly human stories. The world of the intelligence officer is often a dank and grey one, visceral, boring at times. There is a drudgery about agent running. Doing chores in the analytical shops can be tedious. One is invited to understand the suffering and sacrifices of MI6 officers. Prerogatives are surrendered, loves, passions, moral ambiguities, moral compromise. Many officers fall off, finding satisfaction in other professions and pursuits, others engaged in betrayal, a few entered the device with the objective of spying. As with MI5, MI6, as a dynamic, intelligence service, operating worldwide, has a history riddled with complexity. Stories of unpleasantness are even found in Dorril’s authorized study, too! The more counterintuitive these acts are from the past, the more puzzling they are. In such an old, but odd profession, if one finds oneself doing odd things, the hope would be to catch oneself out when one is so far out of bounds that nothing good is being accomplished.

The People’s Republic of China Embassy in Washington, DC (above), home to the MSS resident in the US. Much as it was the case during the Cold War with Soviet and Eastern Bloc intelligence services, it remains a penchant today among the Chinese intelligence services, to troll the émigrés who have made their way out of those countries. They will go as far as to twist their tails to garner their cooperation as operatives and informants. There is almost an insistence that even having left China, the émigrés must accept China’s iron rule. It may appear to be daylight madness, nevertheless, it is happening. In the recent case of an New York City Police Department officer was alleged to be supporting the intelligence activities of the Communist Party of China’s intelligence organ, the United Front Work Department. That case brought to fore the fact that Chinese intelligence services work hard at compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats.

Present Day Focus and Operations of MSS

MSS, as well as other Chinese intelligence services, target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. Lately, the chief feature of a defacto intelligence war between West and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its corporate victims. To understand the intelligence efforts of MSS, one must understand how guIding concepts from Deng Xiaoping led to a decision by Chinese intelligence to make economic espionage an even greater emphasis. Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. The Communist Party of China’s aim was to raise the country’s gross domestic product by 7.5% annually for the next five years. In order to achieve such rapid economic growth, However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Further, the increased demand for raw materials such as oil and iron ore, and new environmental and labor laws led to cost increases, making manufacturing in China more expensive which caused some factories to close. China sought to diversify its economy, for example, through the manufacture of better made high end products. However, that diversification of the economy required the Chinese to increase their knowledge of design and manufacturing processes. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government, and receive intelligence collected by Chinese intelligence services. Those firms have also proved to be capable of engaging in commercial espionage themselves. To get an idea of how well the MSS operates, one only needs to consider its ongoing activities in the US. Without the intention of tarnishing or being beastly toward US intelligence and  counterintelligence services, and law enforcement, they have been unable to prosecute a successful, fruitful, and victorious campaign against Chinese intelligence services operating in the US and against US interests globally. Readers might recall from previous posts on the subject, greatcharlie noted that Western intelligence services until recently have habitually underrated the abilities of Chinese intelligence services. Further, in previous US administrations, particularly in the administration of US President Barack Obama, a somewhat relaxed attitude resulted in policies on China lost in the wilderness that failed to genuinely protect or promote US interests. The delinquency and lethargy of previous administrations also allowed for the steady progress of China versus US power and further advances in technology. The burgeoning threat was apparently not fully discerned or appreciated. 

In response to past US missteps, Chinese intelligence services presumably placed a laser focus upon enhancing and adjusting their approaches to US targets. As a product of their success in recruiting officers and contractors from the US intelligence services, Chinese intelligence services have apparently managed to better understand what the US has been doing to try to recruit Chinese intelligence officers, operatives, and informants is prioritized. To the extent, US intelligence officers and contractors recruited as spies are typically tasked with actions to support Chinese counterintelligence requirements. Doubtlessly, the collection of information on what MSS foreign intelligence has been doing has been insufficiently analyzed in light of information collected on US counterintelligence surveillance strategies and technological capabilities would inspire audits in Chinese intelligence services to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight. If Chinese intelligence services actually hire hundreds, perhaps even thousands, of officers, operatives and informants, it stands to reason there would be a number of bad apples among them. If not, one must become reconciled with the fact that Chinese spies do not go astray so often.

Foreign Intelligence Operations of MSS

Successful multifaceted activities of Chinese Intelligence services have included: conventional espionage; outright intellectual property theft via corporate and academic institutions worldwide, and cyber attacks. For a good idea of how MSS conducts conventional espionage today, Ryan Clarke, a senior fellow at the East Asia Institute, a Singapore-based think tank, boils it down well in a July 31, 2020 Asia Times article entitled, “The Face of Chinese Spying in Singapore.” Curiously using MSS efforts primarily in the US primarily as an example, Clarke asserts its intelligence operations are highly targeted and tethered to specific state goals. He explains: “These types of operations are quite simple with relatively few moving parts, which is why they are replicable at scale.” To illustrate the variety of targets attacked by MSS, Clarke says: “We’ve seen operations against a range of American targets, from Covid-19 vaccine research to the F-35 fighter jet program.” With regard to the collection effort, Clarke goes on to propound: “The general approach is to establish target priorities and then proceed to collect what appear to be rather innocuous inputs with relatively limited value when viewed in isolation. Sometimes the information may not even be classified. This is done on a massive scale in-country with a parallel synthesis-fusion operation in China itself.” Putting such a massive and energetic effort into perspective, Clarke maintains: “The strategic logic is that, in the aggregate, this massive collection and synthesis-fusion effort will yield unique findings and insights which the Chinese Communist Party can leverage across a range of domains.” The Idea that a massive synthesis-fusion operation exists to mine useful intelligence from piles of information collected was also proferred and the analytical operation was conceptualized in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).”

So far as is known publicly, counterintelligence services of the countries Chinese intelligence services have struck, to include the US, have yet to get to the bottom of their business in their countries in order to put an appreciable dent in their work. One might imagine that trying to spot, intercept, neutralize, and recruit significant numbers of Chinese intelligence officers, operatives, and informants has become an exercise in chasing shadows. This has likely left senior executives and managers of many counterintelligence services in a mute frenzy. For the US, in particular, long gone are the opportunities such as the relatively facile recruitment of the MSS officer Yu Zhengsan back in 1985. Then, when MSS was barely up and running for two years, Yu Zhengsan, a mid-level MSS officer from a well-connected political family, was allegedly aided by the CIA allegedly in escaping China and defecting to the US. Once in US hands, Yu provided investigative leads for US counterintelligence services to capture Larry Wu-Tai Chin, a retired CIA language analyst, who had spied for China since the 1940s. If Chinese intelligence services actually hire hundreds, perhaps even thousands, of officers, operatives and informants, it stands to reason there would be a number of bad apples among them. If not, US counterintelligence services must become reconciled with the fact that, today, Chinese spies do not go astray so often. That is, there must be nothing so creative that US counterintelligence services are doing or offering to encourage them to do so.

Prior to the coming of the administration of US President Donald Trump, economic espionage by Chinese intelligence gained real traction. Startled US government officials began to sound the alarm particularly over the destructive impact of Chinese commercial espionage upon US national security. Intrusions by Chinese actors into US companies and other commercial institutions harm both the individual companies and the overall US economy, to the benefit of China. Indeed, in July 2015, Bill Evanina, who was the National Counterintelligence Executive in the Office of the Director of National Intelligence, and remains in that position as of this writing, stated point blank, “Economic security is national security.” Nevertheless, the vociferous statements of those tasked with defeating China’s operations had no real effect on the course of the administration of US President Barack Obama and Chinese intelligence activities steadily intensified. In response to counterintelligence and cyber defense missteps, Chinese intelligence services seem to have placed a laser focus upon enhancing and adjusting their approaches to US targets.

It is important to note that much as it was the case during the Cold War with Soviet and Eastern Bloc intelligence services, it remains a penchant today among the Chinese intelligence services, to troll the émigrés who have made their way out of those countries. They will go as far as to twist their tails to garner their cooperation as operatives and informants. There is almost an insistence that even having left China, the émigrés must accept China’s iron rule. It may appear to be daylight madness. However, while it is madness, it is happening. Clearly, the Communist Party of China must think it makes sense or they would be acting in this way. In the recent case of a New York City Police Department officer was alleged to be supporting the intelligence activities of the Communist Party of China’s intelligence organ, the United Front Work Department. That case brought to fore the fact that Chinese intelligence services work hard at compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats. To be more precise, they will twist the tails of émigrés by threading to harm family members still living in China if cooperation was not provided.

The People’s Republic of China National Security Office in Hong Kong (above). MSS counterintelligence certainly would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning, Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations.

MSS Counterintelligence

MSS shares the counterintelligence role with MPS. The primary mission of organic MSS counterintelligence elements is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide. Its primary targets hands down are its chief competitor, the US, the bordering Russian Federation, and Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes although China has not achieved prominence in their space. Second would come Taiwan, India, Pakistan, Nepal, Mongolia, and Iran which it trusts up to a point.  China must also measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. China has also stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

A Difficult Comparison with MI6 Counterintelligence

Making a proper comparison between MSS counterintelligence operations and those of MI6 is difficult due to the fact there are only soupçons to go on with regard to that United Kingdom intelligence service. One aspect of that work already noted here is that counterintelligence responsibilities among the United Kingdom’s intelligence services have been divided between MI5 and MI6. In Nigel West’s Historical Dictionary of British Intelligence (Scarecrow Press, 2014), one of his many superlative reference books on the subject of intelligence, not surprisingly one can find at least some reference to the work of MI6 in that province. As explained in the Historical Dictionary of British Intelligence, in the United Kingdom, counterintelligence is the discipline devoted to penetrating the adversary’s intelligence structure and protecting one’s own organization. (This is significant for a number of other intelligence services take a different approach to the matter. In the CIA and the FBI in the US and in the erstwhile Soviet Union’s KGB and the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, for instance, counterespionage operations are organic to the work of their organizations’ counterintelligence sections.)  West notes that during World War II, the MI6 counterintelligence section was designated Section V, the romance numeral five being the cause of considerable misunderstanding and confusion for outsiders.

With regard to counterespionage, in the Historical Dictionary of British Intelligence, West notes that responsibility for such operations lies primarily with MI5, although inevitably the Secret Intelligence Service and Government Communications Headquarters as well occasionally encounter evidence of hostile activity and investigate it. During World War II, counterespionage was acknowledged as an interagency discipline that overlapped different organizations and in 1942, was the motive for an attempt at amalgamation, which was ultimately rejected. Following the collapse of the Soviet Union, MI5’s commitments were reevaluated periodically, and the counterespionage branch, designated K in 1968, was absorbed to a new D Branch in 1994 

To elaborate further on MSS counterintelligence, certainly it would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations. The surveillance effort may not always be easy going. A foreign intelligence officer’s trade craft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some.

Shifting a bit from United Kingdom intelligence efforts to elaborate more effectively on this point, federal indictments and criminal complaints against MSS foreign intelligence operatives and informants caught in the US indicate that they are generally tasked, as most field operatives and informants of any intelligence service, as intelligence collection requirements demand. As noted in greatcharlie’s August 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2),” from what can be learned from indictments and criminal complaints about such cases that are made public, in almost all of the MSS taskings of those intercepted operatives and informants, certain counterintelligence aspects can be discerned. Those aspects appear aimed at providing ways to assist MSS counterintelligence in identifying and locating foreign intelligence officers, operatives, and informants, particularly in China, or assist in devising ways to intercept, neutralize, and recruit them. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In order to develop ways to counter the efforts of US counterintelligence services against MSS foreign intelligence officers, operatives, and informants, MSS counterintelligence would want to know how the organization is set up to confront adversarial networks of spies, who is who, where they are situated, and what exactly are they doing. Understanding the surveillance strategies of US counterintelligence services, particularly the FBI, would inform MSS counterintelligence of what layers of surveillance are usually being pressed on MSS foreign intelligence officers, operatives, and informants in the US and how to devise better ways to defeat them. Technological capabilities would inform MSS counterintelligence whether all along US counterintelligence services have had the capability to monitor its activities or whether they have the capacity and have simply failed to use it effectively. The collection of information on what MSS foreign intelligence has been doing ineffectively in the face of US counterintelligence surveillance strategies and technological capabilities would undoubtedly inspire audits to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight. (If one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. The particulars of those real possibilities will not be delved into here. Not one case has been a “wilderness of mirrors.” It is hard to know what to make of how things are currently transpiring.)

FBI wanted poster for hackers Zhu Hua (left) and Zhang Shilong (right) of the Advanced Persistent Threats 10 (APT 10 Group) which acted in association with the MSS Tianjin State Security Bureau. In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Cyber attacks are perhaps the most prolific type used against industry advanced industrialized countries. This dimension of Chinese intelligence collection is also perhaps the most aggressive. Hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running operatives and informants. It is a full-fledged  dimension of China’s intelligence campaign strategy.

MSS Electronic Intelligence

In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Cyber attacks are perhaps the most prolific type used against industry advanced industrialized countries. This dimension of Chinese intelligence collection is also perhaps the most aggressive. Hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running operatives and informants. It is a full-fledged  dimension of China’s intelligence campaign strategy. If human intelligence were the only focus, constraints on manpower resources would always be a big problem to overcome. Cyber collection complements all other forms of attack well. Typically, Chinese spokespersons from the People’s Republic of China Ministry of Foreign Affairs or the Communist Party of China, itself, will issue declarations seemingly designed to create the false impression that China was engaged in a lex talionis of allegations with the US on cyber espionage. Perchance the aim in doing so was to distract the world from the reality of its one-way abusive and criminal cyber attacks to obtain classified information from the federal government, intellectual property from private firms, and research from academic institutions in the US.

When GCHQ Was Part of MI6

For a time, MI6 also enjoyed having an organic technical surveillance capability. That technical surveillance capability today resides in an independent intelligence agency known as the Government Communications Headquarters (GCHQ). GCHQ grew out of the Government Code and Cypher School (GC&CS), established in November 1919. During the 1920s and 1930s, GC&CS had considerable success in its efforts to decipher German and Soviet transmissions. Once Nazi Germany acquired the Enigma machine, with its apparently unbreakable ciphers, in the late 1930s, GC&CS greatly stepped up its efforts. In August 1939, just before war broke out in Europe, it moved its headquarters to Bletchley Park outside London. There its cryptanalysts undertook Operation Ultra, the breaking of the Enigma cipher—a project whose details remained classified until the 1970s. Renamed the Government Communications Headquarters in 1942 to conceal its activities, this leading communications intelligence agency of the United Kingdom. Through GCHQ, MI6 enjoyed a number of successes during World War II, most notable among them being the Ultra program to break German Enigma ciphers. Today GCHQ functions similarly to the US National Security Agency (NSA) Working in coordination with the NSA during the Cold War, it greatly escalated its efforts. Reportedly, it participates in the Echelon global surveillance network. Much of what is known about how GCHQ is organized was provided publicly in James Bamford’s famous 1982 book on NSA, The Puzzle Palace (Houghton Miflin Harcourt, 1982). Knowing how GCHQ is organized allows one to infer with at least some degree accuracy, how it functions. According to Bamford, GCHQ at that time had six directorates. Among these were the Composite Signals Organization, dedicated to radio intercepts; the Directorate of Organization and Establishment, whose functions were chiefly administrative; the Directorate of Signals Intelligence Plans, concerned with long-range planning and management; and the Joint Technical Language Service, which intercepted foreign communications. Bamford stated that the largest and most secretive directorate, the Directorate of Signals Intelligence Operations and Requirements oversaw codebreaking activities. 

Returning to the discussion of MSS technical collection, it can include the use of high-tech tools covering phone calls and all forms of messaging to relatively low level actions against electronic equipment such as mobile phones and computer networks. While technical intelligence collection, cyber attacks by Chinese intelligence services upon targets in the US, have been deplorable, the skill displayed and their list of accomplishments has been impressive. What have essentially been standard targets of cyber attacks from Chinese intelligence services in recent years have been those levelled against US national security decision makers and government organizations, particularly during the Obama administration. The objective of that targeting has been to access any classified information they might possess. Through that information, MSS would surely hope to develop insight into highly sensitive US national security decisionmaking processes.

MI6 in the Political Realm: A Bad Mix

There is much beyond the controlled bearing, composure of MI6 officers and the organization itself. From what has been revealed, their efforts have been defined by hard work, establishing solid foundations, diligence and forethought, practicality and organization, determination and dependability, passion and drive. Creativity is combined with thoughtful effort and hard work to manifest positive energies, opportunities and results. 

As aforementioned, the Ministerial Committee on the Intelligence Services exercises regular ongoing oversight of intelligence activities. Through this committee, the Prime Minister, with the assistance of the Secretary of the Cabinet, exercises authority over the daily operations of the British intelligence and security communities as a whole. MI6 answers to the Foreign and Commonwealth Secretary. The Foreign Secretary receives assistance from the Permanent Secretaries’ Committee on the Intelligence Services. Finally, the Joint Intelligence Committee draws up general intelligence needs to be met by MI6. It also prepares National Intelligence Estimates.

As with officers in MI5, speaking truth to power is also the charge entrusted to leaders of MI6. Yet circumstances have often been complicated enough to spoil adherence to that. One might say how MI6 has performed, has really boiled down to leadership. Indeed, the intelligence services may have figuratively been wonderful horses but the chief or key senior executives–no names here–may have been less-than-perfect jockeys in matters of high policy. Admittedly short on specifics of such cases here, yet with all conspiracy theories aside, it may be enough to say the resources and capabilities of MI6 allegedly have reportedly  on certain occasion been used by political leaders to turn a situation that might not necessarily stand in their favor due to interests beyond those urgent and important to the United Kingdom. Some believe it was really seen during the Iraq War when the United Kingdom followed the US into the whole affair which was unfortunately founded on false intentions,  namely weapons of mass destruction were being produced by the regime of the erstwhile Iraqi President Saddam Hussein. Tragically, MI6 became the alleged coauthor and signatories to misleading information

When misgivings and disfavor might have been expressed what may have been proposed from the top, it may have been the case that  the powers that be would brook no denial. Those too concerned of their position or being politically indebted, might have seen themselves with little option but to follow orders. Those who see themselves as pragmatists, may explain away a decision to go along thoroughly with a suggestion from on high as an effort to simply adapt in a shifting world. They may not have seen themselves as keepers of some sacred flame. The fatal mistake occurs when the choice is made to play along thoroughly. No proper MI6 or MI5 officer would be expected to shrink at the last. If the organization’s leadership had decided to disappoint the political leadership, they might not only have been forced to surrender the coveted privilege to serve their country in the intelligence services. To many in the intelligence service, that idea would be anathema. Such thoughts likely broke through any defenses their minds raised against them. Additionally, after their departure they might find the whole force of the state on his or her back. L’homme c’est rien—l’oeuvre c’est tout.

Assuredly, Parliament, which provides oversight of MI6, has a process for ascertaining the truth about such matters. The principal oversight committee for British intelligence is the Central Intelligence Machinery, based in the Prime Minister’s Cabinet Office. It oversees the coordination of security and intelligence agencies. It also acts as a mechanism for assessment and accountability, observing and reporting on the performance of specific agencies. Further, it more directly intelligence operations as it is also concerned with tasking and the allocation of resources.

To discuss such issues concerning MI6, even if it is just a part of a mere commentary on MSS, is to walk out on shaky ground given many who may read this post may be invested in maintaining the image of the organization and may have previously been invested heart and soul in its work. While admittedly greatcharlie has sought to be sensitive to the concerns of those readers, doubtlessly, the soupçons discussed here will still be an issue of contention in some quarters and there will surely be those disposed to quarrel most bitterly over it. All the same, what is opined here is only what has been publicly discussed by those familiar with the issue. To that extent, not being aware first-hand of it all, greatcharlie would not like to swear by it.

There is no legal “right to know” what is undertaken abroad in the name of the United Kingdom’s security, what it costs or how it is run. Reportedly, beyond mere concerns exposing any classified information about MI6, to write about MI6, even today, risks harassment and prosecution. Former members and current commentators are fully aware of this and have complied thereby allowing the organization to remain beyond any educated public scrutiny. In the past, any dissident reports of its operations were effectively snuffed out. The agency has the power to censor news accounts of its activities through the use of “D” notices under the Official Secrets Act. As one might imagine, this reality does not sit well with the citizens of the United Kingdom. There is a perception among many in the United Kingdom that such behavior brings the organization more closely in sync with that of MSS, an organ of an authoritarian government, than it should in a free society. Civil rights groups and average citizens argue that the policy of total should be reconsidered and scrapped, should not be disparaged as rubbish in any quarter.

Meeting of the Politburo of the Communist Party of China (above). Changes in both competency and necessity have favored an increase in MSS influence in foreign policymaking. One change was the decision of the Communist Party of China wanted MSS looking further abroad than minority groups on China’s periphery. Another change was the expansion of Chinese interests abroad. The real threats to China were no longer seen as coming from traditional internal security concerns but from countries capable of stopping China’s access to trade. By successfully building up its foreign intelligence capabilities to meet this challenge, MSS managed to increase its influence and favor with political authorities. Apparently, it was understood in the Communist Party of China that foreign intentions can best be monitored and resolved with intelligence.

MSS in the Political Realm

MSS was stood up to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus. With its inception, MSS added new dimensions to China’s foreign intelligence scheme while freeing MPS to revamp existing capabilities and explore and adapt a new as well as more technological set of cards to play in the intelligence game so to speak. MSS represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers. MSS also represented the tidying up of old ways of conducting its business, and a modernization of Chinese intelligence that was long overdue. The MSS generally appears to have adhered to the non-politicization  of the service. This is not to say that occasionally shifts away from that position by some senior executives has not impacted the organization. MSS elements, particularly at local levels, often have provided protection services for the business dealings of Communist Party of China officials or their well-connected friends. However, the Ministry rarely appears connected to any elite political maneuvering or purges. Since 1983, only the purges of Beijing Party secretary Chen Xitong (1995) and Shanghai Party secretary Chen Liangyu (2006) were rumored to involve the ministry. In the wholesale purges after the fall of Bo Xi laid and Zhou Yongkang, the Beijing State Security Bureau chief Fangfoss Kent and Vice Minister Qiu Jin were ousted precisely because they exploited MSS resources to back particular leaders in their political struggles against each other.

Of course, the foreign policy influence of intelligence services depends on the quality of their inputs and their leadership’s influence with key policymakers. If an intelligence chief is not influential, then his service’s influence depends on performance. The MSS’s role in policymaking could be rising as China’s overseas interests expand. When China entered the World Trade Organization (WTO) in 2001, the thought was that there would be an influx of foreign business into China. That was a concern. At the time, the response was to make greater use of MPS. However, changes in both competency and necessity have favored an increase in MSS influence in foreign policymaking. When direct political power is absent, influence usually relates to merit and necessity. Senior foreign policymakers would eventually want the MSS in the room, contributing to the discussion. The Communist Party of China’s leadership wanted an MSS looking further abroad than minority groups on China’s periphery. The MSS’ foreign intelligence service is now more similar to the CIA. Another major change was the expansion of Chinese interests abroad. The real threats to China were no longer seen as coming from traditional internal security concerns but from countries capable of stopping China’s access to trade. Apparently, it was understood in the Communist Party of China that foreign intentions can best be monitored and resolved with intelligence. By successfully building up its foreign intelligence capabilities to meet this challenge, MSS managed to increase its influence and favor with political authorities. Indeed, MSS has managed to move from backstage, second to MPS, to frontstage, up from behind its bureaucratic competitor in internal security.

III. Coming Reality for Visitors to China

For an more efficacious explication, the comparisons in this section of the discussion shift from an examination of United Kingdom and People’s Republic of China intelligence organizations and activities, to mainly comparisons of US counterintelligence and those of both MPS and MSS counterintelligence efforts using informants and the impact a ratcheting up of counterintelligence activities particularly on mainland China will likely be experienced by foreign visitors, particularly those from the West. Indisputably, the Communist Party of China’s line on the coronavirus pandemic clashes with the truth. So far, there has been no grand conversion of the world to its point of view. As touched on earlier, it surely raises a few hackles within the relevant bodies of the Communist Party of China whenever Chinese citizens–scientists and doctors working on the coronavirus for instance–behave as if there is a choice of who they would prefer to alienate, their own Chinese or the US government and worldwide human rights activists. We live in an ordered universe and expect everything to follow that design. 

In The Crisis V, Thomas Payne, the orator and American Revolutionary explained: “To argue with a man who has renounced the use and authority of reason, and whose philosophy consists in holding humanity in contempt, is like administering medicine to the dead, or endeavoring to convert an atheist by scripture.” No matter how the West and particularly the US decided the address matters related to the coronavirus with China, one can be assured that an undesirable situation will be created by the Communist Party of China’s leadership. At least for a period, a very tense atmosphere will exist for employees and members of all types of organizations and private foreigners who travel or reside in China and those outside of China who for whatever reason may have contact with counterparts from China. They should prepare to cope with increased pressures and discomforts.

To expound further on a point raised earlier, what should be of great concern is what approach the MPS may take toward foreign visitors. Foreigners are always closely investigated by the local MPS. Under such unfortunate circumstances as the coronavirus fracas with West, the real possibility that some, including US citizens, might be arrested or “briefly” detained for questioning, having done nothing that ordinarily would hardly warrant such treatment. Indeed, US visitors could regularly become the center of frightful international incidents at the hands of authorities. Regardless of one’s status in the US, it can happen in China. Believing that the Western Capitalist drive for markets is so strong, and desire for profits so considerable, the Communist Party of China would surely be willing to test the theory that the US and other Western firms heavily invested and enjoying business in China would do nothing rash in the face of inordinate investigations, interrogations, and short-term, repeated, detainments of line employees, managers, and executives. Communist Party of China leaders would insist that such foreign companies do more to change the US and other Western government’s stances toward China on the coronavirus and perhaps even trade. Considerable evidence that China is willing to engage in this type of “hostage diplomacy” despite claims of wanting to be the dominant power on the world stage. One can imagine what type of world that would be. In an informative October 20, 2020 Axios article entitled “China Embraces Hostage Diplomacy,” a chilling snapshot is provided of a few publicly known cases in which Beijing has detained foreign citizens unless their home governments acquiesced to its demands.

The Beijing Municipal Public Safety Bureau Office Building (above) MPS counterintelligence officers will regularly collect and closely review reports on a foreigner’s behavior via informants among neighbors in the vicinity of their residence and locals among colleagues at work. They would be interested in knowing if they have engaged in behaviors that would make them open to recruitment. Their attitudes toward China and its system would be important. The friendships they have made would be of interest. Assessments of what type of temptations could be used to bring them to China’s side will be based on observations of the foreigner’s lifestyle. MPS officers have no qualms about exploiting individual weaknesses.

Informants

In domestic intelligence operations, informants are a most valued weapon to use against an adversary’s intelligence operations. In an authoritarian country as China, informants are also a valued weapon for the same reason, but it is also a tried and true way to monitor the population and monitor foreigners. 

In the West

As it stands today, bread and butter operations of Western intelligence services, even in the US, rely heavily upon the work of both agents–or operatives–and informers. As explained previously, agents actually engage in activities on behalf of an intelligence service. Informers, such as those discussed here, are used mainly for surveillance of targets of an investigation. Many US citizens will for the most part give pollices premiere to the intelligence services. (The US in particular has come a long way from the days of the post-Vietnam era and years before when citizens would stand together to question federal government decisions and actions on national security.) To act against a foreigner, is now more typically viewed as a patriotic duty. The foreigner is as the adversary and “the other.” In the US, to surveil another citizen might cause pangs of anxiety for some as there would be the real possibility of violating the 1st Amendment and Fourth Amendment rights of a fellow citizen under the Constitution. However, that can often be mitigated by payments and by assurances that the subject will never know he or she is being surveilled. Moreover, if the fellow citizen who is the subject of the surveillance can be convincingly connected, not necessarily correctly or truthfully, to a foreign intelligence service, usually the informant will accept watching the target as a cause they can get behind. To that extent, it will be reasoned to be a necessary sacrifice of morality. Ethical implications are also raised when the subject of an investigation may be a member of a racial or ethnic minority. Existing biases of the informant can fall into mix. Problems encountered can be overzealousness on the part of the biased informant, even aggressive behavior. For the most part, there is little to no vetting concerning such issues. Problems that arise are largely ignored at least by US counterintelligence services.

There is a romanticized view that many informants hold about working with official men and women, that gives the average citizen a sense of being someone special. Although the bulk of what they may know about spying may be sourced from fiction novels and Hollywood, they view themselves proudly as being part of the secret world. There is a curious type of dignity that secrecy confirms for some. They perceive themselves as being separate from the crowd, and what could be called an ordinary existence. When they talk to family and friends, pass other citizens in the street, they revel in the idea of knowing something they do not. That inflated sense can be exploited to encourage them to do more, behave more aggressively toward the target of their surveillance, than they might have if thinking clearly. It can also lead to a sense of entitlement in wrong headed thinkers, that must be curbed by issuing them strict parameters for behavior while serving in legal terms as “agents” for an intelligence service, even if working through contractors. When being told the plan for surveillance, often in many there is a sensation felt. The larcenous part of the citizens heart is stirred. As noted, informers are paid for their service. The payments can also become an  Since they are usually provided considerable pay for very little work, an eagerness builds for more surveillance work and more easy money. To that extent, surveillance work becomes intoxicating for some. Interestingly enough, payments become a self-generating locus of control that the counterintelligence officer can hold over the informant. 

A scholarly basis for understanding such behavior by citizen informants in a Constitutional Republic as the US is provided by Martha Stout in The Sociopath Next Door (Harmony, 2006). One can easily take from Stout’s work that there are quite a few people given the opportunity, who will routinely act against the common good. She notes that conscience does not exist without an emotional bond to something or someone. There is a desire to make others jump, to be in control of them. (This is quite different from 19th century German philosopher Friedrich Nietzsche’s concept Der Wille zur Macht (The Will to Power), the desire to exercise authority over others was a conscious or unconscious driving force in all humans. Stout limits the desire to some, not all.) which he asserted was The actions that the informant is typically asked to take during a surveillance effort encourages me-first attitudes devoted to the pursuit of domination. There is a refusal to acknowledge responsibility for the decisions they make, or for the outcome of their decisions. There is an inability to understand what a wrongful target of the surveillance effort imagine was very likely feeling. A month before being killed in Bergen-Belsen concentration camp in 1945, Anne Frank wrote in what would be published as The Diary of a Young Girl (Doubleday & Company, 1952): “How noble and good everyone could be if, at the end of each day, they were to review their own behavior and weigh up the rights and wrongs.”

With regard to the motivations of those who undertake the role of informant, some research has been done. In a February 1997 article in Intelligence and National Security entitled, “Cold War Spies: Why Why They Spies and How They Got Caught,” authors Stan A. Taylor and Daniel Snow use the acronym MICE to account for common motives of those US citizens informing for the Soviet Union during the Cold War. MICE is abbreviation formed from money, as noted earlier, ideology, compromise or coercion, and ego. Taylor and Snow added that other influences include excitement and revenge. Crucially, they suggest that: “no human act is ever motivated by a single factor.” The mix of motivations between agents and informers ensures that there will always be individuals who will inform. (In previous posts, greatcharlie has used a slightly different interpretation of the MICE acronym, indicating that it referred to, money , ideology, conspiracy, and excitement. Perhaps much as greatcharlie’s editor, the blog’s interpretation admittedly is a tad rustic.)

It should be noted that during the Cold War the use of human informants to surveil subjects of investigation was increasingly supplemented by technical means of surveillance, particularly electronic eavesdropping tools. Today, informants engaged in surveillance essentially complement or depending on the case, actually supplement collection efforts using electronic tools. Such tools at a basic level can provide a window onto usage of hundreds of millions of computers, routers, fitness trackers, modern automobiles and other networked devices, known collectively as the Internet of Things (IOT). The whole process took a huge step forward following the September 11, 2001 territory attacks in the US, which led to the 2001 USA Patriot Act that opened the door to the acquisition of telephone data by the then new Department of Homeland Security and other government agencies to include: the National Security Agency, FBI, and CIA. The authorization granted federal agencies to intrude on the privacy of citizens under the legislation of the Patriot Act, and continued in the annual National Defense Authorization Act by fate having come into being concurrently with developments in the technology of smartphones, IOT devices, digital circuit board dependent autos, and all the many household devices now with MAC wireless access addresses, meant surveillance could be taken to a level very likely unimaginable to those who drew up those laws in 2001. Artificial Intelligence, machine learning, neural nets everywhere, and massive government data processing power will doubtlessly result in the development of additional surveillance technologies that can only be imagined now. Placing the growing tools of surveillance and the power to use it in possibly the hands of errant US counterintelligence officers and contractors, who could use them to thwart the rights of citizens guaranteed under the US Constitution should be the cause for some alarm.

In China

As mentioned, the foreign visitor is always a potential target for province and municipal offices of MPS and MSS. The capability of Chinese authorities to use technological means to keep a close eye on foreigners and detect, apprehend, and deal with those who protest and oppose the government has recently been enhanced immensely. Two sensational articles in the New York Times, “A Surveillance Net Blankets China’s Cities, Giving Police Vast Powers” dated December 17, 2019, and “Inside China’s Dystopian Dreams: A.I., Shame and Lots of Cameras” dated July 8, 2018 well lay out the increased use of technology in MPS and MSS surveillance efforts. Reportedly, as part of Xi’s effort to have the security services take on a greater role in China, he has launched a major upgrade of their surveillance capabilities. China, as a result,, has become the world’s largest market for security and surveillance technology. It is reported that almost 300 million cameras have been installed in the country. Government contracts are supporting research and development into technologies that track faces, clothing and even a person’s gait. MPS officers on the beat have been observed using experimental gadgets such as facial-recognition glasses. In Zhengzhou, police and security services can use software to create lists of people. They can create virtual alerts when a targeted  individual approaches a specific location. They can acquire updates on people every hour or every day, and monitor anyone with whom those people have met, particularly if there exists a report that one or both individuals have committed an infraction.  Yet, while the new technology may ostensibly provide police and security services with a way to track criminals, it also improves their means to crack down on sympathizers of the protest movement in Hong Kong, critics of the Communist Party of China, and critics of the police and security services, themselves. Worse, it better enables the police and security services to target migrant workers who travel from the countryside to fill China’s factories and ethnic minority groups as the Uyghurs.

On the street, the surveillance of foreigners will typically be relatively light, calibrated to ensure utilization of an optimal number of officers and informants in the role of surveillance operatives in the field. Doing so also facilitates the monitoring process. The more surveillance one uses the more reports that must be reviewed to find one aggregate picture of what occurred. MPS counterintelligence officers will regularly collect and closely review reports on a foreigner’s behavior via informants among neighbors in the vicinity of their residence and locals among colleagues at work. They would be interested in knowing if they have engaged in behaviors that would make them open to recruitment. Their attitudes toward China and its system would be important. The friendships they have made would be of interest. From the reports of informants and technical surveillance, assessments of what type of temptations could be used, if necessary, to bring them to China’s side based on observations of the foreigner’s lifestyle. 

For citizens of the People’s Republic of China, the motivations of money ideology, conspiracy, and excitement do not factor in such a decision to come to call of their country’s intelligence services. The law requires them to do so. If any motivations at all could be said to factor in a Chinese citizen’s decision to obey the direction of an intelligence service, expectedly the Communist Party of China would list faith and adherence to the ideals of the Communist Revolution, the Communist Party of China, patriotism, and the homeland. Supposedly, revolutionary zeal drives the heart of China as one beating heart so to speak.

The National Security Law of the People’s Republic of China, as adopted at the 15th session of the Standing Committee of the Twelfth National People’s Congress declares under Article 9 that in maintenance of national security, priority shall be given to prevention, equal attention shall be paid to temporary and permanent solutions, specialized tasks shall be combined with reliance on the masses, the functions of specialized authorities and other relevant authorities in maintaining national security shall be maximized, and citizens and organizations shall be extensively mobilized to prevent, frustrate, and legally punish any conduct that compromises national security. Article 11 decrees that there will be no tolerance shown for the failure to meet one’s obligation to maintain national security. The article states: “All citizens of the People’s Republic of China, state authorities, armed forces, political parties, people’s groups, enterprises, public institutions, and other social organizations shall have the responsibility and obligation to maintain national security.” Authorities in China understand that extraordinary powers are entrusted in the hands of many, such as MSS officers, who work on national security matters. Contractors, and even informants, who might work on their behalf are placed under the same scrutiny. Those who have attempted to cross the Chinese government have faced stiff reprisals. The shadow of sudden death can hang over the head of any individual arrested for such betrayal. As stated under Article 13: “Whoever as an employee of a state authority abuses power, neglects duty, practices favoritism, or makes falsification in national security work or any activity involving national security shall be held liable in accordance with the law.” The article further declares: “Any individual or organization that fails to fulfill the obligation of maintaining national security or conducts any activity compromising national security in violation of this Law or any relevant law shall be held liable in accordance with the law.” The furtive work of Chinese citizens at home and abroad under the direction of the MSS does not need to be without guerdon. As explained under Article 12: “The state shall commend and reward individuals and organizations that have made prominent contributions to maintaining national security. The 19th century philosopher, logician and writer of the United Kingdom, Bertrand Russell, explained: “Neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of great fear.”

The foreign businessman, scientist, engineer, academic or any other type of professional  working closely with a Chinese counterpart in China may not be aware that he or she is being monitored by that same friendly colleague. It should be expected. When told, it may be so emotionally shocking to outsiders  that it may very well be near impossible to believe. Perhaps refusing to accept that reality is the only way a foreigner can continue to function comfortably in China. In any event, it is the responsibility of the Chinese citizen to engage in such activity under the National Security law. To that extent, friendship with Chinese colleagues may never be authentic as there is an element to the interaction between the foreigner and the Chinese citizen that is cloaked. China comes first. The foreigner is inconsequential to that reality. Ordinary people doing a little this and a little that for the MPS as well as the MSS is a  norm.

Although it has not been a commonplace problem, if a foreigner visiting China for the purpose of business or tourism, accepts recording devices or recorded materials without knowing what they contain, the traveler might discover quite surprisingly that he or she is carrying items that contain sensitive data the possession of which could be considered criminal. Without a shadow of doubt, the illicit materials would have been presented to the traveler intentionally, perhaps even by a Chinese citizen with whom the traveler may have a positive personal relationship, almost certainly at the behest of MPS or MSS. (Given the uncertainty of what may result from contact with Chinese intelligence and counterintelligence units, ordinary Chinese citizens typically will not seek out contact with them nor independently engage in activity with foreigners outside of the workplace on matters related to their work. They will focus true personal relationships on personal matters, human interests.)

To defeat this problem, one must also be very cautious about accepting documents, notebooks, and books, or any devices, thumb drives, dvds, or materials that may include video or audio recordings unless one can be absolutely certain as to their contents. Documents contained in any of these media may prove to be state documents concerning confidential matters, and not any run-of-the-mill confidential matters at that. One must immediately open any hard documents and read them or use a laptop or tablet to kindly and respectfully review electronic documents or recordings posthaste in what could be passed off as a display of ebullience and appreciation of the gift and wonderment about what it holds.

The Shanghai Public Security Bureau Office Building (above). The foreign businessman, scientist, engineer, academic or any other type of professional  working closely with a Chinese counterpart in China may not be aware that he or she is being monitored by that same friendly colleague. It should be expected. When told, it may be so emotionally shocking to outsiders  that it may very well be near impossible to believe. Perhaps refusing to accept that reality is the only way a foreigner can continue to function comfortably in China. In any event, it is the responsibility of the Chinese citizen to engage in such activity under the National Security law. To that extent, friendship with Chinese colleagues may never be authentic as there is an element to the interaction between the foreigner and the Chinese citizen that is cloaked. China comes first. The foreigner is inconsequential to that reality. Ordinary people doing a little this and a little that for the MPS as well as the MSS is a norm.

Celebrity tourists, Hollywood actors, athletes, singers, dancers, any other performers, novelists, poets, sculptors, painters, documentary filmmaker, celebrity chefs, as well as any other professionals interested in visiting may often unknowingly be surrounded by throngs of MPS officers and operatives posing as aficionados and curious onlookers. Ordinary citizens observed engaging in an unauthorized display of interest in such personalities by security officials, might be judged as being too appreciative of Western bourgeois amusement, and they could place themselves under suspicion by authorities. For such reasons, the overwhelming majority of Chinese citizens would be extremely hesitant or even more, absolutely avoid being seen behaving that way. (Of course, this does not mean that average Chinese citizens would not harbor very positive thoughts about such Western visitors and that they would not draw their interest.)

One might posit that those types of choreographed mass movements of some likely mix of officers and Chinese citizens recruited impromptu to be surveillance operatives by MPS or MSS managers, helps to create a strong band of security around the foreign visitor. Despite such sanguine, a malign aim of Chinese authorities to create the opportunity to detect any effort by citizens to contact or transfer messages or items of any kind to the foreigners. Oddly enough such mass movements are the envy of some novice, errant US counterintelligence officers. Having been fed a steady diet of film, television, streaming television, Netflix, YouTube, Facebook, and Instagram since their youth, many US counterintelligence officers would relish the sensation of directing their own surveillance operatives to create something akin to the Chinese style of mass surveillance, the real draw for them being that it so resembles a fairly common surveillance scene in banal Hollywood spy dramas in which screenwriters and directors depict US intelligence officers wielding such control, such power, that they would convert an everyday happening–crossing the street, ordering coffee in a cafe, or shopping in store–into something exciting or extraordinary. Not to be beastly with the US intelligence and counterintelligence services and law enforcement, but in fact, errant US counterintelligence officers, perhaps forgetful of their true purpose, often attempt to accomplish this similarly at street corners, in stores, museums, parks, and other public spaces in the US, even at the risk of spoiling the surveillance. They may here and there have some success with keeping the targets of such stunts completely unaware that they are being surveilled. Still, for those targets who are aware that they are being surveilled, the so-called movement techniques of a mix of counterintelligence officers and ill-trained contract surveillance operatives on the street, will typically seem strange, harassing, and even comical. When made aware that the surveillance that they designed was burned, they would doubtlessly, yet perhaps successfully, conceal the truth from their managers and continue on as if nothing had happened. It is very unlikely that such activity using taxpayer dollars has ever generated the ego boost that errant US counterintelligence officers, who would do such, likely seek. Mi rattrista una si piena cecità! (Such utter blindness grieves me deeply!)  

Intelligence officers and managers of the various Chinese intelligence services operating in the US, observing such activities–rest assured they are always studying “their opponents” and the environment in which they are work–surely gaze stoically in amazement at the extraordinary misuse of personnel, time, energy, finances, and other resources to orchestrate such a “Keystonian” display that is immaterial to their mission, bewildered over their very apparent insouciance for their important jobs and disregard of their duty to country, the absence of a sense of honor, and perhaps wondering what type of mental disorder had befallen US counterintelligence officers executing it. They would very likely wait until they got back to the office, operating base, or back to the main headquarters and have a good chuckle about what they witnessed before beginning a meeting on the tally of technologies MSS operations have acquired from US firms or universities, how many new technologies have been identified for theft, and the unlikelihood that their officers and operatives could be stopped from doing so.

Attempting to defeat the capability of MPS and MSS to provide near blanket surveillance while in China under such circumstances would be extremely difficult if not impossible. Doing so successfully would be akin to hiding from water in the ocean. The fact that its present may aggravate, but as long as it stays light, things should be alright if as mentioned, one takes special care with regard to personal behavior and interactions with professional counterparts. One must make it a point to comport oneself appropriately, cautiously with staff at accommodations, restaurants or locations for recreation.

In addition to guarding against making statements about the Chinese government or details about one’s work to Chinese citizens who are friends or close acquaintances to protect oneself, one must guard against such actions to protect them. Surely, it would put Chinese citizens who are friends or close acquaintances in the dreaded position of reporting your statements or face the danger of not reporting them and later discovering that through some electronic means or citizen surveillance operative passively collecting information, the statements were picked up. They may very well be held accountable for failing to report any foreigner speaking in such ways.

NBA superstar LeBron James (above) enters the arena for a preseason exhibition game in Shanghai between the Los Angeles Lakers and the Brooklyn Nets in 2019. Some official exceptions in Beijing concerning foreign visitors are most often allowed for visiting foreign athletes. A good example of such an exception would be players, coaches, and executives of the National Basketball Association (NBA) from the US. Indeed, NBA players, in addition to being athletic ideal, representing the best in international athletic competition, are welcome due to the very cooperative attitudes and actions of the NBA executives toward the Chinese government and favorable impression visitors from the NBA have created with responsible State Council bureaucracies, the National Party Congress, and especially the Communist Party of China. Still,  such positive attitudes held about NBA personnel among the ruling class in China would not exempt them from continuous surveillance by the MPS and MSS.

Some official exception in Beijing concerning foreign visitors is most often allowed for visiting foreign athletes, particularly superstars in their sports. Sports and international athletic competition are highly endorsed by the Communist Party of China. A good example of such an exception would be players, coaches, and executives of the National Basketball Association (NBA) from the US. Indeed, NBA players, in addition to being athletic ideals, representing the best in international athletic competition, are welcome due to the very cooperative attitudes and actions of the NBA executives toward the Chinese government and favorable impression visitors from the NBA have created with responsible State Council bureaucracies, the National Party Congress, and especially the Communist Party of China. Doubtlessly, reports produced from information collected by their country’s domestic intelligence, counterintelligence, and law enforcement informants have been very pleasing to them. However, such positive attitudes held about NBA personnel among the ruling class in China would not exempt them from continuous surveillance by the MPS and MSS.

The Human Mind and the Incomprehensible

Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.) One might imagine some would find it far easier, less unnerving, to remain blissfully unaware that in traveling to China they would, or have been, immersing themselves in such an environment. Many who may frequently travel to China for business or leisure may insist that they never encountered any problems with surveillance or other intrusions by the Chinese government. Perhaps that could be attributed to the excellent tradecraft of surveillance those individuals have unknowingly encountered. True art is to display no art. However, it more likely may be the result of a total lack of unawareness, intelligence and counterintelligence tactics, techniques, procedures and methods and were figuratively blind to the surveillance activity that may have regularly unfolded all around them. One surely should not look upon the matter with humor. MPS officers take the surveillance of foreign visitors very seriously, and that work is among its main activities aimed at intelligence collection. Suffice it to say the MPS does not equate any of the work to some enthralling battle of wits with foreign visitors, with aim of revealing the superior intellect. That would too much resemble the thinking of lower tier federal intelligence and counterintelligence and law enforcement officers and their contractors engaged in surveillance in the US, who too often approach their work from a personal perspective and with an apparent ax to grind and whose thinking about their work is apparently uncoupled from the greater scheme of US national security.

Security offices of any Western firms whose executives and staff frequently visit China should have long since arranged opportunities to brief those employees on problems they could possibly face in China. Such briefings might include the discussion of ways to subtly execute defensive measures to defeat MPS, MSS, PLA Joint Staff Department human intelligence groups, and any Communist Party of China intelligence organs (e.g., the Chinese People’s Political Consultative Conference, the super secret and malignant International (Liaison) Department, the United Front Work Department, and the Propaganda Department) from capturing information that meets their organizations’ immediate intelligence requirements as well as whatever information that managers of those spy organizations may deem useful otherwise. Quemadmodum perniciosior est hostis fugientibus, sic omne fortuitum incommodum magis instat cedenti et averso. (Just as an enemy is more dangerous to a retreating army, so every trouble that fortune brings attacks us all the harder if we yield and turn our backs.)

The Way Forward

As indicated in its introduction, this post serves as an expatiation of a technique learned long ago for directing one’s thoughts upon developing ideas and insights on issues in international affairs and other subjects of interest. Given its subject matter, it hopefully managed to satisfy the experienced scholar, academic, and policy analyst. By showcasing the generation of ideas and insights on subjects, hopefully it satisfied the desire of students to see examples and will become a subject of inquiry for some. 

By their very nature, insights are inherent to the writer, unique in that way. At least, they should be. No truer are the words, “everyone is entitled to an opinion.” The ideas and insights of the novice writer have a right to be aired equal to that of experienced, published authors in the various fields. Note, however, that eccentric, whimsical, and outlandish ideas are seldom useful and never desirable. In some respect, the process of generating ideas and insights is a form of self-exploration. One’s mind must be open to all reasonable considerations and all plausible possibilities. Nontraditional students should try to apply sensibilities shaped by a multitude of experiences. The length and breadth of their knowledge and experience may allow for a broader understanding of humanity. That is what the world will most appreciate reading.

Saepe stilum vertas, iterum quae digna legi sint scripturus. (Often must you turn your pencil to erase, if you hope to write something worth a second reading.) It is perfectly in order to feel a bit timid about drawing inferences and sharing them for others to review. Accept those awkward feelings, but write down all of the ideas and insight that may develop inside anyway. Have at it! To enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. Ruminate on events in relation to those that proceed them and meditate on what the future may bring. Build on that thinking. Strive to forecast decisions that may shape what might come and proof one’s efforts by watching events unfold in the news. Some of the best ideas and insights may come at inopportune times. Whether one is struck with a coruscating flash of logic, or has a nagging thought on an issue that builds throughout the day, notes must be kept of it all. At one’s earliest convenience, write those ideas and insights down in a notebook, on a pad, or on the back of an envelope. If one can, type them up on an electronic device. Organize them as bullet points if that is easier, however, one must make certain that enough is recorded to ensure that actual ideas are being expressed and that they “feel” compelling. Avoid simply jotting down statements of fact, or worse, simple fragments of your thoughts. State your conclusions about matter! Each expression can be fleshed out and tidied up with editing later. Sticking to this course may not be easy at first. After a time and with honest effort, one should become accustomed to it. Optimally, a writer will effectively generate enough ideas and insights to allow for the selection of more reasoned, potent, and eloquent among them for inclusion in a draft essay. The ability to increase quantity and improve the quality of ideas and insights produced will come with practice. Plus novisti quid faciendum sit. (You have learned more what has to be.)

Book Review: Oleg Kalugin, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994)

In The First Directorate: My 32 Years in Intelligence and Espionage against the West, published in 1994, Oleg Kalugin, a former major general in the erstwhile Soviet Union’s KGB details the realities about the KGB foreign intelligence service and to a great degree provides a good framework for understanding what Russian Federation intelligence services are doing right now. It also provides a framework by which readers are enabled to peer into the future, with all of its mysteries, and better conceptualize what those intelligence services might do under the present leadership in Moscow. Most of all, First Directorate provides a look into the art that moved the mind of one of the most capable spymasters of the 20th century. Kalugin’s work surely earned him a place among the era-defining geniuses of the intelligence industry of the Eastern Bloc.

The First Directorate: My 32 Years in Intelligence and Espionage against the West is the memoir of Oleg Danilovich Kalugin, a former major general in the erstwhile Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. The KGB was responsible for Soviet internal security, foreign intelligence, and counterintelligence during the greater part of the Cold War era. It is fairly well-understood now that the KGB was the embodiment of the Soviet systems intimidating, inhumane, authoritarian order. The book’s title First Directorate referred to Pervoye Glavnoye Upravieniye (First Chief Directorate) or PGU of the KGB which was the element responsible for foreign operations and intelligence activities. The manner in which Kalugin details the realities about the KGB foreign intelligence service in First Directorate provides a good framework for understanding what Russian Federation intelligence services are doing right now. To that extent, First Directorate better enables readers to peer into the future, with all of its mysteries, to better conceptualize what those intelligence services might do under the present leadership in Moscow. Most of all, the book provides a good look into the art that moved the mind of both a superlative foreign intelligence officer and a foreign counterintelligence officer. Kalugin was one among of a number of era-defining geniuses within the intelligence industry of the Eastern Bloc. Surely, he could be rated alongside luminaries such his mentor, former Chairman of the KGB and eventual Soviet Premier, Yuri Andropov, and the chief of the German Democratic Republic’s Hauptverwaltung Aufklärung (Main Directorate for Reconnaissance) or foreign intelligence service, Colonel General Markus Wolf. Based on information that has been made public from US intelligence services and law enforcement records since the end of the Cold War, Kalugin was viewed by them as an extremely clever antagonist. While Kalugin was on the beat, the US tried to play down the degree of damage Kalugin’s success had inflicted but it could hardly be denied that his efforts left US intelligence services limping back to the barn a bit. One would be completely off the mark if one expected a diatribe from Kalugin in First Directorate about his former US adversaries of the US Federal Bureau of Investigation (FBI) and Central Intelligence Agency (CIA). The US not only became the host of Kalugin and his family, but granted them US citizenship.

In First Directorate, Kalugin does not engage in an esoteric discussion of the strong-arm security apparatus of the Soviet Union, what 20th century US philosopher and political theorist, Hannah Arendt, best described as a totalitarian and authoritarian Communist regime in The Origins of Totalitarianism. Indeed, he discusses it in a manner easily perceived from a KGB-officers-eye-view, from junior worm up to the top of the heap, effectively illustrating how completely alien the KGB culture was to Western attitudes and inclinations. At the same time, Kalugin offers readers a reality a bit different from what are very common perceptions of the activities and inner workings of the KGB foreign intelligence service and to a large extent, present-day foreign intelligence service of the Russian Federation. He achieved much in terms of recruiting spies who were already well-placed in the US national security apparatus and collecting some the most secret information concerning the defense of the US and Western Europe. Although Kalugin considers fair the assessment notion among many Western experts of an ultra-labyrinthine structure and system that existed within the KGB that thwarted even officers’ understanding of how the organization worked, he knocks it down describing how it’s system worked with a certain simplicity and consistency, once one became accustomed to it. Condensed, everyone had a particular job, and knew their responsibilities. However, he notes that the manner in which some KGB officers performed their jobs would vary from what was expected. Therein lies the rub. Indeed, the peculiar behavior of some officers ignited a near catastrophic end to Kalugin’s career. It became an inflection point in his life story. While narrating a story, Kalugin explores such situations with readers and provides edifying answers. One might go as far as to state that he takes on the role of instructor, introducing nuanced details about certain matters in his lecture as if he were trying to impart the full benefit of his experience to nescient, young KGB officers at the erstwhile Yuri Andropov Training Center housed at Leningrad State University or Red Star in the Yasenevo District of Moscow, preparing them for what they might face on the beat overseas. Of course, he certainly is not part of that anymore.

After the collapse of the Soviet Union, there was a deluge of information put out about the KGB. Numerous books were written by the organization’s former intelligence officers. Given the quantity and quality of a big portion of what has been made available about Soviet and Russian Federation foreign intelligence services, it was surprising how many self-declared and presumptive experts on this subject, ignored or were blissfully unaware of the realities about such work that rather casually accused US President Donald Trump of being an agent for Moscow. (If the basis was his four visits to Moscow over a 25 year period, once for a beauty pageant, then potentially any US citizen could be vacuously accused of spying for any country they may have visited more than once for tourism, business, or any other Innocuous reason. All countries have intelligence services and all are interested in the US at all levels.) Surely, Trump’s accusers believed that they fully understood as much as they needed about the Russian Federation intelligence services to reach that conclusion. Surely, in all seriousness, that purported knowledge was augmented with what they may have extrapolated from James Bond and Jason Bourne films, as well as streaming television programs about spying. They are all banal amusements, mere jumped up versions of 19th century penny dreadfuls and “adventure stories for boys.” Even Members of both chambers of the US Congress among Trump’s political adversaries, who actually receive briefings from the US intelligence community, hold hearings in committees in order to get questions about any information answered, and are allowed access to intelligence, appear more influenced by such “data” from Hollywood. Such is the state of national politics and political discourse in the US today. A problem arising from it all is that many US citizens have been bewildered by such absurd propositions from supposedly reliable sources as Members of Congress. Argumentum ad veracundiam. (Argument from authority.)

In The Second Book of his work, The History of Britain, That Part Especially Now Called England, (1670), the great 17th century English poet and intellectual, John Milton, explains: “Worthy deeds are not often destitute of worthy relators; as for a certain fate, great acts and great eloquence have most commonly gone hand in hand, equalling and honoring each other in the same age.” As is the case with his memoir, Kalugin is a worthy relator of his own actions. Surely, with the benefit of hindsight, it is easy to enumerate all of the mistakes, the poor choices, Kalugin made. With regard to that, Kalugin clearly was willing in the text to consider the propriety of his choices and actions or at least at that point he seems to have begun that sort of post-mortem self-evaluation. That process takes place on paper as he candidly conveys his personal experience within the system that turned against him. As one learns about Kalugin through First Directorate, not creating his own record of what he did in the KGB, what KGB had done, and what the Soviet system was really all about, would have been tantamount to admitting to never having had a spark of dignity or decency.

In First Directorate, Kalugin creates a sense of immediateness to what he writes. He would often build tension on the book’s pages while doing that. Indeed, many anecdotes he relates, great and small, are truly edge of seat, nail-biting stuff. Of the cases that he selected to detail, each had its own set of intriguing complications, stirring and engaging the interests of the reader. As for what he shares, his style of presentation, his pace, Kalugin’s efforts are nothing less than brilliant, and greatcharlie has come across nothing better. He beautifully provides the mise en scène using crisp descriptions of surroundings. He marvellously constructs in the mind’s eye of readers a certain atmosphere and desired theatrical effect.

About the Author

Kalugin was born in Leningrad on September 6, 1934. He is of medium height, and for his age, which as of this writing is 85. He has maintained an excellent build, and was at least at one time, quite athletic. Even into his 60s and 70s was known to go on long distance ocean swims. In public, he keeps himself well-groomed, well-attired. Apparently, he is appreciative of a good suit. He has been also blessed with being handsome for a lifetime, possessing what would be popularly described as “manly good looks.” Indeed, it is hard to imagine how anyone would hire Kalugin as an intelligence officer, believing he would be able to avoid notice in public or fade into the background. However, by his countenance, one could immediately recognize his was not just “a pretty face.” Beyond his becoming smile, there has always been a discernable depth to Kalugin even during his earliest years. Nearly everyone who has met Kalugin has called him a charming man with a big and ready laugh and an attractive wit. In conversation, he is talkative, but does not dwell long on unpleasantries. In the US, Kalugin lived in a suburb north of Washington in Silver Spring, Maryland. His wife Ludmila was part of that life for 47 years. They fell in love in 1951, the same year that he made the firm decision to join the intelligence service. She saw Kalugin through all of the rough days of his career, particularly the false allegations, his demotion, the transfer to Leningrad, his stand against the KGB after retirement, his difficulties with Putin’s regime, and the self-imposed exile. His wife was also at his side in the US when she died of cancer in 2001. Doubtlessly, at least at some point, it was difficult for Kalugin to keep it together over her loss. Kalugin is known to entertain visitors to his home by showing off mementos of his intelligence career. When Kalugin first arrived in the US, he served as a lecturer at Catholic University. Since then, Kalugin has become a much sought out speaker, and has lectured at a multitude of venues, traveling his new homeland, from state to state “without papers,” enlightening audiences primarily on Putin’s Russia and the often stunning actions of his intelligence services. Currently, he is a professor at the Centre for Counterintelligence and Security Studies.

Kalugin’s connection with Soviet intelligence began at an early age. After graduating from high school in Leningrad in 1952, and completing his mandatory military service, Kalugin was admitted to study at the Institute of Foreign Languages in Leningrad run by the Ministerstvh Gosudarstvennoe Bezopasnosti (Ministry for State Security) or MGB, the precursor of the KGB foreign intelligence service. After graduation from there in 1956, with honors, he was sent as a young officer to study at the Higher Intelligence School No. 101 of the KGB in Moscow which actually fell under the USSR Council of Ministers. The KGB leadership selected Kalugin for assignment to the First Department of First Chief Directorate which concerned foreign intelligence operations in and against the US and Canada. In 1958, Kalugin, who was considered a graduate of the faculty of journalism, was deployed to New York to undertake journalism studies at Columbia University. After briefly returning home, he was deployed again to New York, working in the early 1960s as a journalist for Moscow Radio at the UN. Kalugin was very competent as a reporter. He was not just a spy, but a successful one. One might say that spying seemed to be Kalugin’s metier. His working habits as a KGB officer, as he describes in First Directorate, were to be envied. He was always honorable and discreet, using mental agility and memory, acting gradually and with a certain gentleness. Kalugin let nothing escape his examination. In 1964, due to the threat of being arrested, he was recalled to the Soviet Union, and assigned as press officer in the Ministry of Foreign Affairs. However, he was not in Moscow long. He was soon sent back to the US, on that occasion to Washington. There, Kalugin would serve as the equivalent of the deputy KGB station chief under the guise of a deputy press attaché of the Soviet Embassy. In 1971, according to Kalugin, he was suspected of treason, but the Chairman of the KGB, Yuri Andropov, knocked the matter down deciding the case in his favor. Andropov, as elaborated upon further later in this review, was a mentor for Kalugin and took an interest in his career trajectory. He was transferred to the external counterintelligence service. By 1974, at the age of 40, Kalugin received the rank of KGB Major General. It was at this stage that the Kalugin’s activities were more reflective of Soviet behavior that caused most to deem the country as an immoral, worldwide menace, and threat to global peace and security.

For Kalugin, there was unlikely any real opportunity, in the midst of his work against the West, to view matters from a broader or humane perspective. Comparing Kalugin’s efforts side-by-side versus his opposite numbers in the West boil down to efforts to apportion wickedness. There was a balance of terror in the Cold War. Deception, subversion, and countersubversion was what it was all about. The 18th and 19th century French Emperor Napoleon Bonaparte was quoted as saying: “In war, as in politics, no evil–even if it is permissible under the rules–is excusable unless it is absolutely necessary. Everything beyond that is a crime.” It was easy enough in the West to understand that during the Cold War, intelligence services fought under the conundrum of knowing how much could be done to defend a free and decent society while remaining a free and decent society worth defending. The Soviet Union was governed under an authoritarian, Socialist and Marxist-Leninist system directed under the auspices of the de facto one-party rule of the Communist Party. As aforementioned, instrumental in maintaining order to allow for the implementation of revolutionary precepts was the KGB, which often in the performance of its domestic security mission showed little regard for the human rights of Soviet citizens. To that extent, its behavior observed domestically would be reflected in its foreign intelligence activities overseas. Yet, despite what may have been the concept and intent of KGB headquarters concerning the conduct of its officers, not all, but many performed, without ethics, without any moral creed. Certainly, Kalugin had well-served the Soviet Union and the Communist Movement. There was never any indication in First Directorate that Kalugin had a sense that he had sacrificed his own humanity during his career. In Kalugin’s mind, whatever he did for the service, even if it skirted what was morally questionable by his own ethics, was for the greater good, not to soothe his own ego. If Kalugin caused anyone any suffering through this process, he most likely would say it was regrettable but the best option at the time.

Facilis descensus Averni: Noctes atque dies patet atri ianua Ditis; Sed revocare gradium superasque evadere ad auras, Hoc opus, hic labor est. (The gates of hell are open night and day; Smooth the descent, and easy is the way: But to return, and view the cheerful skies, In this the task and mighty labor lies.) While there was a tacit understanding that a recruit could find a home with all the care and comfort imaginable during and after active service in the KGB, the Soviet government made no real promises that the link would be permanent through thick and thin. When things were going well, there was a duplicity between Kalugin and the KGB that he loved. That meant that he, as with others, would support and tolerate what he knew was wrong. When things were not going well, especially between managers and a staff or field officer, Kalugin demonstrates that the KGB could become a very brutal place internally for that officer. By the time Kalugin had been demoted and sent to Leningrad, long since renamed St. Petersburg following the collapse of the Soviet Union, he had become jaded by what he experienced on the front line of the Cold War. Alas, all of his efforts may have felt futile to him. Indeed, in the end, his struggles with the West, his extertions over the years, proved to be Sisyphean. Kalugin metaphorically was left standing alone on a dark and stormy night, apparently feeling abandoned by the Soviet government that he loved so dearly, to which he was loyal to the core. Due to all of this, Kalugin had to face the painful reality of many loyal Soviet citizens, which was that the hand of the Soviet state that they were taught early on, was benign, caring, comforting, encouraging, and infallible, as not always extended open palmed toward them and their needs. Kalugin had to lift his head above those of his adversaries. He would eventually recognize the need to make up for quite a sin of promoting such an organization. Kalugin retired from the KGB on February 26, 1990, and became a vocal independent critic of the Communist system. When one who lacks political power is unable to implement change, one can still voice opposition. Levels of success and failure will vary due to circumstances. It was Kalugin’s inability to stand by quietly that brought down upon him the full weight of the intelligence industry, the oppressive reputation of which he helped to build. Kalugin’s continuous attacks on the KGB garnered him notoriety and a political following. In 1990, Soviet President Mikhail Gorbachev was rash enough to sign a decree stripping Kalugin of his rank, decorations, and pension. If Gorbachev only had a hint of what was coming his way from the same KGB management that his decision supported, perhaps he most likely would have made another choice. Gorbachev would restore all that was taken from Kalugin in August 1991, after the coup attempt. Kalugin loved his homeland, Mother Russia and the Soviet Union, and presumably still does today. Certainly, he does not love the regime that controls it. After retirement, Kalugin served as a deputy in the Supreme Soviet, representing the Krasnodar region from September 1990 to December 1991. Kalugin ventured into politics to change the security apparatus, reform it. That was simply not in the cards. Doubtlessly, Kalugin never planned to become an expat, or more accurately, live in a self-imposed exile. He had little choice otherwise for existential reasons. He could not change his circumstances, so he had to change his perspective. Kalugin conquered the uncertainties of his life in Russia by leaving his homeland and embarking on a new journey in the US. It is from the US that he produced his memoir.

Nullius addictus lurare in verba magistri. (No master can make me swear blind obedience.) Vladimir Putin came on the scene ostensibly as a reformer, hand picked by Yeltsin. Apparently, Putin came highly recommended by other self-declared reformists and he managed to curry favor with President Boris Yeltsin of the nascent Russian Federation. Yeltsin, known for being earnest, was a bit too trusting. Putin ostensibly embraced the idea of a new beginning for Russia. At that point, it would have been counterintuitive for Putin to bemoan the Soviet Union’s collapse. What lurked beneath the surface would eventually set the path upon which he placed his country. Kalugin was able to see Putin straight. Alarm bells started to ring in his head, and he could see what was coming. By the time he wrote First Directorate, he was already feeling terribly apprehensive. Little was done directly by Kalugin to set himself up for what became a near David and Goliath schema of independent, capable man taking on the monstrous Evil Empire as well as its second-self, Putin’s Russia. Indeed, left in control of the Russian Federation by Yeltsin after 1999, Putin, rather than reform the system, gradually made it look more and more as the old Soviet one, particularly with regard to the intelligence services. Putin wanted all of the former KGB men, many of whom had become extremely popular among the Western think tanks, academia, the news media and law enforcement and intelligence services, to become Lotus Eaters. Much milk had been spilled concerning Eastern intelligence operations after the collapse of the Soviet Union and the dutiful Kalugin had been tasked one more time by his “former” masters in Moscow, to get some of it back into the bottle. Putin felt that there was a threat posed by revelations by KGB officers eager to please book publishers, magazine editors, and television producers than an effort to establish power over the intelligence service left over from Soviet times, including the old boy network of retirees. If any talking had to be done, Putin likely would have preferred pushing out a message strictly controlled by the Kremlin amounting to a curious sort of ventriloquism. Active measures had come home. Kalugin came to the personal attention of Putin himself. Kalugin from what was presented was the very soul of discretion. There was presumably nothing to fear from him. He was not snooping round corridors. However, there was an apparent sense of anger toward Kalugin in the Kremlin not only because he ostensibly traded in on his knowledge of the service, but that he told enough to stir a sense of betrayal. Among Kalugin’s former KGB colleagues who would eventually people Putin’s government, were the same adversaries from the organization who could not hold a candle to him in the industry. They did not have his stature, only reputations for wrongdoing, oppression. Thus, envy and jealousy were also the likely culprits for their odium toward Kalugin as much as anything else. Kalugin would be solely portrayed in a negative light by Putin and his senior aides and advisors. To hear Kalugin speak of Putin, it is clear that he became a perfect monster in his eyes. While Kalugin was lecturing in the US in 2002, he was put on trial for treason in absentia in Moscow, in part for certain revelations placed in First Directorate, and consequently sentenced to 15 years in prison. Kalugin now appears relatively serene. Through his words, one recognizes that he has come to terms with his role in an extremely dangerous and dynamic organization. Kalugin became a US citizen on August 4, 2003. Kalugin would insist that Putin would love to send a message to the US by harming him. At the present, with Donald Trump as US President, the harsh consequences of Moscow doing such would with assurity far outmatch any possible gain, psychic or otherwise.

Critiquing First Directorate

Perhaps it may be revealing too much, but without pretension, greatcharlie must admit initially feeling somewhat ambivalent about reviewing First Directorate, unsure of being knowledgeable enough to judge the written work of such an extraordinary professional as Kalugin. Suffice it to say that it must be left to readers of this review, who will hopefully also read First Directorate, to determine whether greatcharlie got it right. Seeking out Kalugin’s memoir, one might discover as greatcharlie did that his1994 book was published in English under two titles: First under First Directorate: My 32 Years in Intelligence and Espionage against the West published by St. Martin’s Press, as it is reviewed here; and, Spymaster: My 32 Years in Intelligence and Espionage against the West published by Smith Gryphon Publishers. In a 2009 revised edition of Spymaster: My 32 Years in Intelligence and Espionage against the West, rev. ed. (Basic Books, 2009), in which the text is enhanced with greater details about his cases. In a new Epilogue, discusses developments in his personal life since the book’s first publication. Upon examining the text of each edition, one cannot help but be impressed by the care invested in the creation of this work. As indicated on the cover of both titles, Kalugin completed the book with the assistance of the journalist and former head of theMoscow Bureau of the Philadelphia Inquirer, Fen Montaigne. Surely Montaigne’s contribution was useful and important. Still, anyone fortunate enough to have heard Kalugin speak publicly or review recordings of his many news media interviews and presentations at colleges, universities, think tanks, foreign policy associations and societies on YouTube, could attest that his command of the English language is superb. Indeed, he writes First Directorate in a way that is clear, concise, and flawless grammatically. Surely, Kalugin would have had little difficulty actually establishing himself as a novelist or nonfiction writer in the West if he had chosen to do so. Kalugin initially developed his proficiency in English to serve as an element of his tradecraft overseas. It did, as he used the unofficial cover in the US of Soviet journalist. He had to comfortably communicate with others and fully comprehend the world in which he was immersed. Kalugin was also proficient in German and Arabic.

Kalugin hangs what he provides In First Directorate’s 374 pages on two chronologies: the chronology of his career; and a historical chronology, neatly pairing events of his times and experiences he had which were directly connected to them. The titles of books chapters mark milestones of a life lived. They include: “A Stalinist Boyhood”; “Washington Station”; “The Spy Game”; and, “Exile”. Kalugin jumps into his story as early as the Prologue with an anecdote from his formative years as a KGB officer, working in the US under non-official cover. Indeed, Kalugin offers readers bits and pieces on the Cook case, which involved a US scientist from the US defense contractor, Thiokol, who became his and the KGB’s prize recruit. It proved to be a particularly important episode for Kalugin. He later discusses how the echoes of that case ultimately shaped the outcome of his career. Having set the reader off on that track, Kalugin then formally begins the memoir, allowing the reader to learn about his formative years. Readers are provided an understanding of how he came to accept Communism from top to toe in the traditional sense, how that shaped his worldview, his choice for a career, and how he got into the KGB. As he retraces his steps, he begins skillfully peopling the world in which he allows his readers. For instance, readers learned about his father and the psychic influence that he had on Kalugin due to his position in the the Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat of Internal Affairs) or NKVD, a forerunner of the KGB. He provides enough about each personage, allowing for the creation of a full image of the individual in the reader’s mind. Having shared memories from his early years, Kalugin begins discussing his career in Soviet foreign intelligence. Interestingly, his connection to the intelligence service began as early as the years of his formal education. It all neatly blends together.

First Directorate is far from dull, plodding, or pedantic. As for the mechanics of his method, once Kalugin decided what he is going to offer, he did so with a pace that could be called a very smooth and normalized ejection fraction–stealing a term from the medical industry concerning the measure of blood pumped out with each heartbeat. The anecdotes told are the blood which keeps makes Kalugin’s story lively, informative, edifying, and satisfying. Kalugin does not simply unload ideas and hope the reader does not get lost in the weeds when they encounter what seems to be abstraction, due perhaps to a lack of in-depth knowledge about the spy business. One will discover that as the situations he describes evolve, characters evolve, and Kalugin evolves. Kalugin makes no assumptions about the reader’s ability to grasp all that is going on in the text in terms of tradecraft and the spy business. He does not take for granted how much the reader can absorb from what he teaches. Rather, he takes control of that process, apportioning how much of the story he feels would be appropriate. When he feels the reader should be ready for more, Kalugin increases quantity and complexity in his anecdotes. To that extent that he does all of this, Kalugin uses what could be best described as a pedagogy for developing the reader’s understanding of the world he is moving them through.

Kalugin creates a sense of immediateness to what he writes. He would often build tension on the book’s pages while doing that. Indeed, many anecdotes he relates, great and small, are truly edge of seat, nail-biting stuff. Of the cases that he selected to detail, each had its own set of intriguing complications, stirring and engaging the interests of the reader. As for what he shares, his style of presentation, his pace, Kalugin’s efforts are nothing less than brilliant, and greatcharlie has come across nothing better. He beautifully provides the mise en scène using crisp description of surroundings. He marvellously constructs in the mind’s eye of readers a certain atmosphere and desired theatrical effect. Unless greatcharlie is extremely mistaken, he paints with words in a way that will cause First Directorate’s readers to find themselves, at the same time while fortunately sitting in at some safe spot, feeling as if they are actually present on the scene that he describes, watching everything transpire perfectly through the mind’s eye.

It would be an understatement to say First Directorate did not have paeans written about in 1994 when published in the US. Indeed, Kalugin’s book was not really appreciated or welcomed. Through book reviews, one can pick up on a reviewer’s disposition generally, and can gain a good insight about a reviewer’s perceptiveness and thinking. (In that vein, readers can perhaps gain some degree of insight into how greatcharlie thinks given what is noted here as important about First Directorate.) Perhaps 1994 reactions were due to the proximity of the book’s publishing to the so-called end of the Cold War, marked with the collapse of the Soviet Union. Feelings within journalistic and literary circles about the Soviet Union and all connected to it were still decidedly negative, even hostile. It was likely those sensibilities that influenced the thinking of reviewers of First Directorate. The following is a sample of the reviews it received. In a October 13, 1994 review in the Washington Post, Amy Knight did little to conceal her disdain for Kalugin. Knight wrote: “Though he proclaimed himself a democrat in 1990 and denounced the KGB, Kalugin had spent more than three decades determinedly trying to undermine Western democracies. His book tells us a great deal about the KGB’s operations during the Cold War, but it also raises anew the question of how we should react to the confessions of erstwhile enemies.” Distrustful of his intentions in the foregoing statement, she evinced her concern over Kalugin’s integrity with the words: “Kalugin can hardly be criticized if he wrote this book simply to make money. After all, we in the West have been encouraging Russians to become entrepreneurs. But did he have another, darker purpose? Is it possible that Kalugin’s much-publicized denunciation of the KGB was stage-managed to give him credibility in the West, so that he would be believed when he told people that he knew of no KGB moles in the CIA?” In a December 25, 1994 review in the Baltimore Sun, entitled, “The Spy Who Loved It: Tales from a KGB Life”, Scott Shane begins by stating: “In ‘The First Directorate,’ written with the assistance of former Philadelphia Inquirer Moscow correspondent Fen Montaigne, Mr. Kalugin tells his engrossing story and tells it well. Focusing on Kalugin as KGB intelligence officer, he notes: “A spy lives by his powers of observation and memory, and they equally serve the autobiographer.” Shane reveals his suspicions of Kalugin, writing: “Mr. Kalugin, whose perpetually raised eyebrows give him a look that is at once untrusting and untrustworthy, nicely illustrates the habit of lying spies naturally develop. Indeed, Mr. Kalugin is so candid about the cheerful Iagoan malice with which he did his dirty work that his occasional, self-described twinges of conscience come across as unconvincing. As his story almost unconsciously makes clear, it was not the KGB’s brutality that turned him against the agency.” Having stated that, Shane completes his review somewhat positively, saying: “One need not wholeheartedly admire Mr. Kalugin, however, to enjoy his story. It is a reminder that in the wake of the Soviet collapse, we have learned a good deal more about the KGB than we have learned about the CIA and its sister agencies on the other side of the Cold War.” On November 9, 1994 in composite review of post-cold-war scholarship on Lenin, the atomic bomb, and KGB espionage in the Christian Science Monitor, Leonard Bushkoff stated about First Directorate: “After the beautifully crafted books by Holloway and Kapuscinski, there is a letdown in The First Directorate: My 32 Years In Intelligence and Espionage Against the West, the bureaucratic memoirs of Oleg Kalugin, a retired KGB major-general whose authoritative visage has graced American television. His book–written with Fen Montaigne–is filled with lively tidbits about operating in the United States, recruiting agents, roaming the world on this or that mission – and enjoying the perks. Bushkoff goes on the say: “The ideological disillusionment that Kalugin insists began in the 1980s is unconvincing in this ambitious career-minded official, who now presents himself as a liberal, democratic political figure.” Among professional reviewers, there seemed to be more of a willingness to beg off on uncoated expressions of suspicion over Kalugin’s intentions and actions, and even more, his character as with the foregoing. In Booklist, a book-review magazine that has been published by the American Library Association for more than 100 years, Gilbert Taylor wrote in August 1994: “After he had been cashiered from the KGB in 1990, Kalugin blazed into prominence as a critic of the pervasive spy empire. But oddly enough, he remains a professional loyal to the spook’s ethos: tell no tales out of school. Although frank about generalities, he ventures few blockbusting specifics that haven’t popped up elsewhere in the post-cold war wave of espionage books, but this memoir of a stellar career in the secret service is, nonetheless, engrossing for aficionados.” Taylor finishes his review noting: “Filled with anecdotes linked by personal journey from Stalinist true believer to champion democrat, Kalugin’s account of life in the secret world will haul in all spy buffs–a number to be augmented by a full-press publicity push.”

Given Kalugin’s former profession, spying, it would be fair to ponder whether the book relates truth, fiction, or something in between. Indeed, some readers may wonder whether one of the main elements of spying, promoting fraud, influenced his writing of First Directorate. As aforementioned, Kalugin has the skills to provide a colorful description of a man, and ascribing vibrant characteristics, impressive associations, and intriguing experiences to him. It also cannot be stated with absolute certainty by greatcharlie Kalugin actually loosed-off a full-frontal on himself as well as the KGB. However, greatcharlie is convinced that while there may very likely be certain omissions from his anecdotes, Kalugin presents the truth about himself in First Directorate. That truth about himself is rich enough, and would hardly require any embellishment. Although Kalugin’s intelligence career was amazing and his superb work in the KGB that made him more desirable to his new country’s government, there was more to Kalugin than his work. Some might feel Kaligin does quite a bit of preening in First Directorate. However, perhaps a second thought might be given to that idea backed by the consideration that among specialists, masters of a particular craft, there is typically a desire to look over their shoulders, to detail what has transpired, and to scrutinize themselves and their actions technically and tactically. Chronicling the past on paper, the convivial Kalugin also seemed to recount it all in his soul and spirit. As Kalugin dredges around himself, to discuss his contacts with people and memories of events, he willingly opens the kimono on his conscience. In the Preface of The Cenci: A Tragedy in Five Acts, the 18th century English romantic poet, Percy Bysshe Shelley, wrote: ”The highest moral purpose aimed at in the highest species of drama is the teaching the human heart, through its sympathies and antipathies, the knowledge of itself.”

The symbol of the KGB (above). It should not be overlooked that all that Kalugin discusses in First Directorate is actually couched in an overarching discussion of the operations of the giant Soviet state security service, the KGB. The KGB was gloriously called the Soviet Union’s ”Sword and Shield” and the “Vanguard of Communism.” Its  primary responsibilities of the KGB were: foreign intelligence; counterintelligence; operatives investigatory activities, protecting the Soviet border, protecting the leadership of the Central Committee of the Communist Party and the Soviet Government; organization and security of government communications; and combatting nationalism, dissent, and anti-Soviet activities.

What Was the KGB?

It should not be overlooked that all that Kalugin discusses in First Directorate is actually couched in an overarching discussion of the operations of the giant Soviet state security service, the KGB. At the risk of being perceived as tiresome to those who already know much on the subject, some of the basics about the behemoth Soviet security organization are laid out here by greatcharlie for those less-familiar with it. The KGB was gloriously called the Soviet Union’s ”sword and shield” and the “Vanguard of Communism.” Its  primary responsibilities of the KGB were: foreign intelligence; counterintelligence; operatives investigatory activities, protecting the Soviet border, protecting the leadership of the Central Committee of the Communist Party and the Soviet Government; organization and security of government communications; and combatting nationalism, dissent, and anti-Soviet activities. Headquartered at Lubyanka Square, 2 Moscow, the KGB was well-situated, well-equipped, to cope with external, foreign threats to the system, counterrevolutionaries and reactionaries internally, as well as organized criminals and the black market. Its manpower would steadily grow in parallel with its activities and influence, reaching a total of 496,000. A large portion of that number included the Pogranichnyie Voiska KGB CCCP (Border Troops of the KGB USSR), a defense against threats from land, air, sea to Soviet territory. In 1989, the organization’s strength was estimated at 230,000 covering 63,000 kilometers of the Soviet border. There were additional smaller formations and independent units. Its land air and maritime troops and sailors functioned under the Main Directorate of the Border Troops which was subordinated to the First Deputy Chairman of the KGB. The Vtoroye Glavnoye Upravleniye (Second Chief Directorate) or VGU was the Internal Security Service of the KGB. Among Soviet citizens at home and abroad, it was the KGB’s Second Chief Directorate in a paranoid search for Soviet enemies and never ending quest to maintain total control over the Soviet Union’s population that unnerved and struck terror in their hearts as they tried innocently going about their daily business. In Hollywood, a sure-shot way to create a dark, mystifying picture of life in the Soviet Union was to depict scenes in which ordinary Soviet citizens would occasionally be taken aside by the KGB and asked: “Show me your identity card” or, make the more polite request, “Identity card please.” It would capture the flavor of Soviet rule and have the chilling effect on audiences, accurately illustrating how alien and atrocious life was in the Soviet Union and under Communism in general. The KGB was to be avoided by the ordinary Soviet citizen as best as possible. During Kalugin’s time, the KGB truly had a grip on everything except the Communist Party organization. Even then, the KGB was also known to play an important part in the allocation of power and authority by Soviet leaders after Stalin’s death, being drawn into the arena of internecine conflict among them. Perhaps it could be said that all Soviet citizens sailed the same sea but KGB members did so in different boats. The nomenklatura in the Soviet Union, or high ranking management of government bureaucracies and Communist Party functionaries, reigned as the main authorities in the country, ironically becoming the de facto aristocracy in its society, and entitled themselves to opportunities and privileges unavailable to ordinary citizens. The apparatchiks, or government bureaucrats, who actually oversaw the KGB’s abhorrent work of keeping the Soviet people under the thumb of their government, saw themselves as being indispensable members of an indispensable Soviet instrumentality. Most generally believed that as a benefit of being a member of the KGB, there was little chance that the conditions which beset ordinary Soviet citizens would impact their circumstances until discovering otherwise. Nimia illæc licentia profecto evadet in aliquod magnum malum. (This excessive license will most certainly eventuate in some great evil.)

The history and organization of the KGB’s foreign intelligence service, which directly concerns Kalugin’s career, well reflected the nature of its global mission and how that mission was performed. In 1917, the post-Bolshevik Revolution Russian Soviet Federative Socialist Republic (RSFSR) secret police was founded and designated Vserossiyskaya Chrezvychaynaya Komissiya Po Borbe S Kontrrevolyutsiyey I Sabotazhem Pri Sovete Narodnykh Komisarov RSFSR (All-Russian Extraordinary Commission for Combating Counterrevolution, Speculation and Sabotage under the Council of People’s Commissary of the RSFSR) better known as the Cheka. It was Soviet Premier Vladimir Lenin, himself, who characterized the Cheka as the sword and shield of Communism. In those postwar years, Soviet internal security, foreign intelligence, and counterintelligence organizations went through a period of transformation donning an alphabet soup of titles. As outlined in Henry S. A. Becket, The Dictionary of Espionage: Spookspeak into English (Stein & Day, 1986), its various iterations included: 1922-1923, Gosudarstvennoe Politicheskoe Upravlenie (State Political Administration) or GPU; 1923-1934, Obedinennoe Gosudarstvennoe Politicheskoe Upravlenye (Unified State Political Administration) or OGPU; 1934-1938, Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs) or NKVD; 1938-1946, Narodnyi Komissariat Gosudarstvennoe Bezopasnosti (People’s Commissariat for State Security) and Narodnyi Komissariat Vnutrennikh Del (People’s Commissariat for Internal Affairs) or NKGB-NKVD, placing police and security functions under one chief; and, 1946-1953, Ministerstvo Vnuirennikh Del (Ministry for Internal Affairs) and Ministerstvh Gosudarstvennoe Bezopasnosti (Ministry for State Security) or MVD-MGB. Eventually all of the non-military security functions were organized in what was dubbed the Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or the KGB. Founded upon the experiences of other iterations of Soviet state security, the new KGB had no need to shed baby fat as it were. It was populated by men and women made of the same solid stuff of those who around 20 years before defended Leningrad and Stalingrad and drove Germany and its allies eastward until they reached Berlin. However, things are seldom perfect in any organization.

KGB’s leadership included its Chairman, the First Deputy Chairman (there could be more than one), Deputy Chairman (as many as 4 to 6), a policy Collegium, which included a chairman, a deputy chairman, the directorate chiefs, and the KGB chairmen of the Soviet republics. As aforementioned, Pervoye Glavnoye Upravieniye (First Chief Directorate) or PGU of the KGB which was the element responsible for foreign operations and intelligence activities and concerned Kalugin’s work. As such, the First Chief Directorate would provide for the training and management of covert agents, intelligence collection administration, and the acquisition of foreign and domestic political, scientific and technical intelligence. According to Christopher Andrew and Oleg Gordievsky, Comrade Kryuchkov’s Instructions: Top Secret Files on KGB Foreign Operations, 1975-1985 (Stanford University Press, 1993), the KGB included the following directorates, services and departments during Kalugin’s years there. Included among the directorates and services were: Directorate R: Operational Planning and Analyses; Directorate S: Illegals (agents inserted into societies, blending in, but carrying out orders from Moscow.

Forged documents, establishes themselves as citizens of the host country.); Directorate T: Scientific and Technical Intelligence (collected scientific, technological, and military information through espionage. Targets were in the Western industrial sector.); Directorate K: Counter-Intelligence: (infiltration of all the foreign special service operations: intelligence, counter-intelligence, police forces worldwide); Directorate OT: Operational and Technical Support; Directorate I: Computers; Directorate RT: Operations in USSR; Directorate V: “Wet affairs” (track down traitors, sabotage, assist international revolution, terrorism, and act in time of war.); Service A: Active Measures (disinformation, propaganda, forgery; support of front organizations, underground movements, revolutionary insurgencies, criminal and terrorist groups; Service R: radio communications; and, Service A of the 8th Chief Directorate at the First Chief Directorate (the code section).

Operations broke down regionally and functionally in the following departments: First Department: US and Canada; Second Department: Latin America; Third Department: United Kingdom, Australia, New Zealand, Scandinavia, Malta; Fourth Department: East Germany, West Germany, Austria; Fifth Department: Benelux countries, France, Spain, Portugal, Switzerland, Greece, Italy, Yugoslavia, Albania, Romania; Sixth Department: China, Laos, Vietnam, Cambodia, North Korea; Seventh Department: Thailand, Indonesia, Singapore, Japan, Malaysia, Philippines; Eighth Department: non-Arab Near Eastern countries including Afghanistan, Iran, Turkey, Israel; Ninth Department: English-speaking Africa; Tenth Department: French-speaking Africa; Eleventh Department: liaison with Socialist states; Thirteenth Department: direct action, “assassination,” of enemies abroad and at home; Fifteenth Department: registry and archives, security of government installations; Sixteenth Department: signals intelligence and operations against Western code clerks; Seventeenth Department: India, Sri Lanka, Pakistan, Nepal, Bangladesh, Burma; Eighteenth Department: Arab Near Eastern Countries and Egypt; Nineteenth Department: Soviet Union Emigres; and, Twentieth Department: liaison with Third World states. It must be noted that special attention was given to the UN by the First Chief Directorate. The UN provided a peaceful, respectful, diplomatic forum for international dialogue, yet it was the site of extensive Soviet activities inside the UN during the Cold War. Impartial UN employees from Eastern Bloc also employed by KGB. Ideals and goals of the UN not followed. The orders that they would obey only came from KGB.

Beyond its own operations, the First Chief Directorate very successfully directed and controlled other Eastern Bloc intelligence services that were very often operating under the radar in many countries around the world. The officers of those aligned intelligence services certainly did not in any form akin to the Malgré-nous of the Alsace-Moselle performed for the German Waffen-SS during World War II. The product of many Eastern Bloc intelligence services actually far exceeded expectations as well as the capabilities of their Soviet task masters. Case in point was the Hauptverwaltung Aufklärung (the Main Directorate for Reconnaissance), the foreign intelligence service of the Deutsche Demokratische Republik (German Democratic Republic). Under the skilled leadership of Markus Wolf, its Western foes even had to acknowledge that it was probably the most efficient and effective such service on the European continent

The author as a teen (above). As a teen, Kalugin devoured the books of Arkady Gaidar, which included stories of young characters doing courageous and noble deeds for Motherland. It planted seed in Kalugin’s mind of becoming a secret service officer. Those feelings were intensified when he attended camp for children of secret police. He met with university students attending the Security Ministry’s Higher School. Kalugin saw them as confident, fun loving. Kalugin stated: “I wanted to be like those dashing officer trainees, and a career in the Intelligence Service beckoned.” At 17, he decided to join the intelligence service. With an English proficiency and strong academic capabilities, he was well qualified.

Kalugin’s Early Years and Career Choice

In illo viro, Tatum robur corporis et Naomi fuit, it quocunque loco Angus esset, Fortuna facturus. (In that man there was such oak-like strength of body and mind that whatever his rank by birth might have been, he gave promise of attaining the highest place in the lists of fortune.) As has been the case with previous reviews, greatcharlie most enjoys examining a memoir to understand what sort of individual develops into who the author became. In its review of First Directorate, greatcharlie explores how, from youth to his earliest years in the KGB, how Kalugin evolved into the man he is today.

At least from what he shares, his early life was entertaining, pleasurable to recall rather than filled with dissatisfaction, disappointment, and hard lessons. Indeed, Kalugin relates the days of his youth with a subtle humor, recounting the efforts of a young man trying to make his way through life. Kalugin was raised in a “sleeping district” outside of Leningrad, something akin to a French banlieue. His circumstances seemed relatively ordinary, however, his father worked for the NKVD. Kalugin’s father, Danil, was a dark haired, handsome man with facial features revealing a Tartar blood trace. He was not well educated, but by Kalugin’s description a solid man, who cared for his family. After serving In the Red Army in the 1920s, he sought work in Leningrad, and that is when he landed a job as security guard for the secret police, then known as the NKVD. When Kalugin grew up, his father was working at the Headquarters building in Smolny. (Interestingly, in the KGB, officers who were the children of officers and former officers of the security services are affectionately referred to as Chekisty (Chekists), a name derived from the first security service in Communist Russia mentioned earlier, the Cheka. Some would come from families whose “roots” go back to the beginnings of the Communist Party as Russian Federation President Vladimir Putin. Children raised in the Chekist community, attending schools and a university Chekists’ progeny typically attended.)

Kalugin’s mother Klavdia, came from a family of skilled factory workers from St Petersburg for more than a century. Based on the manner in which he described himself, Kalugin was clearly a bon garçon, born with a good soul, nourished by a fine family and appropriate associations in his youth. Unfortunately, he was born during a wave of terror in which 29 to 40 million Russians were killed, and a dark shadow hung over Russia. When Nazi Germany invaded Russia, Kalugin travelled wuth his mother to stayed in Omsk, Siberia. His father remained in Smolny, guarding Party elite. Kalugin and his mother returned to Leningrad after a 900 day siege. Only her sister survived the war. Other seven members among 27 million lost during war. This clearly had an impact on the young Kalugin. Dogma among Russians in the immediate postwar period was to say that Russia’s victory in the so-called Great Patriotic War proved Communist system was best. The defeat of the Nazis proved to Kalugin and his young compatriots that Soviet Union was invincible. Still, it went much further for Kalugin. He confirms in First Directorate that from the days of his youth he was absolutely subsumed by Communism; he was a true believer, and that perspective colored every decision he made. He yearned for the opportunity to defend his political ideals, defend his country, and fight on behalf of the Communist Movement. Kalugin’s political leanings did not make him a zealous firebrand.

Unless greatcharlie is terribly mistaken, as he grew, Kalugin appears to have been gentle in temperament, but at the same time a mature boy, not showy, but within possessing a burning ambition with an idea of where to place it. Kalugin undertook the path toward excellence as a Communist with a great sense of ritual. He joined the Young Pioneers at an early age, and in his teens, he became involved with Kommisol. These were the sort of activities that types such as Kalugin went for. One could posit that as a result of his indoctrination in the Soviet Union, Kalugin genuinely viewed Communism as a coherent ideology and provided a clear direction. For the Communist, too, hope supported imagination and drove the individual’s faith in the system. Faith supported and drove the individual’s action to achieve. Despite violent outcomes of KGB dealings with his fellow citizens, Kalugin would have likely confided that there was no reason to argue the point. In his heyday during Staliin’s era of Soviet Premier Joseph Stalin, Kalugin likely would have looked any Western accusers directly in the eye and declared it all as Western disinformation, compelled by their bourgeoisie sense of morality to falsely critique the “superior” Soviet system any way they can. Much of what Soviet citizens were told about their country’s government, its security apparatus, its leaders, and its place in the world was filtered out by Moscow leaving what was reasonably bad out. Given the Kremlin insistence on concealing the truth about the country, many indoctrinated adherents of the system would contribute to their misunderstanding of it by doing their own filtering. Thus, the rest of what was understood of the Soviet Union, typically shaped by the desire to create the best picture of their country as possible, was usually just conjecture. It also made reasonable sense to those as Kalugin, psychically bound to the Soviet system, that there would always be the occasional differences of opinion over how efficiently something was done or how the government might have handled a matter more effectively under the Socialist framework. Amabilis insania. (Fond illusion.)

As a teen, he devoured the books of Arkady Gaidar, which included stories of young characters doing courageous and noble deeds for Motherland. It planted seed in Kalugin’s mind of becoming a secret service officer. Those feelings were intensified when he attended camp for children of secret police. He met with university students attending the Security Ministry’s Higher School. Kalugin saw them as confident, fun loving. They sang songs in English and Russian to campers to younger students. Kalugin stated: “I wanted to be like those dashing officer trainees, and a career in the Intelligence Service beckoned.” Kalugin had never assumed that he would have an ordinary life. Kalugin saw possible work in the state security service as more than a job. For him, it was a grand opportunity to support and defend his political ideals. Kalugin and his cohorts believe they were born to be men of action. Each wanted to be a pride to his fellow countrymen. For Kalugin, as with most of his young colleagues, the KGB offered a solid basis for believing that the Soviet system could be protected and sustained. The KGB, as a central organ of the government, ostensibly had the know-how and the resources to prevent the Soviet Union, and the contiguous countries of the Eastern bloc that it led, from falling into a chaotic condition. There was a perspective once common in the Soviet Union, and perhaps holds a place today in the Russian Federation, that in an heroic way, Kalugin and his KGB comrades were making good on the sacrifices of the previous generation of Soviet citizens in the Motherland’s defense. Kalugin explained that at 17, he decided to join the intelligence service, then called the MGB. With an English proficiency and strong academic capabilities, he felt qualified. Kalugin’s father, Danil strongly objected. As he worked for the NKVD, his father knew only too well what happened in the Soviet Union under Stalin, and. Indeed, he witnessed first-hand–from the screams he heard as a jail guard to the countless Communist Party bosses he saw disappear during his days at Smolny–what the glorious security services were doing to the Soviet people. Danil Kalugin secretly told his son about what he had seen and heard in the security forces. He explained to Kalugin that was what the NKVD was really all about; violence, torture, death. He did not want his son involved with the dirty work of the NKVD.

Isthuc est sapere non quod ante pedes modo est videre sed etiam illa quæ futura sunt prospicere. (True wisdom consists not in seeking that which is immediately before our eyes, but in the foresight of that which may happen.) Strangely enough, Kalugin explains that his father’s stories made the life of a secret policeman seem even more intriguing. Kalugin put it this way: “After all, wasn’t the KGB on the front line of the battle against capitalism and world imperialism? The thought of dying for one’s country and the Socialist ideal stirred my blood. His talk of screaming prisoners didn’t sound nice, but I asked myself, What else can you expect in a bitter struggle with our enemies?” Kalugin was held captive by the idea and ideals of Communism and too easily overcome by the seeming prestige, the power, and the draw of it all. With his romanticized visions of a career in the state security service, he was too excited to look both ways, too young and inexperienced to intuit where it all might lead. While Kalugin’s very caring father did his level best to dissuade his son from joining the security service but  was not able to fully comprehend what he was telling him, that the security service was not something ideal, not an organization of “superheroes,” but a real place with real people, and certain unusual men worked in the state security service.  As he moved through the years at KGB, Kalugin would slowly come to realize exactly what his father told him about the security service’s horrors. Four decades later, Kalugin, more mature, more experienced, more insightful, explained to readers much as his father tried to explain to him what he unexpectedly experienced in the intelligence service. What Kalugin expresses sometimes plainly, but most often subtly, throughout in First Directorate, is that from his first days of training to the day of his retirement, some KGB personnel, not all, did not appear to be well-vetted psychologically to perform their function given the behaviors they displayed. Surely, among the KGB’s internal security elements, there were acts of undue severity and abominable cruelty committed, bordering, if not fully manifesting, sadism. Such monstrous individuals appeared absolutely unhinged from the reality that they were serving the Soviet government, not themselves, and that their authority came from the government, not themselves. Much of that was already well-known.

In the more elite KGB formations, officers were engaged in more complex and challenging tasks, were further vetted and had received extensive training However, Kalugin also gets across that problems similar to those that impacted the internal security section also existed among some employees of the more elite intelligence sections. (Examine the text very closely; such statements are really there!) Surely, this was a very important matter for Kalugin as he repeatedly makes a point of describing the many different personalities that he encountered in the KGB. His depiction of them left no doubt that they had no business being in the organization. As readers will discover late in the book, such individuals got the ball rolling in the right direction to lower the curtain on Kalugin’s career. The indications and implications of the insights Kalugin shares concerning the KGB’s organizational well-being were that a nexus existed between the decaying performance of the KGB and the eventual collapse of the Soviet system. True, KGB recruits were strenuously vetted through training, yet some who did not openly manifest any deficiencies while under the watchful eyes of instructors apparently got through. More than a few violent, overzealous, under motivated, dishonorable, and vengeful individuals, suffering from a wide range of other pathologies, would move up through its ranks. As the success of each directorate, department, and service of the KGB was dependent on the quality and consistency of the performance of individuals in their respective positions, these bad hires given their troubling actions and the ugly environment they would create, managed to have a damaging impact upon the organization over time. (The uneven thinking and anomalous behavior Kalugin reports was exhibited by some clearly misplaced KGB officers, is actually a phenomenon common to many large intelligence services. It is very possible that deep-seated emotional difficulties or disorders are stimulated and amplified in the individual working in an intelligence services due to the unique responsibilities of the job, rather broad authority one possesses, unusual and morally questionable activities required, and potent stressors that strain. The thinking and behavior noted here was recently evinced in the record of activities undertaken by members of the US Intelligence Community who vigorously sought to destroy reputations and the lives of several innocent individuals inside and outside of the Trump administration. It was an apparent venomous, mentally unbalanced quest to force the collapse of Trump’s presidency. The exact reasons for their behavior will likely be difficult to identify until facts about them and their actions are fully known. Unfortunately, honorable men and women in the intelligence services run up against such damaged individuals in their organizations more often than they should.)

After graduating from high school in Leningrad, Kalugin passed four entrance exams with high marks and qualified for service in the MGB. In 1952, Kalugin began his studies at the Institute of Foreign Languages ​​of the MGB in Leningrad. There was only one other school similar to it for MGB officer training in the Soviet Union, the Higher School in Moscow. As mentioned earlier, in the immediate postwar period, Ministerstvo Vnuirennikh Del (Ministry for Internal Affairs) and Ministerstvh Gosudarstvennoe Bezopasnosti (Ministry for State Security) were combined to form the MVD-MGB. Kalugin graduated from the Institute of Foreign Languages with honors. Kalugin notes that at time of his graduation, his father was suffering as a result of a sharp decrease in KGB wages ordered by Soviet Premier Nikita Khrushchev in an effort to reign in the heavy-handed security service and he was subsisting with partition employment offered by friends. Yet, despite his own situation and his expressed misgivings about his son’s career choice, Kalugin’s father told him that he was proud of his achievement. By then the MVD-MGB had become the KGB.  The next step for Kalugin was more specialized training at the KGB Higher Intelligence School No. 101 or Advanced Spy School in Moscow. At the Advanced Spy School–later renamed the Andropov Red Banner Institute by the KGB and now called the Academy of Foreign Intelligence–Kalugin was trained as an Arabist, and in the course of his education, he studied the Middle East in detail. Kalugin was trained in tradecraft and prepared for technical work in the field. He learned how to set up radio transmitters, to use and detect bugging devices, to make microfilm and how to conceal microfilm and microdots in household items, how to cultivate intelligence assets, coding/decoding and cryptology, location orienting when dropped into unfamiliar locations, how to use a gun, how to tail people invisibly, how to detect when being tailed, how to evade all kinds of surveillance, and how to pass a package without being noticed even when being tailed. As his training came to a close, the leadership identified him for distribution to the most complex and prestigious First Foreign Intelligence Department, which, as aforementioned, dealt with the US and Canada. He was also informed that he would be joining a group of young people to take a graduate course in the US. As he relates the early days of his career, Kalugin appears to be transported to a place of happiness. The 20th century US philosopher, psychologist, and educational reformer, John Dewey said: “To find out what one is fitted to do, and to secure an opportunity to do it, is the key to happiness.”

Kalugin (center right) with Soviet cohorts at Columbia University. Kalugin initially came to the US in September 1958 to attend the Columbia University School of Journalism as one of 17 ostensible students from the Soviet Union to arrive under the Fulbright exchange program. In reality, half of them, including the 24-year-old Kalugin, were officers from Soviet intelligence services. Before going to the US, Alexander Feliksov, Head of the KGB’s North American Department instructed Kalugin: “Just lay the foundation for future work. But don’t overstep the line. Now that you’ve been picked to go to America, make it your business to learn more about the country. Buy yourself good maps. Improve your English. Find out about their way of life. Communicate with people and make as many friends as possible.”

Kalugin’s First Visit to the US

Kalugin initially came to the US in September 1958 to attend the Columbia University School of Journalism as one of 17 ostensible students from the Soviet Union to arrive under the Fulbright exchange program that year, and the first Soviet citizens to study in the US since the end of World War II. In reality, half of them, including the 24 year old Kalugin, were actually representing Soviet intelligence services. He was already a lieutenant in the KGB. Before he left, Alexander Feliisov, the Head of the KGB’s North American Department instructed Kalugin: “Just lay the foundation for future work. But don’t overstep the line. Now that you’ve been picked to go to America, make it your business to learn more about the country. Buy yourself good maps. Improve your English. Find out about their way of life. Communicate with people and make as many friends as possible.” In New York, Kalugin came in contact with a culture alien to him. He tried to better understand it by experiencing as much of it as possible. Kalugin was impressed by Manhattan; the power, the beauty, the bustle. Other worldly creations, skyscrapers, the Empire State Building. He travelled throughout the city, no restrictions were placed on his movement. He would ride the subway for hours. He saw 100 films and visited clubs in Greenwich Village. Soon enough, the haunts and pleasures of the elite class became his stomping ground, too! He attended Broadway musicals, the Metropolitan Opera, and visited Manhattan’s many museums. Extremely impressive to Kalugin were giant department stores well stocked with a diversity of items and supermarkets with their abundance of fresh food, unheard of in the Soviet Union, known for shortages of everything and long breadlines. It is here, early on in the book that the reader has the opportunity to enjoy the vividness of Kalugin’s descriptions. One can imagine him taking in the sights, the sounds, the smells, the touch, the impact of the city on the young Soviet citizen. His level of thrill and enjoyment, though expressed on paper, is all made so palpable

Kalugin recognized that FBI operatives sought to make clandestine contacts with him at Columbia University, but did not experience such problems outside the school. At Columbia, he wrote for the school newspaper. He was elected to the Student Council. Kalugin curried enough curiosity by his presence in New York that the New York Times interviewed the young Fulbright Scholar for a human interest article which was given plenty of page space and garnered a lot of attention. Kalugin would venture outside of New York to Philadelphia, Chicago, New Orleans, and Washington. He also travelled through Iowa and Wisconsin. People were mostly very friendly to him. He admitted his happiness with all that was good gave him joy, but it also created a spark of doubt about his own world back home. His prescience, however, served him well as he kept his eyes wide open. He never took any experience to its furthest extreme to consider how he would fit into such a world. He would take note that the US had visible flaws. He noticed problems of poverty in Bronx Bowery, and Harlem. Kalugin also discovered endemic racial prejudice and ethnic and social discrimination. He learned about clashes over civil rights as well as voting rights and labor laws. He kept in his head that Soviet Union had a longer way to go, given what he saw in the US, but its vitality would overcome the US which would very likely stumble over its own deficiencies.

As his experience at Columbia University evinced, counterintelligence officers of the FBI and CIA likely had eyes on Kalugin as soon as he arrived in New York. What was akin to present-day FBI SSG surveillance teams and their typically maladroit surveillance contractors, would have been assigned to watch his every move. The insistence of his superiors that he remain untangled with anything before him was presumably based on their judgments on that strong likelihood. The alert sounded over FBI counterintelligence efforts was intriguing as it indicated that somber and astute KGB officers would heavily factor in FBI surveillance and attempts at clandestine contacts in all activities in the US to include mundane tasks of daily life such commuting, shopping, exercising, visiting museums, attending the opera, going to the movies and engaging in other recreational activities. Aa Kalugin goes on to explain, the rather heavy hand of FBI counterintelligence would prove most apparent at social events, receptions, dinners, cocktail parties, and gatherings in private homes.

While Kalugin’s contact with Soviet émigré named Anatoly that he gave the pseudonym Cook, who was a scientist at Thiokol has regularly been chalked up to luck, there is the possibility that it was not so unusual. Kalugin was not the only one involved in the recruitment; Cook had a say in the matter. There was an awareness in the US, especially among educated US citizens, as Cook–who it turned out was a Stalinist–that the Soviet Union was an authoritarian, Communust regime. As such, its citizens did not move freely overseas. Those travelling abroad with the approval of the regime would very likely be tethered to it via the KGB. Contact with a Soviet citizen visiting New York and attending an event on technology at the once famous New York Coliseum, would almost guarantee creating a potential link to the KGB. Kalugin’s level of success with Cook albeit was frightfully high. To borrow from cricketing parlance, Cook was a lolly, an easy catch. However, Kalugin did not struggle afterward to duplicate that first success. Rather than focus on trying to capture lightning in a bottle twice, he focused on simply doing his job as best he could. Esse quam videri bonus malebat; ita quo minus petebat gloriam, eo magis illum sequebatur. (He chose to be good rather than to seem good; and so, the less he strove for fame, the closer it followed after him.)

His First Deployment: New York

During his first full operational deployment, Kalugin went back into the US, returning to New York. From June 1960 to March 1964, operated out of the Rezidentura at the Soviet UN Mission, using the cover of Radio Moscow UN correspondent. Kalugin’s true purpose was political intelligence work. Kalugin  would send communications with information necessary for the leadership in Moscow under the pseudonym Felix. He spent time cultivating US citizens and diplomats and citizens of other countries at the UN and in New York, who he foresaw could supply the KGB with classified or unclassified information about US foreign and domestic policy. Those in contact with Kalugin were imaginably unaware that he was a KGB officer, collecting useful information from them. Kalugin would also utilize his contacts for active measures. Indeed, active measures activities were not something apart from, but integral to the KGB officer’s day-to-day efforts in the field. Paralleling efforts to determine the political leanings and the degree of compatibility and favorability toward the Soviet viewpoint was spotting, developing, assessing, recruiting and even handling agents. While engaged in active measures, KGB officers would reflexively spout “the party line” on issues of the day with those they encountered while making their social rounds. The intention of injecting the Soviet line and disinformation into conversations in this way was to infect the opinion making process in the US. New York was fertile ground for that activity as it was the center of publishing, newsmedia, writers and “agents of influence,” that would set the US political agenda. He, indeed, had conversations with luminaries in US society from all fields. Not every KGB agent performed this work well. Kalugin did. Indeed, in First Directorate, Kalugin provides an ample idea of how that work transpired in real terms operationally, bringing him triumph and bringing grief to adversarial US counterintelligence officers. Active measures, however, included much more than exchanges of knowledge and sharing news stories. More intense activities, as Kalugin recounted, would include paying for, and helping write, ads in the New York Times signed by prominent and unsuspecting political activists protesting the US involvement in Vietnam. The KGB sent racist letters, supposedly from US citizens, to African diplomats at the UN and has operatives paint swastikas on synagogues and desecrate Jewish cemeteries. Kalugin would visit the site of the vandalism and write reports for Radio Moscow on how anti-Semitism was sweeping the US.

What is particularly interesting about active measures is the double-edged impact the work may have had ultimately. Essentially, all of the information relentlessly propagated by the KGB in the US and the rest of the world, though ostensibly the Soviet line, was false information or disinformation. It was designed not to authentically inform but to shape thinking in a pro-Soviet direction or forment dissatisfaction and social and political unrest in the target country. To that extent, most likely consciously but perhaps subconsciously in the minds of the KGB officer engaged in such work was that the Soviet line, the same one Soviet citizens were hearing at home, was full of lies. Certainly KGB officers were worldly wise enough to know that no strategy should have been necessary to present the truth, for it stands for itself. Activities such as active measures were really being used to defend against or counter the power of the truth. Perchance it was never calculated or officially considered what type of destabilizing impact requiring KGB officers to engage in active measures might have on morale, esprit de corps, honor, loyalty. The impact of KGB officers’ sensibilities may have also played a role in decisions by some to defect. While the ultimate ends of active measure may have justified the means in Moscow Center, the collateral effects of the activity on its personnel may not have. (This causes one to consider what impact former senior and mid-level US intelligence and law enforcement officials who, every ten seconds wrongfully and repeatedly argued in the news media and elsewhere in public that Trump and members of his administration, in truth all guiltless, had colluded with the Russian Federation Government, but meanwhile testified under oath in US Congressional Committees that there was no evidence that they had actually seen that indicated such. In this instance, one could genuinely ruminate on whether one of the main elements of spying, promoting fraud, influenced their perjurious behavior. Ultimately, the conscience of each may by their undoing. In Act V, scene iii of William Shakespeare’s play The Life and Death of Richard the Third, King Richard, on Bosworth Field, confesses: “My conscience hath a thousand several tongues, / And every tongue brings in a several tale, / And every tale condemns me for a villain. / Perjury, perjury, in the high’st degree / Murder, stem murder, in the direst degree; / All several sins, all used in each degree, / Throng to the bar, crying all. Guilty! guilty!”)

In the ordinary sense Kalugin was not engaged in laborious toil as an foreign intelligence officer. Yet, surely, the work was strenuous, high-pressure, and anxiety-filled. The risks were never trivial. For his daily work, within the limitations of his cover assignment, Kalugin was on the street, working agents and performing technical intelligence tasks. From what can be ascertained from Kalugin’s description of his work in the US played out, generally, he, just as other officers, would handle four or five agents or targets under development. He was not expected to spread his range of intelligence activities further, although he was still encouraged to develop a large circle of casual contacts among whom he could conduct active measures and from whom a relatively small number of serious targets might be selected at some point. As Kalugin describes his work, he undoubtedly demonstrated his flexibility and adaptability, ensuring the collection of valuable information from sources reached his managers. There was a particular case in which Kalugin made the unconventional choice. He came into contact with a 25 year old Columbia University graduate student who held extreme left-wing political views. Thinking he could be motivated to work for Soviet Union to promote Socialist state. However, he could not deliver anything really of value. His parents, both of whom were Communist  told him to stop working with Kalugin because it was too dangerous. Kalugin was insistent but to no avail. Despite that breakdown, the young student’s father contacted Kalugin and asked him to leave his son alone and offered to help him instead. Kalugin, convinced he was genuine, told his manager at the UN Mission. When his manager contacted the Center, in a reply Kalugin was admonished not to deviate from procedure again but to continue with the recruitment. Further, the cable ended with the instruction: “Allowing for the initiative and courage shown by Comrade Felix–as aforementioned Kalugin’s codename, I suggest he be promoted to the rank of senior case officer.” The father turned out to be a good KGB asset, and was used on numerous occasions to run messages and deliver materials to agents outside the 25 mile city radius to which Soviet Mission staff were restricted. By Kalugin’s own admission, the Center displayed a considerable degree of patience over that move. It did not want Kalugin to be inventive. It wanted officers to strictly adhere to procedures. Yet, the Center also very much wanted good results. Ostensibly, while deviations from procedures were greatly frowned upon, apparently if no damage was done to a case and the efforts of the officer and his station were not detected or harmed in any other way, and success was achieved, nothing punitive beyond a bit of admonishment resulted. Indeed, KGB case officers were held strictly to account for the results of their actions. Yet, they were not expected to report on day-to-day developments to the Center. KGB officers were expected to be on the beat and usually did not spend much time at the desk writing reports, reading guidance from headquarters or maintaining his files. When he had a problem he took it up with his boss, but was supposed to know the difference between what he really needs consultation about and what he ought to be able to handle on his own. There was virtually no lateral distribution of communications and an extreme emphasis on compartmentation. His boss in turn has the responsibility of not only guiding the case officers that work for him, but of ensuring that vital information pertinent to the work of one case officer but acquired through another is made available. The custom that each officer prepares his own reports and kept them brief, made it possible for their reports to actually be read all the way up the chain.

Kalugin (center) on the beat in New York. During his first full operational deployment, from June 1960 to March 1964, Kalugin operated out of the Soviet UN Mission, using the cover of a Radio Moscow UN correspondent. Kalugin would send communications with information necessary for the leadership in Moscow under the pseudonym Felix. He spent time cultivating US citizens and diplomats and citizens of other countries at the UN and in New York, who he foresaw could supply the KGB with classified or unclassified information about US foreign and domestic policy. Within the limitations of his cover assignment, Kalugin was on the street, working agents and performing other intelligence tasks. Appreciation of Kalugin’s work by headquarters resulted in further promotions. From 1965 to 1970, he would be assigned to Washington as deputy rezident with the cover of deputy press officer, and then acting chief of the Rezidentura at the Soviet Embassy.

Recruiting KGB Spies

When tested by unexpected challenges in the field, Kalugin would assess the situation, then begin to act based on his training. A big lesson gleaned from Kalugin’s anecdotes is to “Trust your training.” Still, the most devastating weapon stored in Kalugin’s figurative armoire as a KGB intelligence officer was his mind. Kalugin possessed an intellect that stood out a mile (and still does now). There were never too many moving parts in a situation. What Kalugin could not see or confirm with his own eyes, he was clearly able to conceptualize better than most. Even more, Kalugin’s intellect was continuously animated concerning his work. To be successful at running agents in the field, an intelligence officer must know a lot about humanity. One must know a lot about human relationships. There are said to be certain secrets and knowledge of human existence, human circumstance. Whether Kalugin managed to acquire that hidden bit of information is unknown to greatcharlie. However, little doubt is left that Kalugin very much wanted to better understand, to put it sort of whimsically, “what made people tick.” Clearly, he successfully acquired that knowledge and experience as evidenced by all of his interactions recounted in First Directorate. Concerning prospective recruits, Kalugin would parse out all that is made available to him about the subject at hand. The minute Kalugin observes something, he knows what can happen. Kalugin would know the answer; he knows the usual result. Kalugin could feel a good recruitment on the tips of his fingers. As aforementioned, the Center left no doubt in its instructions and communiques to Kalugin that it was not looking for immediate success, dicey efforts. It repeated that guidance often. It may appear that the Center was figuratively hanging on Kalugin’s gun arm, but it certainly was not. The Center was adverse to chasing miracles. The Soviet intelligence service possessed a great deal of patience and determination to wait for years before the source, led along the way, would join the Department of State, the CIA, or some other entity, and attain a position useful to it. According to Kalugin some US recruits were approached even before reaching college. It was the understanding of KGB that US intelligence services were unable to wait that long. There were some US citizens apparently recruited for a long-term plan. For instance, in the event of war between the US and the Soviet Union, they would be directed to sabotage Washington’s power lines or poison drinking water sources.

Earlier here, greatcharlie mentions how Kalugin takes the reader to school concerning KGB spying, particularly running agents in the field. This was particularly true of his in-depth discussion of the recruiting process. One also learns from Kalugin in First Directorate that each recruitment effort is a little different.  There are always different triggering motives leading to cooperation with an intelligence service, especially, one from another country. The psychological contact of the intelligence officer with the prospective recruit is key. In recruiting agents, speech is everything. Word choices must build confidence, create trust, console, assure, inspire, and comfort. To create compliant agents, the right word choice must be made every time. To that extent, Kalugin could not conceal his ebullience, recalling occasions when all he collected about a prospective recruit would coalesce and he formulated, once again taking from cricketing parlance, a jaffa, a particularly good pitch. Whether a recruiting target signs something at the time of being recruited (using the KGB terminology) about cooperation or not, really depends on the preceding circumstances. A written agreement was required when a recruitment was based on some compromising materials. If there was a later refusal by an operative to cooperate, the agreement could be used for blackmail. Yet, despite how well Kalugin laid out his discussion of recruitment, the process was far from a simple matter or easy to do. When the Soviet Union looked like the wave of the future, its best spies came to its  intelligence services out of ideological convictions. In the 1930s, 1940s, and 1950s, their recruitment service among such individuals was counted upon. Kalugin posited that after 1956 when Khrushchev exposed the cruelty of the Stalin regime and showed that “ ‘Soviet achievements’ had been built on the bones of our own people,” true believers in the Communist Movement began to dry up and disappear. Kalugin explained further that after Czechoslovakia was invaded in 1968, “only the most fervor ideologue could hold any illusions that the Soviet Union was striving to build a Socialist utopia.”

Both directly and delicately, Kalugin indicated that what drove recruits to spy boiled down to four primary motivations: money; ideology; conspiracy; and excitement. Concerning those recruits interested in money, spying was little more than service offered through a business transaction. There were many such cases. Perhaps the most infamous was that of the notorious US Navy traitor, John Walker, who was able to spy for the Soviet Union for 19 years. His recruitment and handling was Kalugin’s greatest achievement at the Soviet Embassy in Washington. Walker was a walk-in, came to the Soviet Embassy with a treasure-trove of secrets. He was in it for the money. The entrepreneur spy included his son, brother, and best friend in his spy ring. He tried to bring in his daughter, but she refused. Walker needed no physical contact with his Soviet handlers, pep talks, and no hand holding. He in fact operated 10 years without meeting one. Nearly everything done after the initial set of meetings was done with dead drops. His wife finally reported his activities to authorities. There were others such as a CIA officer in Washington who claimed to have been recently fired. He made it clear from the start that he was looking for money. He would eventually pass a considerable amount of material. However, the most valuable document was a long paper entitled “Detection and Approaches to Psychologically Vulnerable Subjects of the Enemy,” which cited US efforts to recruit Soviets worldwide and painted a portrait of Soviet citizens most likely to become spies.

Regarding ideology, Kalugin indicated that when a recruits motivations were ideological, they were typically pro-Soviet, adherents of Socialism and the Communist Movement, fellow travellers. At other times, they were simply left-leaning in that era of protest. The Soviets could recruit such agents in the US and provide them no remuneration. Some even refused it. An example was that of left-wing publisher, M.S. Armoni, editor of a journal Minority of One, who would do the bidding of the KGB by publishing articles allegedly written by Kalugin. They were actually written by the KGB propaganda department in Moscow. The KGB supplied money for Armoni to run several ads in the New York Times criticizing the US involvement in  Vietnam and signed by leading liberals at the time. When Armoni had financial difficulties, Kalugin provided him with nearly $10,000 in funds for being “So faithful in presenting the Soviet view of world affairs.” The money broken down into smaller sums was falsely attributed by Armoni to anonymous US donors. Kalugin also gives the example of a diplomat at a Western European embassy who furnished the KGB with diplomatic cables, top secret reports, recording with the US State Department. The same diplomat was approached without immediate result when posted to Bonn, West Germany. Kalugin met with him in Washington under orders from the Center. He convinced the diplomat to provide classified materials for very little money. His motivation was ideological because he held leftist political leanings.

Relating to conspiracy, such recruits were most often vengeful toward the government, scientific, or technological organization that employed them. An extraordinary case was that of an FBI special agent with considerable access. He first approached the KGB station chief one day and said he wanted to help the Soviets. He immediately supplied the station chief with some information about FBI activity against several Soviet citizens in New York City. The KGB was suspicious, but the FBI man proved reliable. Through personal meetings and by mail, the FBI recruit sent other portions of information about the FBI’s counterintelligence work against the KGB. the mysterious FBI recruit, as Kalugin refers to him, never asked for money.

As to excitement, there were the sensation-seekers, driven by the excitement of spying, self-gratification, or amusement. Kalugin recalls a female diplomat from what Kalugin characterized as “a major European country,” who, after being posted in Moscow for two years and becoming involved with a KGB officer, made contact with Kalugin in Washington. She would supply information to him, as Kalugin suggested, to support the work of her romantic interest still in Moscow. Kalugin would meet with her frequently in restaurants and receptions. When asked to provide cables from  her Foreign Ministry, she refused but recited what was in those she read when they met. Kalugin would also gift her with jewelry, scarves, and other presents. Kalugin deduced that the woman likely knew he was a KGB officer, but enjoyed the sensation of meeting in cozy restaurants and being treated well by him. What the woman provided was valuable political intelligence. There was also the curious case of I.F. Stone, a well-known left-leaning Washington journalist. The Center had informed Kalugin that Stone had been a useful contact who broke off after the invasion of Hungary in 1956. It wanted Kalugin to reestablish the connection. Stone would meet with Kalugin a half-dozen times a year for lunch. During those meetings, he would share insightful views on the US political scene. Kalugin referred to Stone merely as a former “fellow-traveller. However, having meetings with someone he likely suspected was a KGB officer was undoubtedly intriguing to Stone. Stone abruptly ended their acquaintance, however, after the Soviet invasion of Czechoslovakia in 1968.

Big Promotions

Appreciation of Kalugin’s work by the Center resulted in further promotions. From 1965 to 1970, he would be assigned as deputy rezident at the Soviet Embassy in Washington, with the cover of deputy press officer, and then acting chief of the Rezidentura at the embassy. He was invited to serve in Washington initially by an eventual mentor of a sort, Boris Solomatin, who was taking over as rezident there. As defined in The Dictionary of Espionage, the KGB section of a Soviet Embassy was the Rezidentura. The ranking officer of the embassy was the rezident, who operated under diplomatic cover, and this had diplomatic immunity. The rezident’s equivalent in the US Embassy was the CIA chief of station. As the rezident would hold senior status in the KGB, his identity in the foreign intelligence service was known to Western intelligence services and law enforcement. To that extent, the rezident engaged in almost no espionage activities while deployed abroad. What is curiously noted in The Dictionary of Espionage is that some residents did roam the cocktail circuit where posted “for hard drinking seemed to be a prevalent trait.”

Interestingly, KGB officers were promoted through the service on bicameral tracks. Being essentially a military organization, an officer was promoted from junior lieutenant up to lieutenant, senior lieutenant, captain, major, lieutenant colonel, colonel, and then, if fortunate enough, through the general ranks, major general, lieutenant general, colonel general, and general of the army. The KGB officer’s formal rank was largely based on his time in service up to lieutenant colonel. Concurrently,  the officer receives the classification as a junior case officer, case officer, or senior case officer, and then progresses further as a deputy rezident or rezident. Those operational designations were based on the officer’s experience and performance as an operator in an assigned field. The chain of command was determined by operational positions rather than rank. Indeed, a major could be reassigned from one part of the KGB to the First Chief Directorate and be designated as a junior case officer for lack of experience and be subordinate to a senior lieutenant who was a case officer or senior case officer. Pay was determined by where the officer was ranked in both hierarchies. Kalugin’s title at the Soviet Embassy was acting rezident, and not fully the official rezident. Kalugin explains that the cause for this was sensational editorial columns aimed at exposing Kalugin as a KGB officer. It was an act completely estranged from tradition among journalists in Washington. First, there was a Washington Post article referring to a Soviet intelligence officer’s work with a Greek agent. The name of the officer published was Victor Kraknikovich, the alias Kalugin used for the Greek case. The Center was informed. Kalugin suspected the story was fed to the Washington Post by the FBI and the beginning of a campaign. Then, Jack Anderson published an article naming Kalugin as a Soviet agent. The article’s opening paragraph stated: “His name is Oleg Kalugin, second secretary at the Soviet embassy. For some time, he has been trying to place a female acquaintance of his as his agent in the State Department. He also instructed an aide to cultivate a girl who works at the FBI. Neither attempt succeeded. Both girls have been leading him under the direction of the FBI.” Anderson followed up on the Kalugin story in his “Washington Merry-Go-Round” column, headlined “Soviet Spy Allowed To Remain in U.S.”, “His [Kalugin] undercover activities in this country are known to the FBI.” Anderson included: “But only the State Department knows the reason he is still here. Other spies caught in the act have been declared persona non grata and have been given 48 hours to leave the country.” On first impression, the Center took it all very calmly, telling Kalugin “Curb your activities just a bit but do not worry.” Nevertheless, the Center was concerned that Kalugin would be deported, a headache the KGB did not need. Kalugin was not deported. An intriguing reality was that KGB operations in the US were not solely dependent on the work of the rezident at the Embassy in Washington. As noted in the aforementioned The Dictionary of Espionage, along with the official rezident, an illegal rezident was deployed who lived abroad without any official cover, usually with an assumed identity, responsible for controlling subordinate illegal agents who worked in his area. The illegal rezident would have no contact with the Soviet Embassy or any of its personnel, and he maintained his communications with the Center. In terms of authority, the illegal rezident had the rank of the official KGB rezident. If the illegal rezident was arrested, the officer could not plead diplomatic immunity and would go to prison.

On the Threat of Defections

Once operating in foreign territory, a considerable concern regarding intelligence officers and their agents was the threat of betrayal. Concerns were almost always raised among Soviet citizens when anyone with whom they may have just met or were in contact for other reasons, suddenly showed an eccentric interest in them. One had to be resolute regarding personal and collective loyalty. There had to be a defined sense of what you owed to your country, what you owed to your own sense of ethics and morality. For some KGB officers, deployed overseas, even while facing-off with their Western counterparts, it often became the same old trudge day in, day out. Some of Kalugin’s fellow KGB foreign intelligence officers would struggle mightily to develop informants, find bona fide targets with access to considerable information to recruit, and get anything started from which they could develop concrete proposals for a foreseeable recruitment at their postings. Others figuratively shuffled along, hoping to go unnoticed and evade the behests of the Center along much as the theatrical comic relief of an aged butler seeking to avoid the master and mistress of the house hoping to keep his exertions to a minimum. Causality for such difficulties often resided in those KGB officers, themselves. Personal and professional inadequacies, having gone undetected during the vetting process and training, often found their way to the surface, and would provide an open door to inappropriate indulgences and improprieties. Embezzlement was a problem. There were those who would keep hundreds of dollars of payments intended for KGB operatives for themselves. A number would outrightly make personal use of KGB funds. Some had already displayed the most deplorable carnal behavior while still in the Soviet Union. Then deployed to Western countries, they would indulge in all that had to be offered. They would set aside their defensive training. In the end, a number of them would be caught flat footed in rather fatuous, fairly obvious honey traps set by US counterintelligence. They most likely were obliged to play the double-game against their bosses at Moscow Center. Kalugin explains that there was a particularly nasty problem in Canada in which a half dozen KGB personnel were left open to blackmail by the Royal Canadian Mounted Police and all were recalled and disciplined. (An individual is tracked by an intelligence or counterintelligence organization with the goal uncovering evidence for a case or investigation. To endlessly surveil an individual, or subject as one would be dubbed, using mountains of taxpayer dollars, with no real goal, is not just inept, it is malfeasance. The subject, who may not be guilty of anything, is essentially being harassed, and very likely some dishonorable individuals in the intelligence or counterintelligence organization violating their oath to the country and highly likely, in nasty surreptitious ways, attempting to build an extra pension for themselves. It happens in Intelligence services more than one might imagine.)

FBI counterintelligence, Kalugin’s main opponent in the US, engaged in near endless  attempts to intercept him and perhaps neutralize and recruit him, came in the form of clandestine contacts. Those attempts confirmed that he had actually been under surveillance as the FBI would only have undertaken such an effort if counterintelligence managers believed that special agents had collected enough about him and his activities that they were convinced he was a Soviet intelligence officer, that they understood how Kalugin thought, and that he would respond favorably to an effort to make clandestine contact with him. The method used by FBI counterintelligence to reach Kalugin was its bog-standard employment of women as honey traps. As defined in The Dictionary of Espionage, a honey trap is a method of sexual entrapment for intelligence purposes, usually to put a target [such as Kalugin] into a compromising position so that he or she can be blackmailed. Perhaps it would be enough to say Kalugin displayed restraint and elegance in the face of advances by the female FBI counterintelligence operatives. Indeed, as he describes his response, he displayed a sensibility akin to what the French call “bof” (whatever) to it all. One might simply chalk that up to Kalugin’s self-discipline, his Apollonian nature. In the field, Kalugin was always dedicated to his country, the Communist Movement, and his mission. He was laser focused on his responsibilities as a KGB officer to spot potential recruits, collect information, even passively, and report observations, engage in active measures, and not fall prey to the women used against him. Beyond consideration of Kalugin’s professional response to what to him were far less than enticing honey traps, consideration should be given to his response simply as an individual. There exists a line of thinking which notes unless one has already thought, deliberated, pondered, or meditated on certain behavior, one will be hardened to it. One would not be going out on a slender thread to presume Kalugin was neither ignorant of nor surprised by attempts at such manipulations, carnal behavior among adults. Perchance, he simply never considered getting involved with such nonsense  or pondered having anything to do with such women while on the beat.

Perhaps proof and precedence of previous successes with less capable, less adroit, or simply inept KGB officers, along with some likely unsupported, doctrinaire, Cold War era preconceptions concerning the Russian male libido, convinced FBI counterintelligence of the correctness and efficaciousness of that method of clandestine contact with Kalugin. The focus was on the physical, the carnal, not the intellectual. The underdeveloped mind can rarely get beyond physical facts. Even at the most basic level of decisionmaking on the matter, some recognition that a mental attraction, some cerebral connection between Kalugin and a female operative foisted upon him might be required. That was apparently ignored or disregarded by the FBI, presumably counting upon some id-explosion that would overwhelm him. It was a considerable oversight. Based on how he described the women involved, such a connection under any circumstance, would have been near impossible. In the intelligence game, nothing about making contact with an opponent in the field can be considered too trivial to disregard. under the leadership of FBI director J. Edgar Hoover, Special Agents in counterintelligence were genuinely tough. Kalugin admits to that in the book. Yet, they could hardly be judged as being socially conscious by current standards. Their record of responses on a variety of other issues, the Civil Rights Movement and Anti-War Movement for instance, indicates they were in fact quite the opposite. The use of honey traps and similar artifices by FBI Special agents, surveillance specialists or contractors, continues today.

Although as he recounts them, Kalugin indicates that he was cautiously amused by the FBI honey traps, but he also seemed to take a professional interest in why in US society in which there were far more better things to do, would a woman even entertain the idea of serving as a seductress for the FBI. Recognizing that the use of the method was a gauge, a manifestation of the thinking among serious US government intelligence and law enforcement officers, Kalugin very likely began at that time to contemplate how Soviet foreign intelligence in the US could effectively turn the ploy against them and other targets in the US. That is exactly what he did. Kalugin used his personal attributes and charm and those of other handsome males and females to further the KGB’s mission by loosening those attractive qualities as weapons against unsuspecting Western officials and especially secretaries working in key offices in the US foreign and national security policy apparatus, when he believed something considerable could be gained by doing so. The Ancient Greek comic and playwright, Aristophanes in The Birds (414 B.C.) wrote: “Men of sense often learn from their enemies. Prudence is the best safeguard. This principle cannot be learned from a friend, but an enemy exorts it immediately. It is from their foes, not their friends, that cities learn the lesson of building high walls and ships of war. And this lesson saves their children, their homes, and their properties.”

Kalugin (right) standing with Kim Philby (left). In reaction to increasing defections by KGB officers, Yuri Andropov, the Chairman of the KGB, ordered KGB foreign counterintelligence to develop a new program that would make defection to the Soviet Union attractive. He ordered that life for existing defectors made to be envied and to make certain to let the world know about it. Kalugin was directed to handle the matter. A defector that Kalugin devoted time to was Kim Philby, the United Kingdom MI6 traitor. Philby’s life in the Soviet Union was awful and Kalugin found him in a terrible state. He had faced considerable mistreatment, particularly psychological torture. Kalugin set forth on a genuine course to rehabilitate Philby. Yet, reversing the damage to those mistreated by intelligence and counterintelligence services is extraordinarily difficult. If anything, Kalugin salvaged the best of what was left of the Soviet spy. In the photo above, relative to Kalugin, Philby appears as if he had the Hell posted out of him.

At KGB Foreign Counterintelligence

In 1971, having returned from the US, Kalugin became deputy chief of the Second Service of First Chief Directorate, which meant a two-step increase in the hierarchy of the central intelligence apparatus. However, the counterintelligence service proved to be broken, unprepared, and understaffed. The counterintelligence function was pivotal to KGB operations and its mission, but it was not given the status and attention it truly required. Even housing made available for its officers was undesirable. Kalugin had a negative immediate impression of the director of the Second Service of First Chief Directorate, Vitaly Boyarov. However, his concerns were resolved over time. Concerning the other deputies Kalugin had nothing greater good to say. One was a chain smoking, profane man who constantly berated his subordinates. Kalugin described another deputy as a fussy, indecisive man who had “no business being in the KGB let alone in relatively high position.” Kalugin depicted the third as an “utter nonentity.” All three were at least a decade older than Kalugin. The decline for KGB foreign counterintelligence operationally was also apparent. In the 1950s and 1960s, foreign counterintelligence, according to Kalugin, had managed to penetrate deeply into the French, United Kingdom, and Italian intelligence services. Concerning the US, the KGB had Walker, their superspy. However, by the 1970s, it was clear to many that the Soviet Union really was not the model society of the future, both politically and socially, and the Soviet system could do nothing to reverse that impression. As disillusionment with the Soviet Union set in, the number of KGB defectors also began to skyrocket, further damaging its operations.

When Kalugin first started working in foreign counterintelligence in 1970, the KGB was only experiencing a trickle of defections from the ranks. However, the rate steadily increased. However, the defection of Oleg Lyalin of Department V, tasked with preparing contingency plans for sabotage and assassination in time of war, defected after working for the United Kingdom’s intelligence services for six months. The story of his activities as presented by Kalugin would surely be astonishing to any readers. His revelations resulted in the expulsion of 105 Soviets from the country, personal non grata. Visas for known KGB officers were denied. In reaction to Lyalin’s defection and the many others, Yuri Andropov, the Chairman of the KGB, ordered Kalugin’s director at counterintelligence, Boyarov, to develop a new program that would make defection to the Soviet Union attractive. He suggested using large amounts of money, fancy apartments and country homes, and complete freedom of movement in the Soviet Union and the Eastern Bloc. He also ordered that life for existing defectors made to be envied and to make certain to let the world know about it. Boyarov put Kalugin on the case. That led to perhaps one of the most interesting aspects of that period of Kalugin’s career, his contact with the infamous double agent Kim Philby, formerly of the United Kingdom’s MI6, Secret Intelligence Service. While Kalugin met with a number of the defectors, to include the infamous George Blake, also from the United Kingdom’s Secret Intelligence Service, and Donald Maclean, but Philby was the most interesting case. Suffice it to say, greatcharlie sense that it is going out on a slender thread in discussing the matter of Philby, but it is critical to the process of understanding and characterising Kalugin. Philby is a delicate and painful subject in some Western intelligence services even today. Harold Adrian Russell “Kim” Philby, was a member of “The Magnificent Five.” Others included two diplomats, Guy Burgess and the aforementioned Donald Maclean, and the former officer of MI5, the  domestic focused Security Service, and leading art historian, Anthony Blunt. The identity of the fifth member was never confirmed. The intelligence officer, John Cairncross, was suspected. All but the fifth member defected to the Soviet Union. Kalugin had heard rumors of Philby’s life in Moscow–”drinking, womanizing, hours of depression, and squalid existence.” Most of it proved to be true.

For Philby, defection to the Soviet Union did not pan out as he had hoped. It was nothing near the paradise he likely envisioned. He had a relatively decent apartment, but had few possessions in it worth having. The big problem he faced though was not so much being deprived of material things, but rather his treatment. Philby was subjected to repeated house arrests over regular suspicions of KGB as to his “activities.” His every movement, even in his home, was considered suspect. For instance, when he was heard writing over hidden microphones, it was determined that he was composing reports to pass to Western agents. The overall surveillance was ham-handed, guaranteed to harass and cause discomfort. The only element that was missing from his treatment was the rough stuff, physical torture, though there was plenty of psychological torture. The deep grief felt by Philby over the death of his image of a Soviet wonderland, coupled with his mishandling was likely made somewhat less painful by his daily practice of soaking himself in alcohol. For those in the KGB who were acting against him, that likely provided a sense of accomplishment. They were clearly the types. Philby’s behavior was rumored to have been questionable–”drinking, womanizing, hours of depression, and squalid existence,” but little was placed in official reports about his treatment. For this reason, Kalugin did expect to find what he did when he contacted him. As things were, there was no chance of showcasing Philby’s situation as reflective of that of defectors. If the truth of Philby’s actual treatment had gotten out to the rest of the world, it would have choked the Soviet voice on defections. A singer with fine pitch would notice something wrong with a note that an ordinary or amateur might not. However, everything Kalugin observed was plain as day, actually absolutely over the top. The inhumanity, illogica, and incompetence of Philby’s handling screamed out. As Kalugin described what those KGB officers involved in what had been done to Philby were further examples of how deep seated psychological issues of some officers would drive them to engage in odious acts. Kalugin set forth on a course of attempting to rehabilitate Philby. There was nothing superficial about his efforts. He essentially debriefed him again under calm, informal conditions. He began to visit him somewhat regularly. He then brought other friendly KGB officers to talk to him, ask his opinion on professional matters, tradecraft, trying to give him a sense of being useful, capable, and needed. Kalugin used the authority granted to him by Boyarov to involve Philby in KGB training. He brought him to the KGB Higher School to lecture young officers who were set to be deployed to Western countries. Philby would help with active measures by inserting sins poster passages in US State Department and CIA documents. Kalugin would genuinely ask Philby for input into programs being formulated for defectors and prospective recruits. For all in which Philby was becoming involved, Philby was amenable and did not want payment. Kalugin did what he could to remunerate him by boosting his ongoing payments. He had repairs made to his apartment and replaced the furniture. Kalugin would also arrange for Philby to travel outside of the Soviet Union to Socialist Countries in the Eastern Bloc and beyond to Cuba and Mongolia. In doing all of this, Kalugin followed his orders, but his noble and humane effort did credit to both his head and his heart.

The damage intelligence and counterintelligence services can do to an individual’s psyche is well understood to be grave and considerable. To paraphrase a recent remark by US Senator Charles Schumer of New York on the tactics, techniques, procedures, and methods of the US Intelligence Community, they can come at you six ways from Sunday. The soul and the spirit of the target of such efforts is typically seared. Surely, some having suffered similar harsh treatment from their own side as in Philby’s case, have been able to have renewal of mind. Yet, rehabilitating those mistreated by intelligence and counterintelligence services, reversing the damage, is extraordinarily difficult, if not impossible. That is a reality that is rarely understood or dismissed. Perhaps there is such a strong desire to believe otherwise by those who might engage in such efforts, that the mere notion, itself, that it can be done, becomes true. As for the individual, supposedly being rehabilitated, it is likely that when placed regularly under inhumane treatment, physical or psychological, a valiant effort is made to hold on to all of the many aspects of themselves. However, self-discernment would more likely cause them to face the reality that much has been lost after enduring such terrible experiences. Kalugin, at the time, appears unable to fully fathom that although he was interacting with someone who looked, sounded, and moved as original Philby, the zealous member of the Komintern, the Soviet spy, the proud defector, but that man was gone, no longer intact. The psychological capsule that Philby likely created to hold on to the remainder of himself, to protect himself, to survive, would never have been so easy to break open in an effort to find him. Philby was also very likely suffering from a form of severe, debilitating depression. The original Philby may have had far more to offer. If anything, what Kalugin did was salvage the best of what was left. The trust that Kalugin sought to create was not really possible either. Doubtlessly, Philby noticed Kalugin, for whatever reason, was authentically trying to be congenial and helpful. Understanding that, he may likely have displayed an outward modification of attitude and behavior perhaps even to satisfy Kalugin. To that extent, he understood that Kalugin was the source of better things than before, and with the hope this does not sound indelicate, he responded to Kalugin, though not obsequiously, but much as stolid hound that recognizes its owner as the source of its nourishment and shelter. Perchance, there was much more in all of this. In an uncanny way, Philby’s situation foretold a similar future for Kalugin. Indeed, perhaps Kalugin had an extra sense, a presentiment that he might find himself in a similar boat in another country. Both men experienced somewhat similar types of betrayal by the same monstrous Soviet system and the same organization, the KGB, in which that they placed so much faith and for which were ready to surrender their lives. Luckily for Kalugin, when his day of reckoning came, he ran into individuals in the US possessing sensibilities much as his own, and not the sort that Philby dealt with upon arrival in the Soviet Union.

In March 1973 Kalugin became head of the Directorate KT, KGB Foreign Counterintelligence. In the process he became the youngest leader at that level in the KGB. In 1974, the 40-year-old Kalugin received the rank of major general, making him the youngest general in the KGB. A KGB officer was promoted from junior lieutenant up to lieutenant, senior lieutenant, captain, major, lieutenant colonel, colonel, and then, if for nature enough, through the general ranks, major general, lieutenant general, colonel general, and general of the army. The KGB officer’s formal rank was largely based on his time in service up to lieutenant colonel. Concurrently, the officer receives the operational designation as a junior case officer, case officer, or senior case officer, and then progresses further as a deputy rezident or rezident. Those designations were based on the officer’s experience and performance as an operator in an assigned field. The chain of command was determined by operational classification rather than rank.

In March 1973 he became head of the Directorate KT, foreign counterintelligence. In the process he became the youngest leader at that level in the KGB. In 1974, the 40-year-old Kalugin received the rank of major general, making him the youngest general in the KGB. Such career leaps, Kalugin believes, were primarily due to the personal patronage of Andropov. Kalugin refers to Andropov his “guardian angel,” and writes that “the relations of father and son” developed between them. Made aware of Kalugin’s success, as all of the most senior managers of KGB doubtlessly had, Andropov surely recognized that the KGB had a gem in their midst, a “bright red” carbuncle. Andropov was a rather intriguing player in the history of Soviet Intelligence. As it was detailed in Robert Pringle’s Historical Dictionary of Russian and Soviet Intelligence, 2nd ed. (Rowman and Littlefield, 2015), from the Historical Dictionaries of Intelligence and Counterintelligence series, much as Kalugin’s career at KGB, Andropov’s career moved up rapidly in Soviet political sphere. His advancement began after being appointed Soviet ambassador to Hungary in the Ministry of Foreign Affairs in 1954. While at that post, the November 1956 Hungarian Uprising ignited. A segment of the society demanded independence from the socialist state. The upright morphed into an armed conflict. Andropov called the uprising “counter-revolutionary, an anti-social riot” and informed the Kremlin that he supported the idea of sending Soviet troops to aid the Hungarian socialist government to quell the protesters. Andropov directly coordinated the activities of pro-Soviet forces in Hungary, which managed, with the support of Soviet forces, to keep all of Hungary socialist. More than 2,500 people died during the conflict.The Hungarian Uprising shaped Andropov’s thinking, after leaving his post in 1957, he reportedly kept on speaking about it. Soviet diplomat Oleg Troyanovsky remembered: “Andropov of 1956 in Hungary. He often said: ‘You can’t imagine what it is – hundreds of thousands of people flooding the streets, completely out of control’.” Troyanovsky believed that Andropov feared to see such a scene in the USSR – and did all he could to prevent it. Still, his advisors recall that when he led the department on relations with the socialist parties within the Communist Party’s Central Committee from 1957-1967, he was a “liberal leader.” According to renowned political scientist, Georgy Arbatov, Andropov would supposedly say: “In this room, we all can speak our minds, absolutely openly. But the second you leave it–play by the rules.” During Leonid Brezhnev’s tenure as Soviet leader from 1964 to 1982, Andropov, efficient and professional, became one of the most important figures for the regime. Named Chairman of the KGB in 1967, Andropov took on several urgent and important issues, with a predictable hardline approach, to include:  international crises in the Middle East; Czechoslovakia; Afghanistan; regional conflicts in the Soviet Union; and, suppressing Soviet dissident movements, putting dozens in asylums and deporting hundreds of others. On November 12, 1982, Andropov would become General Secretary of the Communist Party of the Soviet Union and on June 16, 1982, he became Chairman of the Presidium of the Supreme Soviet. However, he died on February 9, 1984, serving just under fifteen months in power.

Kalugin reasoned that Andropov trusted him. Still, knowing Andropov’s history, Kalugin knew exactly who he was dealing with. Developed from that understanding appears to have been an invaluable intuition about his own organizations’ moves on issues and regarding personnel. Anecdotes included indicate that he was able to intuit the decisions of managers and executives allowing him to think ahead to how he could satisfy their next steps, and new requirements. The very positive impression with Andropov enabled Kalugin, at least until late in his career, to survive the danger that KGB managers would pose to him. An eventual cause of problems for Kalugin was another protégé of Andropov, Vladimir Kryuchkov.

KGB Chairman and later Soviet Premier, Yuri Andrpov (above). Kalugin believes his career leaps were primarily due to the personal patronage of Andropov. Kalugin refers to Andropov his “guardian angel.” Made aware of Kalugin’s success, as all of the most senior managers of KGB doubtlessly had, Andropov surely recognized that the KGB had a gem in their midst. Kalugin reasoned that Andropov trusted him. Still, knowing Andropov’s history, Kalugin knew exactly who he was dealing with. From that understanding, he appears to have developed an invaluable intuition about his own organizations’ moves on issues. The very positive impression left with Andropov enabled Kalugin, at least until late in his career, to survive the danger that other KGB managers would pose to him. An eventual cause of great problems for Kalugin was another protégé of Andropov, Vladimir Kryuchkov.

The primary mission of the Soviet Foreign Counterintelligence Service was infiltration of all the foreign special service operations: intelligence, counter-intelligence, police forces all over the world. The primary target was the US. Second came NATO and Western European countries. As chief of counterintelligence, Kalugin had control of the most significant cases due to the possibility that potential success was merely pretense by the FBI. What appeared interesting may merely have been dangled before KGB with the hope of entrapment of its officers and their networks. The counterintelligence unit, Directorate K of the First Chief Directorate, would take charge of a case from the regular chain of command of the foreign intelligence service whenever an agent appeared to be doubled, compromised, or on track to be compromised. The field case officer may remain the same, but in Moscow the Counterintelligence Service assumes full authority for directing the case. Deception and some types of complex political action operations often were run directly by the headquarters element, Department A, that prepares the operation in Moscow. In such cases, of course, local assets of a Rezidentura may well be employed in support, but the operations are frequently run by specialists. In the Soviet Union, foreigners, especially, US citizens, were closely investigated by the local internal KGB office. That kind of investigation was not conducted with a view to recruit immediately. It was important to identify the psychological profile of a person, his political orientation, his attitude towards his home country and towards the country he was visiting for some reason. After accumulating a sizable amount of material (based on a whole array of undertakings: plain observation, audio- and video-surveillance of the places of residence, agency-level scrutiny, including “honey traps”), on the basis of the analysis, a decision is made about a transforming the investigation into a recruitment with appropriate conditions (such as through compromising materials or a voluntary agreement) or about wrapping up the whole thing by “educating” a foreigner in order to convey a favorable image of a country that investigated him, in his home country.

As his record at counterintelligence indicated, Kalugin could hardly have been judged as being too kind-hearted in his job. In 1975, Kalugin was directly related to the operation to abduct and rendition Nikolai Artamonov, alias “Lark,” to the Soviet Union. Unfortunately, Artamonov died along the way. Kalugin claimed that the reason was an error with the dosage of the anesthetic. Kalugin was one of only three men in a meeting in which the KGB sanctioned the assassination of Bulgarian dissident Georgi Markov in London in 1978. Kalugin explains that the KGB’s science and technology directorate had the weapon designed and constructed in Japan. It was an umbrella that fired a small dart into Markov’s leg. Kalugin would pass the orders from his KGB bosses along to subordinates to provide the poison-tipped umbrella used in the assassination. Kalugin would also organize and execute the 1981 bombing of Radio Liberty headquarters in Munich.

Kalugin indicated that his Foreign Counterintelligence Service was not organized to carry out assassinations. According to the KGB table of organization provided earlier, that dirty work was the shared responsibility of Directorate V and the Thirteenth Department. Work as a KGB foreign intelligence and counterintelligence officer, however, required an understood pledge to commit certain violent undertakings. It would be a leap to call Kalugin an ordinary cutthroat due to his obedience to facilitate that action. There is a classic expression heard in organizations: “One is either in or one is out.” Kalugin certainly was “all in.” Nonetheless, many in the KGB began to doubt that.

Reversal of Fortune

In a sudden pivot in his story, Kalugin’s luck would change at what was for so long his beloved KGB. Kalugin’s reporting of observed lawlessness and arbitrary rule and cronyism within the KGB created friction within its leadership. Shadows gathered. In response to his vocal disagreements with how the KGB was operating, the Center threw Kalugin a dip that caught him by surprise. Telling that part of his story, Kalugin positioned himself as the protagonist, and rightly so in greatcharlie’s humble opinion. Although acting with the best intentions, Kalugin incurred the worst. Soon enough, he found himself facing great difficulties. Despite his near impeccable record, Kalugin’s work was placed under “special scrutiny.” Senior executives of KGB, to whom Kalugin was loyal and obedient, loosed counterintelligence investigators, headhunters who relished ruthlessly destroying officers’ careers, even innocent ones, upon him. They were dishonorable individuals who willingly bore false witness on Kalugin and breathed out lies. Kalugin explained that at first he was a bit bemused by it all, then disgusted as his whole world seemed to come crashing down around him. Nothing would be the same again.

The 18th century French Enlightenment writer, historian, and philosopher François-Marie Arouet, known as Voltaire, wrote in a August 8, 1736 letter to the Prince Royal of Prussia who later became Frederick the Great: “Such is the destiny of great men that their superior genius always exposes them to be the butt of the enveloped darts of calumny and envy. “ Undoubtedly, there were quidnuncs in the KGB who would happily push out scuttlebutt on what was going on everywhere in it and occasionally exacerbating situations, despite all the secrecy and efforts at classification and compartmentalization. Employees within an intelligence service would surely understand the need to keep watch against efforts by adversaries to recruit spies among their organizations ranks. With the right manipulations and pressures, such breakdowns can often be forced. There is also the need to stand guard against the possibility of betrayal and defections impelled by a variety of reasons. However, stories of management’s undue suspicions of officers and internal investigations, seen and unseen, would have conceivably created apprehension within the organization as to what was actually transpiring within the KGB. Consequently, it also became more difficult for officers to know who to trust among their colleagues. Thus, in his career, Kalugin had to become expert in figuring out how to avoid garnering the negative attention of KGB managers who, due to nothing greater than their own disposition or paranoia, would occasionally see innocent officers as potential security risks. As aforementioned, due to his superb work, his good relations with KGB senior executives, he had no normal reason to feel his position was threatened. Aforementioned as well, Kalugin believed that he was close to Andropov, not only due to his official position, but simply because he trusted him. Yet, knowing all that he did about the organization’s quirky leaders, problematic officers in the ranks, doing his job right, and how to look good, it was only a matter of time before his fate would change. As long as Vladimir Kryuchkov, another Andropov protégé, was still Head of the First Chief Directorate, Kalugin had to keep his eyes open and ears pinned back. Kryuchkov had a reputation for acting against perceived rivals for power. Turning to Robert Pringle’s Historical Dictionary of Russian and Soviet Intelligence, 2nd ed. (Rowman and Littlefield, 2015) as a source on Kryuchkov, one learns that he initially began working not in the Soviet intelligence services, but rather in its justice system as a prosecutor’s assistant in Stalingrad. However, Kryuchkov began moving in the direction of foreign intelligence after graduating from the Diplomatic Academy of the Soviet Foreign Ministry and becoming a diplomat. Kryuchkov met Andropov in Budapest in 1955 while he was serving as the Soviet ambassador, and got to know him closely supporting his activities during the suppression of the 1956 Hungarian Uprising. From then on, Andropov became Kryuchkov’s main patron. He joined Andropov at the Department of Liaison with Communist and Workers’ Parties of Socialist Countries in 1959. When Andropov was selected as a Secretary of Communist Party’s Central Committee in 1962, he eventually brought Kryuchkov on from 1965 to 1967 as his aide. Then, when Andropov was selected as Chairman of the KGB on May 19, 1967, he brought Kryuchkov to Moscow with him to serve as Head of the Secretariat, KGB. He allowed Kryuchkov to gain experience with intelligence operations, including covert activities by placing him in charge of foreign intelligence operations under his tutelage starting in 1971. Then, in 1974, Andropov appointed Kryuchkov as head of the First Chief Directorate of the KGB, and he remained there until 1988. (In 1988, he would become Chairman of the KGB, where he would remain until the failed coup of 1991.) During Kryuchkov’s years in the KGB’s foreign intelligence service, it was involved in funding and supporting various communist, socialist and anti-colonial movements across the world, some of which came to power in their countries and established pro-Soviet governments; in addition, under Kryuchkov’s leadership the Directorate had major triumphs in penetrating Western intelligence agencies, acquiring valuable scientific and technical intelligence and perfecting the techniques of disinformation and active measures. At the same time, however, during Kryuchkov’s tenure, the Directorate became plagued with defectors, had major responsibility for encouraging the Soviet government to invade Afghanistan and its ability to influence Western European Communist Parties diminished even further.

Vladimir Kryuchkov, Head of the First Chief Directorate and later KGB Chairman (above). Having caused a stir by pointing out troubles in the KGB First Chief Directorate, fertile ground was created for Kalugin’s rivals to take him down. Vladimir Kryuchkov, the Head of the First Chief Directorate became Kalugin’s biggest problem. He suggested Kalugin was possibly a US spy. According to Kalugin, Kryuchkov’s reasons for wanting to destroy him was his strong relationship with Andropov. Kalugin said Kryuchkov likely thought that he would be sent somewhere, leaving him to become the head of the First Chief Directorate. Kryuchkov’s anxieties would manifest in the sort of unsettling hostile and destructive behavior that Kalugin repeatedly pointed out had rotted away at the soul of the KGB. Kalugin could not avoid problems by staying well back from him. Kryuchkov, after all, was his manager. Kalugin could not escape his fate.

Having caused a stir by pointing out troubles in the KGB First Chief Directorate, fertile ground was created for Kalugin’s rivals to take him down. Vladimir Kryuchkov, the Head of the First Chief Directorate became Kalugin’s biggest problem. He suggested Kalugin was possibly a US spy. According to Kalugin, Kryuchkov’s reasons for wanting to destroy him was his strong relationship with Andropov. Kalugin said Kryuchkov likely thought that he would be sent somewhere, leaving him to become the head of the First Chief Directorate. Consequently, Kryuchkov’s anxieties would manifest in the sort of unsettling idiosyncratic behavior that Kalugin repeatedly pointed out had rotted away at the soul of the KGB. Kalugin could not avoid problems by staying well back from him. Kryuchkov, after all, was his manager. He could not escape his fate. As part of Kryuchkov allegations, he claimed Kalugin was possibly instrumental in allowing the flow of what was characterized as dicey intelligence from a questionable source to the Center. He determined that an intelligence source, who was Cook from Thiokol, Kalugin’s earliest recruitment in the US, was a supposed means by which the US was enabled to channel chicken feed through the Soviet system. No one really cared about Cook who was arrested for possessing and selling foreign currency and making hostile statements about the Soviet regime. He was simply used as the predicate for taking the drastic step of insinuating that Kalugin had been compromised, despite a mountain of exculpatory evidence to the contrary. Wrongful preconceptions can always be supported by bent intelligence.

Kalugin explains that things were made far worse because the matter was investigated by General Victor Alidin, head of the Moscow KGB. Kalugin explained that Alidin was an abominable KGB officer, with a solid reputation for brutality and widely reviled. Yet, he was extremely close to Soviet Premier Brezhnev. In Washington, Kalugin had caught Alidin’s son-in-law embezzling hundreds of dollars of payments intended for KGB operatives. Kalugin recommended tough action, but Solomatin, his rezident, limited the response to a reprimand to avoid all of the trouble with Alidin that likely would have followed any stronger action. Alidin and his men, to whom Kalugin refers as “Alidin & Company,” set out to find spies! As Kalugin described how their reports on the case were written, they seemed as mad as March hares, concocting a bizarre parody of a nonexistent relationship between Cook and Kalugin. It emphasized the Cook’s job as a mole was to string the KGB along and make Kalugin look good. There were leading questions asked of Cook. Those questions  concerned Kalugin’s alleged recruitment by the CIA. Alidin & Company engaged in the worst possible behavior as investigators. Using their well-exercised nefarious stratagems, they were able to make right look wrong and good look bad. One might suppose that it was relatively easy for Kalugin’s adversaries to question that an officer, so early in his career, could stumble upon such a find as Cook. Many officers with far more years and experience never came close to such an achievement. To an extent, Kalugin’s success proved to be his undoing. After being surreptitiously interviewed formally by Alidin and his investigators under the guise that they were fact-finding and needed his help in investigating Cook of Thiokol, It did not take Kalugin long to figure out what they were driving at. Kalugin’s description of the moment when he became conscious of his KGB investigators’ plans against him was chilling. After twisting and turning facts, Kalugin’s rather sophomoric investigators were able to bear false witness against him, breathing out lies. As Kalugin depicted the matter, it all seemed surreal-to-the-point-of-silliness. Again, not a bit of evidence supposedly collected on Cook or Kalugin was conclusive. Certainly, the presumption of innocence was a principle alien in the Soviet Union. Erring on the side of liberty was not something done in its system. Kalugin’s treatment ostensibly could have been chalked up as a lesson to others that all intelligence activities were subject to scrutiny. Perhaps the real lesson was that in the KGB there was an ever-present danger of certain peccant officers, petty tyrants, who, having been provided with brief authority by the Soviet state, were willing to abuse it. Within such officers, there was typically a need through harsh and disruptive behavior to prove, mainly to themselves, that they have power over others and to soothe some uneasiness over what they may recognize as their own shortcomings. They were imaginative in their thinking but in all the wrong ways. Dead ends would only open doors to more illusions and thereby their pursuits were never exhausted.

As Kalugin related this whole tragic episode, there was a duality of emotions manifested in his words. Surely there was disdain, but there was also great pity. Kryuchkov had attained one of the most important positions in the KGB. Rather than relate to Kalugin as one his successful managers and display his competence to possibly take on the position KGB Chairman, he shrunk to reveal the idiosyncrasies of a paranoid KGB official, who could think only of his own personal interest and attempt to destroy two innocent men in the process. Ironically, Kryuchkov would become KGB Chairman in 1988. Unable to accept the ideals of perestroika and glasnost implemented by Soviet Premier Mikhail Gorbachev, he participated in  the 1991 coup attempt, the consequence of which was triggering the rapid dissolution of the Soviet Union. Kryuchkov was a major part of the problem that led to destruction of the KGB, and a major part of the problem that led to the Soviet Union’s collapse. If anything could be said about Kryuchkov’s nefarious plan to undo Kalugin, he was quite thorough leaving nothing to chance, even the likely response of his mentor, Andropov. He moved Kalugin out of the Center into what was then a relative nether region of the Soviet Union, Leningrad. He would become First Deputy Chief of the Leningrad KGB, second-in-command there. In what turned out to be their final meeting Andropov in a friendly manner: “You have stirred up too much dust here at headquarters. I just want you to go away until things settle down. You go to Leningrad and when things calm down, you’ll be back. I promise you. It will take a year or so. No longer than that. You’ll be back soon.” However, Andropov died in two years, and Kalugin remained in Leningrad for seven years.

Certainly, Kalugin knew that Andropov was quite shrewd, and made endless calculations in his decision which all had to be made in the context of Soviet politics. Kalugin was invaluable to Andropov when it came to being set straight on what was happening on the ground versus the West and what was happening among the rank and file on foreign intelligence inside the KGB. Yet, from where he was situated, Kalugin likely understood Soviet politics to a limited degree. The interplay between Andropov and Kryuchkov surely included efforts to discern the Communist Party political scene. Indeed, in the years following the 1956 Hungarian Uprising on which they worked together closely, Kryuchkov, the former prosecutor and diplomat, may have served as more than a loyal confidant who could provide bits of information, but an invaluable sounding board on political developments for Andropov. With his ears always pinned back, Kryuchkov surely had an appreciation of what was happening in the Communist Party and the Soviet system in general. His political awareness and sensitivity likely enabled him, much as that of an attorney to a client, to illuminate for Andropov, ways to finesse responses to Kremlin requests, particularly politically charged ones, to avoid any pitfalls, to ensure his survival and to create possibilities for his advancement within the political realm. Kryuchkov, while twenty years younger than Andropov, was ten years Kalugin’s senior, though he appeared about ten years additional, and spent more time observing senior Communist Party leaders and had more experience formulating nuanced responses to them, given their sensibilities. (Perhaps no better example existed Kryuchkov’s political savvy than the way in which he knocked the career of Kalugin, another Andropov protégé, completely off track while incurring no consequences for himself.) Andropov most likely thought that if he were moved up in the hierarchy and a choice had to be made for a new KGB Chairman, it would be good to have his protégé Kryuchkov to be in the running for the post. By interceding for a second time on Kalugin’s behalf, and thereby blatantly undermining Kryuchkov, Andropov may have sent the wrong signal concerning his confidence and impressions about him in the KGB and the Communist Party, potentially making Kryuchkov a weaker candidate for the top KGB post later. When Andropov was actually promoted to Deputy Chairman in 1978, Kryuchkov was not elevated to KGB Chairman but remained at the First Chief Directorate. (Kryuchkov eventually assumed that post on October 1, 1988, almost five years after Andropov’s death.) Again, Kalugin’s father warned him about the Soviet system, the state security service, the people within it.

Demoted from his post as head of KGB Foreign Counterintelligence, Kalugin was sent to the Leningrad KGB branch. There, Kalugin witnessed first-hand the true nature of the KGB’s activities as a domestic political police. He discovered that the KGB’s internal functions had precious little connection with state security but rather, benefitted corrupt Communist Party officials by keeping them in power. Indeed, from Leningrad, Kalugin could see more clearly the wretchedness of the Soviet system, and real socialism at its fullest. Further, he was authentically in touch with Soviet people for the first time and began to understand how they lived. Kalugin concluded the Soviet system was unworkable and needed to change.

At Leningrad KGB

In the end, Kalugin was demoted to serve as first deputy chief of internal security in Leningrad. Regardless of the circumstances, Kalugin did his job in his new post. One interesting case he was involved with in Leningrad was a counterespionage operation, the handling of a double agent. According to Kalugin, the KGB ran double agents to gather knowledge on hostile intelligence services. The KGB could learn a great deal by the kind of questions a hostile intelligence service was asking a double agent such as what kind of intelligence was required and what type of assignment it was giving to the double. To illustrate that point, he provides the theoretical circumstance of a CIA officer outlining what he was seeking from a Soviet agent. The officer might say a bit too much in explaining the matter and let slip some interesting information. Double agents could passively pick up valuable material just by being in the presence of hostile intelligence officers. Kalugin then gives a real life example of how a Soviet double agent grabbed a roll of microfilm that his CIA handler had forgotten. Dozens of intelligence documents, shedding light on the CIA Tokyo station were on that microfilm. Kalugin explains that the KGB also used double agents to plant disinformation and confuse hostile intelligence agencies. And running a double game could be extremely valuable in the propaganda battle with the West. On several occasions when the KGB was sure the CIA or other agency had been duped by its double, it would then nab the CIA agent for espionage. The KGB would then go about revealing details of the CIA’S spying operation, and expel the US case officer in a great fit of publicity.

Concerning the counterespionage case he became involved with while in Leningrad, the KGB elicited the cooperation of a Leningrad scientist named Pavlov who frequently traveled the world on a Soviet research ship. Ostensibly, he had access to information about Soviet science and the Soviet military industrial complex. Instructions were given to him to express dissenter views, engage in some black market operations, and do everything possible to attract the attention of the CIA and other intelligence services. For two years Pavlov was dangled at the CIA, doing everything that he was told. The KGB was surprised, for it expected the CIA to show interest in a man who had so much access. Then out of the blue, the KGB received a cable from the KGB’S station chief in Buenos Aires, Argentina stating that Pavlov had come to the Soviet Embassy and reported that the CIA tried to recruit him. He talked to the CIA agent, passed along some information, undoubtedly chicken feed, and agreed to meet him in Leningrad upon his return home. Kalugin said that his boss in Leningrad was skeptical, but the Center told them to go ahead with the meeting. And indeed such a meeting took place. Our surveillance people observed Pavlova and a diplomat from the US consulate in Leningrad–clearly a CIA case officer–rendezvous ingredients on a remote street in the city. Pavlov took money from the CIA case officer in exchange for scientific information. A second meeting was scheduled 25 miles outside of Leningrad. Pavlova was to give the CIA agent documents in exchange for another payment. As it turned out, however, the meeting came only days after the September 1, 1983 Soviet shoot down of Korean Airlines Flight 007. The Center made the decision not to continue to pursue the counterespionage operation. It ordered the arrest of the CIA case officer when he met with Pavlov and use of the incident to counter the storm of controversy that swept over the Korean Airlines fiasco. The CIA officer was caught red handed. He was expelled, but the incident while hyped did not make a dent in the bad publicity suffered over the shoot down. However, it also turned out that Pavlov was not being honest about the money he received from the US, pocketing more than he reported. As a result of suspicions over Pavlov’s honesty, his apartment was searched and the KGB found large sums of money proving he was pocketing payments. Pavlov confessed and was sentenced to 13 years in jail. He was granted amnesty in Yeltsin’s era.

In the Leningrad KGB branch, Kalugin also witnessed first-hand the true nature of the KGB’s activities as a domestic political police. He discovered that the KGB’s internal functions had precious little connection with state security but rather, benefitted corrupt Communist Party officials by keeping them in power. Indeed, from Leningrad, Kalugin could see more clearly the wretchedness of the Soviet system and appreciate real socialism at its fullest. Further, in Leningrad, he was authentically in touch with Soviet people for the first time and began to understand how they lived. Kalugin concluded the Soviet system was unworkable and needed to change. It was a conclusion from inside the Soviet Union and was not prompted by any outside ideas or reports. The disintegration of what were once considered the indestructible foundations of the KGB, as outlined by Kalugin, placed it on the road to destruction. In this segment, Kalugin provides a stark warning about what can happen to a state security organization that has lost its way. In vinculis etiam audax. (In chains yet still bold.)

Concerning the story of how his career ended, no one could be as sound on the details of the matter as Kalugin, himself. In the section of this review dubbed “About the Author,” may have been a bit of a spoiler, telling the story of how things progressed to the present very briefly. Kalugin was forced into retirement but seemed content to break free of the suffocating chains of the KGB bureaucracy, and daylight madness of a few power wielding superiors or equals in other departments. Kalugin then took a very active part in the rallies of Democrats. His disillusionment culminated in a sensational appearance at a political gathering in Moscow in the summer of 1990. He gave a speech from the abundance of the heart at the “Democratic Platform in the CPSU” conference. The former KGB general reports that he struggled to steady his voice and said: “Some people may think that I have jumped on the democratic bandwagon with evil intentions. I understand that there may be suspicions in your m8nds, but let me tell you that you’re wrong. I am from the KGB. I worked in that organization for more than thirty years, and I want to tell all of you how the KGB works against the best interests of democratic forces in this country.” Kalugin then describes an utter silence in the hall as he talked about himself and explained why the KGB must be radically reformed and the number of agents drastically reduced. He stated:  “We cannot begin a serious restructuring of society until we rid ourselves of the restraints imposed by an organization which has penetrated every sphere of our lives, which interferes with all aspects of state life, political life, the economy, science, arts, religion, even sports. Today, just as ten or twenty years ago, the hand of the KGB is everywhere. And any real talk of perestroika without reforming the KGB is nothing but a lie. All the much-ballyhooed changes in the KGB are cosmetic, a disguise upon the ugly face of the Stalin-Brezhnev era. In fact, all elements of the old dictatorship are still in place. The chief assistant and handmaiden of the Communist Party remains the KGB. In order to secure genuine changes in our country, this structure of violence and falsehood must be dismantled.” The speech was met with roars of approval, and a standing ovation. Requests for interviews and speeches followed in the weeks afterward. What also followed was a predictable KGB attack. A statement was released by the KGB press office declaring in effect: “The KGB is going to have its say about Kalugin, who he is and what he stands for.” Soviet Premier Mikhail Gorbachev dealt the heaviest blow, issuing a decree on July 1, 1991, stripping Kalugin of his rank of major general, revoking all of his KGB awards, and cutting off his pension. Kalugin persisted against the odds. He was soon elected People’s Deputy of the USSR from the Krasnodar Territory. He remained a very vocal independent critic of the Communist system. His continuous attacks on the KGB garnered him notoriety and a political following. Political courage had to replace physical courage in the field as a KGB officer, though the real threat of violence, his assassination, existed. Nevertheless, he continued to protest KGB abuses.

Following an attempted 1991 coup against Gorbachev led by Kalugin’s nemesis, Kryuchkov, along with seven others, a popular movement under the Mayor of Moscow Boris Yeltsin emerged to subdue coup supporters. Watching events transpire in Russia as the Soviet Union collapsed and failing to act in some way would have been tantamount to accepting and admitting that he never had a spark of dignity or decency. Kalugin manned the barricades, serving as an inspirational leader for protesters. He jumped on top of Soviet tanks to address protesters. It was Kalugin who supposedly persuaded Yeltsin to address crowds before the Russian White House and elsewhere.

The Collapse of the Soviet Union

Following an attempted 1991 coup against Gorbachev led by Kalugin’s nemesis, Kryuchkov, along with seven others, a popular movement under the Mayor of Moscow Boris Yeltsin emerged to subdue coup supporters. Watching events transpire in Russia as the Soviet Union collapsed and failing to act in some way would have been tantamount to accepting and admitting that he never had a spark of dignity or decency. Kalugin manned the barricades, serving as an inspirational leader for protesters. He jumped on top of Soviet tanks to address protesters. It was Kalugin who supposedly persuaded Yeltsin to address crowds before the Russian White House and elsewhere. In September 1991, Gorbachev restated Kalugin’s ranks along with all decorations and his  pension. Yeltsin took control of the Soviet Union from Gorbachev and dissolved it, breaking it down to constituent republics. It was widely seen as a change for the better for the Soviet people and the world.  Though the new and smaller Russian Federation filled the vacuum of the Soviet space and got off to a very rocky start, reformists such as Kalugin who followed Yeltsin could be satisfied that they at least put it on the right track with an energetic shove. Kalugin decided to become a part of the reconstruction. He believed that Russia could eventually meet its full potential. His sensibilities then were representative of those times. He became an unpaid advisor to reformist KGB Chairman Vladimir Bakatin. Bakatin became famous for issuing a pattern of listening devices at the US Embassy in Moscow. However, Bakatin was only able to dissolve the old system but not reform it. As time went on, he was wise enough to recognize that possibility had passed beyond his view.

It would be easy to say that it should not have been terribly difficult for an intelligent man to predict the future of an authoritarian regime that sought to crush the spirit of its people with deceptions, crimes, and evils. Long ago, as a child, he had reached one set of conclusions on those matters. However. his experiences and intelligence provided him with the capability to discern why his initial conclusions might not have been correct. As he collected more information and experienced more of the darker side of what the Soviet system had to offer, he found that he was able to refute his long held views. Thus, he could no longer press any of his ideals about Soviet Union, the Communist Movement, the Communist Party, Socialism and the geopolitical struggle with the West forward with a degree of confidence. There was nothing puzzling about it all to Kalugin as he made that transition in his thinking. The death of Kalugin’s life in Russia opened the door to a new life in the US. Arguably, to that extent, Kalugin in the long-run oddly benefitted from the wrath of his enemies, and in a way benefited from the collapse of the Soviet Union. The righteous was separated from the unrighteous.

Kalugin always remained resolute in disappointment. He never lost his way. In his mind, he organized and synthesized the conditions that beset him. He never resembled what has been whimsically called “spiritual roadkill.” He had his own ethics, buttressed by a creed of what is right and wrong, fair and unfair inculcated within his soul at home with his parents. Ethics without such a creed are only a hollow shell. Bereft of the Soviet system that was once his mighty and faithful, shining beacon of light, upon which he could place all of his hopes and dreams for his future and the future of the world, over a few short years, as mentioned earlier, Kalugin was forced to make a series of never before imagined, new choices about his future, and his family’s future. Even through that, his heart remained stout and strong. Still today, he has refused to concede defeat to his enemies back in Moscow. How poetry manages to connect is really its classic role in culture. It provides an emotional vocabulary, putting into words what one may be sensing. When thinking about Kalugin’s struggles, wanting to achieve much for his country and do the right things, Arthur Hugh Clough’s “Say not the Struggle nought Availeth” (1849) comes to mind. It connects well with Kalugin’s persistence in humility:

Say not the struggle nought availeth,

The labour and the wounds are vain,

The enemy faints not, nor faileth,

And as things have been they remain.

If hopes were dupes, fears may be liars;

It may be, in yon smoke concealed,

Your comrades chase e’en now the fliers,

And, but for you, possess the field.

For while the tired waves, vainly breaking

Seem here no painful inch to gain,

Far back through creeks and inlets making,

Comes silent, flooding in, the main.

And not by eastern windows only,

When daylight comes, comes in the light,

In front the sun climbs slow, how slowly,

But westward, look, the land is bright.

Kalugin always remained resolute in disappointment. He never lost his way. In his mind, he organized and synthesized the conditions that beset him. He never resembled what has been whimsically called “spiritual roadkill.” He had his own ethics, buttressed by a creed of what is right and wrong, fair and unfair inculcated within his soul at home with his parents. Ethics without such a creed are only a hollow shell. Bereft of the Soviet system that was once his mighty and faithful, shining beacon of light, upon which he could place all of his hopes and dreams for his future and the future of the world, over a few short years, as mentioned earlier, Kalugin was forced to make a series of never before imagined, new choices about his future, and his family’s future. Even through that, his heart remained stout and strong.

It is imaginable that greatcharlie’s enthusiasm over First Directorate may lead some to simply write this review off as a hopelessly oleagic encomium. However, nothing presented here is expressed with pretension. What one finds in First Directorate is of the highest quality and remains steady from beginning to end. Readers are also enabled to see the world through the lens of a man with years of experience in the world and a thorough understanding of humanity. Information from the text that is presented here, though it may wet the palate, only represents a mere fraction of what “things, wonderful things” the reader will find in First Directorate. In the genre of fiction and nonfiction spy stories, there is an artistic milieu in which writers seek to position themselves amidst. It cannot be denied that human nature instinctively finds entertainment more compelling than edification. While there is plenty in First Directorate to be entertained, in focusing on such, the depth of Kalugin, the man, might be missed. There is much that explains KGB tactics, techniques, procedures, and methods in First Directorate. When dealing with details as well as publishers and editors, one may likely find inconsistencies with previous accounts told by Kalugin of people and events. While there are many facts in First Directorate to scrutinize, in focusing on such, the mosaic of Kalugin, the man might be missed. Of course, readers should enjoy First Directorate as they wish. It is nice to get hold of a book that allows readers many ways to enjoy it. For greatcharlie, it was an absolute pleasure to read. As would be expected, greatcharlie wholeheartedly recommends First Directorate to its readers. It is definitely worth the read.

By Mark Edmond Clark

Book Review: Robert Lindsey, The Falcon and the Snowman: A True Story of Friendship and Espionage (Open Road Media, 2016)

With deep regret, greatcharlie has removed its book review of Robert Lindsay’s The Falcon and the Snowman: A True Story of Friendship and Espionage (Open Road Media, 2016). The review will remain off our blog for an indefinite period. An extremely reliable source made greatcharlie aware some time ago that the review was being used by dishonorable individuals to support grossly false claims that greatcharlie was an instrument of the Russian and Iranian governments and support the further incredulous claim that there was a pro-Russia and pro-Iranian bent to greatcharlie’s essays. Without any furtive or negative intent and oblivious to any intentions to make wrongful use of our efforts, greatcharlie produced its review of The Falcon and the Snowman after receiving an email request from Greta Shull, the Marketing Coordinator at Open Road Media to write a review of its eBook of The Falcon and the Snowman. According to Shull’s email, the decision to contact me was “Based on my review of The Good Spy by Kai Bird, . . . . ” While it is noted in greatcharlie’s “Book Reviews” page that our blog welcomes solicitations for reviews, to date it has only received one, and that was from Open Road Media. On October 26, 2016, greatcharlie posted its review of The Falcon and the Snowman. It was from that particular moment onwards, the posted review has been misused. Removing the review was the only option available to attempt to halt all false claims and the continued misuse of our content. (Amazingly, even with this message placed on the post, the essay is still being used as evidence of a pro-Russian bent to our work. Either there is absolutely no oversight by management in the organization in which the dishonorable individuals tragically serve, or their managers condone their wrongful and offensive behavior.)

In the spirit of full disclosure, greatcharlie must inforn its readers that a very reliable source has also repeatedly indicated to us that the wrongful use of our blog is actually part of a larger, very unusual effort in violation of the rights of the blog’s founder, Mark Edmond Clark since 2013. Note, however, that hostile acts against Clark by certain dishonorable and unscrupulous individuals actually began at least two years beforehand. The wrongful use of essays and book reviews from greatcharlie to fallaciously establish Clark’s ties to the Russian and Iranian governments and falsely prove a supposed pro-Russian and pro-Iranian bent to Clark’s writing was conducted with the intent to support even greater false claims made by dishonorable individuals that he was a threat to US national security. (In addition to the information provided by “very reliable sources”, the New York City Police Department (“NYPD”) identified the dishonorable individuals engaged in illegal actions against Clark as federal officials and contractors working at their behest. A NYPD sergeant quoted one of the federal officials stating to him incredulously in 2014 that they were “interested in an international matter concerning Clark outside the scope of the NYPD’s mission.”) Two additional absolutely false claims that the dishonorable individuals are still propogating are that “Clark was a government analyst,” flattering themselves, connecting Clark to any government work in which they are engaged, making such and “Clark trained foreign troops overseas,” which is shear fantasy. When these outright lies are told, no information is ever provided as to the specific government organizations that Clark supposedly worked for when he allegedly carried out these activities. The most basic research into Clark’s background would easily and completely disprove these ridiculous claims made by the dishonorable individuals. A third false claim, rather odd and remote yet tacked on the others, is the insistence that “Clark is afraid of dogs.” That is an utter lie, conjured up undoubtedly with the same vacuity and enthusuasm as all of the dishonorable individuals’ other lies. Most recently, to Clark’s utter shock, it was revealed to him the greatest false claim of all has been made by the dishonorable individuals. They have made the incredulous claim that Clark is has been long engaged in espionage against the US. This claim is so absolutely false, that it may serve as an indication of some considerable psychological problems amongst the dishonorable individuals. It is impossible to believe that anyone of sound mind would state something completely false to a great number of people without having any ability whatsoever to support it with truth. Nevertheless, the false claim has been made. At the start of 2020, Clark was informed that the dishonorable individuals for years had claimed he once served in the US Navy. Clark never served in the US Navy or US Marine Corps for that matter. These fact can also be easily verified. How foolish it would be for anyone who actually knows Clark to believe any of the dishonorable individuals false claims. Any one who might investigate this matter should know that these problems were in fact initiated by a rogue FBI Special Agent, John Consoli, who held an irrational dislike of Clark and promised him some time ago that he would hurt him by making certain that Joint Terrorism Task Force in New York acted against him. In Consoli’s words: “Once they are in you, they will never let you go!” At that time, Consoli was apparently a member of what was called the “Iran Unit” of the FBI’s New York Office. Clearly, Consoli set forth on that hostile, wrongful path as he vowed with the help of other FBI Special Agents. Along the way, other federal agencies saw fit to jump in on the unwarranted effort to destroy Clark’s life and the lives of his elderly mother and young daughter. Doubtlessly following the inception of the attack against Clark, no further manipulation by Consoli was required to encourage the other federal agencies to seek a piece of action in a well-budgeted cooperative effort against him. (Note: FBI Special Agent John Consoli once attempted to draw a pistol on Clark in the quondom Three Star Diner in New York and was stopped with force by a fellow FBI Special Agent, Mark Kellert who was present, essentially saving Clark’s life. Further, this particular John Consoli is very well known to, and once sought by, Italian authorities.)

According to another very reliable source, in addition to their misuse of essays and reviews on greatcharlie, the same dishonorable federal officials and contractors, with promise of significant remuneration, encouraged Clark’s ex-wife, who is unnamed here, to write numerous damaging false statements, with the purpose of supporting their false claims about Clark as being a threat to society and a threat to US national security. That in turn enabled them to secure authority to engage in a very costly, wide-ranging, and needless surveillance operation against him, as well as conduct a very destructive, very apparent “dirty tricks” campaign against him of which a record has been kept by Clark. Clark had battled his ex-wife in an extremely contentious divorce in which the custody of his daughter was at the forefront. Thus, his ex-wife, had a pre-existing animus toward Clark and had indicated more than once that she had a personal aim of severely harming him. In numerous trenchant false statements she provided against Clark, nearly all concerned completely imaginary activities that he purportedly engaged in with foreign governments. Again, based on very reliable sources, she continues to provide similar absolutely false statements to date, even though Clark has had no contact or communication of any kind with her for nearly three years. Reportedly, his ex-wife was introduced to the dishonorable individuals who encouraged and paid her to write the false statenents by a parent named Sylvia Kovac at his daughter’s school. In 2013, Kovac had been directed by the same dishonorable individuals to establish clandestine contacts with Clark. After contact with the same dishonorable individuals, Clark’s daughter’s school, itself, eventually became involved in the matter. Vigilante actions by parents at the school, mostly surveiling Clark and engaging him in leading conversations, directed by members of the school’s security office, specifically Lou Uliano and Joseph Pignataro, both formerly of the NYPD. Those wrongful, destructive activities were approved by the head of the school, then Joan Lonergan and the then head of the lower school, Frank Patti. Those activities intensified when Clark’s daughter entered the Middle School and the school was placed under the new leadership of Tara Christie Kinsey. Note that the school and parents were paid quite well by the dishonorable individuals for engaging in such activity. This had a devastating psychological impact on Clark’s young daughter. Clark’s inquiries with school officials into what was transpiring were met with terse denials. Once Clark’s daughter entered the Upper School, and few parents would pick up their daughters when classes ended at 3:00PM, any time Clark came within the vicinity of the school to drop his daughter off by taxi or meet her in the street, the school’s security director Joseph Pignataro, with assistance of the dishonorable individuals as spotters, would have Middle School parents along with their daughters, aggressively surveil Clark. This had a further devastating psychological impact on Clark’s daughter. Far more sinister steps were undertaken by school security officials, surely to the satisfaction of the dishonorable individuals, to eviscerate Clark’s reputation among school faculty, staff, and especially school families. (Clark maintains a list of those individuals, too long to enumerate here, and the dates and times in which they engaged in such activity which he can make available to investigators.) The effect of the hostile activities of school security and other school officials has been to constructively eject Clark from the school community and destroying any chance that Clark could ever have an authentically positive relationship with his daughter’s school. (Note, as Clark observed, that the dishonorable individuals and their operatives had absolutely no compunction about engaging in their wrongful, nefarious, vacuous, activities in a school, hospital, or house of worship.) Away from the school, itself, but in its vicinity, there were also efforts by operatives organic to the organization in which the dishonorable individuals worked to establish clandestine conversations with Clark. In 2013, the initial effort was made by a writer named Nunyo Demasio. His apparent goal was to encourage Clark to make negative statements about the US government and incriminating statements about himself. Many others have attempted to engage Clark in clandestine conversations. Parents from the martial arts school that his daughter attended while in 2nd and 3rd Grades would absurdly don sunglasses and come down to her high school during pick-up time to track Clark and his daughter as they walked home. Another effort included having individuals familiar with Clark contact him with emails, all essentially with the same message, insisting that he contact them immediately and answer some frightfully meaningless questions. Those who engaged in such behavior can be readily identified by Clark by name. They can also be identified via their emails, text messages, photos, and through Clark’s telephone logs. An authentic patriot and Founding Father of the US, James Madison, in describing the mob mentality of such individuals organized as vigilantes by the dishonorable individuals and their operatives for such a sinister purposes, perfectly stated that they were, “united and actuated by some common impulse of passion, or of interest, adverse to the rights of other citizens, or to the permanent and aggregate interests of the community.”

The unjustified surveillance and an apparent fraudulent investigation of Clark supported by the use of false statements also included the use of the harsh, technique of “raking”. Through that technique, the effort was made by the aforementioned dishonorable and unscrupulous individuals to influence anything and anyone associated with Clark or anyone with whom Clark came in contact. Organizations, businesses, lawyers, doctors, his daughter’s pediatrician, tax preparers, bank staff, school officials, literally any individuals with whom Clark spoke and any employees in any establishment in which he shopped, were intercepted and told the most odious things possible about him. The dishonorable individuals have sought to assure Clark would not be able to enjoy the warmth of authentic human contact. They insisted upin getting between Clark and his contacts with anyone. The overwhelming majority of those who heard such statements from the dishonorable federal officials and contractors, who presumably mistakenly believed that they were receiving information from a credible source, and after being offered remuneration, and perhaps becoming excited over the idea of spying against an “officially” declared “enemy”, were quickly convinced that Clark was a threat to society and a threat to US national security. They ostensibly relieved themselves of doubt or guilt by accepting that they were acting against him upon the direction of their government. As a clerk working in a neighborhood Duane Reade pharmacy told Clark, “We just follow orders!” For Clark, creating new relationships or acquaintances of any kind, business or personal, eventually became impossible due to the immediate interference of the dishonorable federal officials and their contractors between him and anyone else. (Remember, this extreme situation has existed for Clark for over eight years! The actual surveillance has been underway for over a decade.) It would seem that not much could have been worse than to have federal officials and their contractors propagate ideas that would bring the loyalty of a patriotic citizen as Clark into question. Such false claims tragically tend to stick even after the truth has been revealed. The dishonorable individuals, however, have commumicated things that were far worse! The dishonorable individuals are apparently so lacking in self-confidence, that they have felt the need to compensate for that deficit via the development of an egotistical mindset that has led them to brag about their power and capabilities to their “operatives” and amazingly, in Clark’s case, go as far as to spread rumors of their plans to injure and even kill him and members of his family. That particular behavior was especially prevalent in the Fall and Winter of 2015 during which Clark was repeatedly warned by some long time acquaintances (whose names Clark can reveal to an investigator), who, to their great surprise, were contacted by the dishonorable individuals.

When examined, elements of the aggressive surveillance have left little doubt that the dishonorable individuals have also clumsily engaged in a far less thoughtful simulacrum of the East German Stasi (State Security) technique of psychological harassment of perceived enemies known as Zersetzung, a term borrowed from chemistry which literally means “decomposition”, but involved the disruption of the victim’s private or family life. Zersetzung was designed to side-track and “switch off” perceived enemies so that they would lose the will to continue any “inappropriate” activities. The disinformation and “dirty tricks” aspects of the dishonorable individuals campaign against Clark and his family appear to be part of their imitative Zersetzung program. In the case of Clark, however, neither he nor his mother and daughter have ever engaged in any inappropriate activities that have needed to be halted. On far more occasions than not, those taking direction from the dishonorable federal officials and contractors displayed extraordinarily hostile attitudes toward Clark and committed aggressive, even violent acts against him while engaging in their untrained, unskilled surveillance.  It has all been vigilantism in a particularly odious form. Clark’s elderly mother, now 89, and young daughter have also faced the same or worse attitudes and behavior from quickly recruited, ad hoc “operatives”–some hired astonishingly right off the street–as they engaged in their amateur surveillance activities against them. Reportedly, those taking such overzealous actions have been showered with praise and support, and payments, from the dishonorable federal officials and contractors. They further manipulate their amateur operatives by telling them that by engaging in such aggressive action they prove themselves to be “true patriots!” A plethora of evidence available indicates the wrongful actions outlined here as well as many others, all of which violate their First Amendment rights of Clark and his family under the US Constitution are unfortunately still being conducted against them as of this writing, particularly inside the apartment building in which they live. Main offenders engaged in this activity over the past four years in the apartment building in which Clark resides on East End Avenue in New York City include tenants: Seth Balsam; Leonardo Celestino; Joel Weisberg, Dana Rolf, Joseph Cohen; Jim Cronin; Elaine Ann Cronin; John David Griesedieck; Abby Reeves Griesedieck; Ira A. Altman; Susan Levkoff; Sebastian Teslic; Jay Desai; Dorothy Chan; Joanne Chan; John Lysohir; Pamela Lysohir; Robert Terry; Barbara Ainslie; Austin Hayden; Nesrin Salkin; Melissa Iorio; Erin Yurkewecz; Laura Nardelli; Christina Zugor; Maureen Linehan; Jennifer Marian Lee; Christopher Gonzålez-Ribot; Allegra Lugo; Christopher P. Cau; and, Barbara Frankfurt. The names of many other tenants engaged in hostile behavior toward Clark’s family are also known. The unrelenting, attrocious behavior of Joel Weisberg, Laura Nardelli, Barbara Frankfurt, Leonardo Celestino, and Christopher Gonzålez-Ribot, in particular, has far surpassed that of all others. In addition to making threatening comments and obscene gestures to Clark, which were reported to the NYPD, Celestino, who lives in the apartment above him, regularly creates disturbances by literally hammering on the floor throughout his apartment at all hours–at times the hammering sound was deafening, moving chairs across the floor in the early morning hours, and is constantly accessing and pulling on the wiring in the walls. When Celestino’s behavior was reported to the Superintendent, nothing was done concerning it. Instead, Clark received an email from the landlord insisting, with the threat of eviction, that he not disturb the other tenants. One morning in late May 2020, Frankfurt stood with her dog in the hall of Clark’s apartment floor, and for reasons unknown waited six feet from his apartment door. When Clark’s young daughter arrived on the floor by elevator and walked casually toward her own home, Frankfurt, standing only a few feet away with her dog, declared to her “If you come near me I will call the police!” Clark’s daughter did absolutely nothing to provoke Frankfurt. (Frankfurt is a former employee of the landlord of Clark’s apartment building.) Untrained for surveillance, or such “active measures”, each would undoubtedly confess to their activities when questioned by an experienced investigator. (An especially revolting aspect of the actions of those recruited to engage in surveillance against Clark and his family is a decision by those “untutored operatives” to include their own children in their activities. They will hold them as shields as they try to get closer to Clark; bring them to locations where Clark and his daughter may be seated and move their children as close to them as possible; or, have the children block a means of egress for Clark, literally placing them in his path. Tenants in Clark’s apartment building regularly engage in this abhorrent action. It is horrible to watch. It is hard to imagine how those individuals live with themselves. One individual who was recruited by the dishonorable individuals to spy on Clark and his family and formerly engaged in this practice of using his own children when surveilling them, admitted to Clark that the dishonorable individuals strongly suggested surveillance recruits who were parents, include their children in their activities. Reportedly, the dishonorable individuals assured their operatives that Clark would never be aware of how the children were being used as “props.” One might presume that the remuneration for the surveillance work is increased when parents include their children. Children were reportedly presented with little gifts from the dishonorable individuals. It is unsettling to regularly observe how the natural sensibilities of parents to protect their children from trouble or a slight possibility of harm can be so easily overcome by the lure of easy money. [Note: Since the time this information was included, the use of children in the dishonorable individuals wrongful surveillance activities against Clark and his family, particularly in restaurants and cafes, has increased twice as many times in new, more disturbing forms.])

It has been repeatedly called to Clark’s attention by his apartment building landlord that there have shockingly been numerous complaints filed with the NYPD about his alleged “hostile and threatening behavior” against other tenants in his apartment building. From all that Clark has been told, a bundle of complaints from tenants were all filed contemporaneously in 2018. It is odd in itself that so many complaints about individual negative contacts with Clark would reported at the same time. However, more importantly, Clark has the great benefit of being able to provide proof of his whereabouts at all times and of knowing he has not initiated any contact with any tenants since he arrived in the apartment building. The contacts he has had unfortunately have been those occasions in which other hostile tenants have approached him suddenly and levelled threats at him, as well as those occasions during which aggressive tenants have engaged in dreadful behavior toward his family and him. Without a shadow of doubt, the complaints made to the NYPD against Clark are all false complaints. It is extremely possible that the mass reporting of complaints against Clark by tenants was a tactic encouraged and organized by the dishonorable individuals. Many of those who made complaints against Clark had likely never been in contact with the police before. Again, with the benefit of knowing he did not engage in any of the behavior reportedly alleged in the complaints, Clark is also well aware that not one complaint made against him can be substantiated. Further note that not one complaint was made under oath. In fact, the type of complaints that were reportedly made, can made by anyone, against anybody, for literally any reason

While it may have appeared to be a foolproof, no risk action to take against Clark, and it may very well be that the dishonorable individuals may have convinced tenants in Clark’s apartment building that such was the case, in reality, making false complaints to the NYPD is a violation of the law. Under New York  Consolidated Laws, Penal Law – PEN § 240.50, Falsely reporting an incident in the third degree, a person is guilty of falsely reporting an incident in the third degree when, knowing the information reported, conveyed or circulated to be false or baseless, he or she gratuitously reports to a law enforcement officer or agency (a) the alleged occurrence of an offense or incident which did not in fact occur;  or (b) an allegedly impending occurrence of an offense or incident which in fact is not about to occur;  or (c) false information relating to an actual offense or incident or to the alleged implication of some person therein. The penalty for engaging in such a violation of law could be as much as imprisonment for one year. If a tenant, who made one of the complaints among the bundle of the complaints supposedly filed against Clark to the NYPD, would be willing to discuss why they made them in an interview with any investigators, it would almost certainly be revealed that they were prompted by the dishonorable individuals to engage in such behavior. Along with providing remuneration to tenants in Clark’s apartment building in return for their assist in violating Clark’s First and Fourth Amendment rights under the Constitution, and securing numerous false statements about Clark from his ex-wife, unnamed here, and Sylvia Kovac which were reportedly used wrongfully to secure FISA Court warrants, the request that tenants violate the law by making false complaints to the NYPD evinces a pattern by the dishonorable individuals of encouraging and supporting unlawful actions by all of their “operatives” against Clark and his family.

Certain parties associated with Clark’s apartment building management have made written threats to use NYPD police complaints from tenants that he possesses, all of which are absolutely false, in court proceedings to harm Clark and remove him from his apartment. Under § 210.35 of Article 210 of New York Penal Law, Part 3, Title L, a person is guilty of making an apparently sworn false statement in the second degree when he subscribes a written instrument knowing that it contains a statement which is false and does not believe to be true. Making a sworn false statement in the second degree is a Class A misdemeanor. Again, as aforementioned, Clark has the benefit of knowing he did not engage in any of the behavior reportedly alleged in the complaints. Clark is also well aware that not one alleged complaint made against him can be substantiated. Clark can substantiate his own claims of his whereabouts at all times. At no time was he aggressive toward other building tenants, engage in threatening behavior, or initiate any negative verbal exchanges with any tenants. Clark has gone out of his way to avoid engaging other tenants.

According to Clark’s daughter, a building back elevator operator who works predominantly as a doorman, George Semeniouk, regularly makes unspeakable misogynistic comments toward her grandmother and her on mornings when they are on their way to her school. He has on more than one occasion threatened to harm Clark. Doorman Lech Stepien had sought to engage in clandestine conversations with Clark on behalf of the dishonorable individuals during 2017, 2018, and better part of 2019. (While he would consistently ask Clark specific and intrusive questions about his work, Stepien’s purpose for the dishonorable individuals was to authentically engage Clark to support their wrongful claims of statements, all of which were untrue, that Clark supposedly made to him.) Having failed to entrap Clark, Stepien took a hostile posture toward him from that moment on. When at the concierge desk, he turns his back or walks away from it whenever Clark enters or leaves the building. When other building employees are present with Stepien when Clark is entering or exiting the building, according to what a couple of those employees have told Clark, he makes ugly statements in Polish referring to Clark as something less than human. As the supervisor/scheduler of the building’s doormen due to his seniority, surely not capabilities, Stepien insists that other doormen cooperate with fully with the dishonorable individuals despite the reluctance of some to do so. The behavior of both Semeniouk and Stepien has been encouraged ultimately by the apartment building superintendent, Marek Kurkarewicz. Kurkarewicz has also encouraged contractors working the building, doing renovations or repairs and relatively transient, to engage in hostile behavior toward Clark and his family, to include making outrageous lewd comments toward his young daughter. Kurkarewicz has done much on behalf of the dishonorable individuals to spread the lie among old tenants and all new tenants, that Clark Is an “enemy spy.” Further, he has encouraged them to become fully involved in the wrongful surveillance of Clark and his family. Finally, to respond directly to an absolutely false claim concerning Clark’s status in the apartment building, he is not simply a visitor or resident but his full name is on the executed apartment lease and he has a hard copy of that document to prove that. Efforts have been made for nearly 5 years to spread false information that Clark was not on the apartment lease. (For all those concerned, be advised that a lease is a contract between a landlord and a tenant, containing the terms and conditions of the rental. It cannot be changed while it is in effect unless BOTH parties agree.) Presumably, the dishonorable individuals want to claim that they did not violate Clark’s First and Fourth Amendment Rights in his apartment building by using deception to falsely establish, and convince anyone involved or interested, that Clark is not a full-fledged tenant there. Clark is due all of his Constitutional Rights as tenant signed on to the apartment lease, and his rights have been violated for countless months by the dishonorable individuals and their operatives, apartment building tenants and employees. Further, Kurkarewicz would provide the apartment building landlord with false, disconcerting reports about Clark to include lies about him openly threatening building tenants and employees, prompting the landlord to send Clark emails, the last one as recent as February 2020, threatening to evict his family from the building if the behavior reported by Kurkarewicz continued. The threats have been made despite the fact that the landlord could not substantiate any of the fictitious claims concocted by Kurkarewicz. Any possibility for a positive relationship between Clark and the landlord was successfully destroyed by Kurkarewicz. An apartment building employee who acted essentially as Superintendent Kurkarewicz’s executive officer or sidekick in all matters concerning the wrongful treatment of Clark and his family is Arthur Passamonik. By his own admission to Clark indirectly, subtly, yet undoubtedly, Passamonik has had access to a curious set audio and video surveillance tools directed at Clark’s apartment. This access has existed uninterrupted for 4 years. Passamonik finds the fact that he has been presented access to the surveillance tools by the dishonorable individuals responsible for the overall illegal, intrusive, and wrongful surveillance if Clark and his daughter and mother as quite humorous. While Clark made requests for repairs in his apartment, Kurkarewicz ignored his requests and problems in the apartment have been left unrepaired for almost 5 years. It is unclear whether the apartment building landlord is fully aware of the extent of the audio and video surveillance of Clark in the apartment building. (It has been made apparent to Clark that other tenants in the apartment building hostile to Clark, given comments and behavior, such as Leonardo Celestino, have also been provided access to feeds from the audio and video surveillance tools directed at Clark apartment by the dishonorable individuals.)

Lastly, in one of the saddest parts of the whole matter of apartment building staff behavior is that concerning Chris Warsawa, a doorman. Warsawa, as with other members of the apartment building staff became involved with the surveillance of Clark and his family inside the apartment building shortly after their arrival. He was a porter then. Soon after being promoted to doorman by Kurkarewicz, he was fully involved with all aspects of surveillance and harassment activity at the behest of the dishonorable individuals, to include: facilitating the wrongful surveillance actions of tenants; refusing to provide Clark with names of tenants who were rude and discourteous to him as well as his mother and daughter; denying the wrongful behavior of tenants and staff when asked; call Clark ostensibly to discuss his deliveries and mail; and, providing and doing anything else the dishonorable individuals asked him to do against Clark. When he actually witnessed or was made aware of occasions when tenants misbehaved toward Clark he would do nothing but presumably report it to the dishonorable individuals as part his responsibilities to them. On occasion when Clark asked Warsawa the name of another tenants, Warsawa would only say the tenant’s name was “Joel.” Suddenly, everyone was named Joel. Soon enough, Warsawa’s conversations with Clark, although they concerned apartment building business, were being used by the dishonorable individuals to claim Warsawa had established clandestine contact with Clark, an important goal for them. Clark is well-aware that any contacts Warsawa has with him now are transmitted as captured clandestine conversations to the dishonorable individuals much as Lech Stepien had done before Clark began to avoid him completely. As Warsswa is the youngest member of the apartment building staff and seemed initially to be of good nature, Clark tried to convince him to move away from the dishonorable individuals. For months, Clark has sought to explain to Warsawa why the surveillance and all other harassing activity was not only wrong but illegal. All of Clark’s efforts came to no avail. Unbeknownst perhaps to Warsawa, the dishonorable individuals, using surveillance operatives other than apartment building tenants and staff, would let Clark know that they were fully aware of his conversations with Warsawa, having their operatives repeat things Clark said and by taking action on things he said, particularly regarding surveillance activity. The hope of the dishonorable individuals in doing those things was most likely to get Clark to turn against young Warsawa. Of course, destroying positive interactions between people is their forte. Clark understands that for Warsawa, as a young man, gaining approval from so-called experienced men in important and he believes he is doing something important, something special, by committing wrongful acts on behalf of the dishonorable individuals. However, he is only violating Clark’s rights and violating the law by helping the dishonorable individuals. Left with no options, Clark has finally decided to reveal what Warsawa has been doing. Rursus prosperum ac felix scelus virtus vocatur; sontibus parent boni, ius est in armis, opprimit leges timor. (Once again prosperous and successful crime goes by the name of virtue; good men obey the bad, might is right and fear oppresses law.)

Through their abuse of power, the dishonorable federal officials and contractors have successfully torn Clark’s family away from peace and a happy life in what is a democratic society based on a Constitution. It is impossible to believe by any stretch of the imagination that any part of what the dishonorable individuals have done to Clark and his family could be called “professional conduct.” Under the law, the rights of its citizens must be protected. One might hypothesize that for those dishonorable individuals acting against Clark and his family, one is guilty when they say one is guilty. One is not presumed innocent unless proven guilty in a court of law. Be assured that none of what has been presented here is intended to serve as some banal amusement. The situation is real and the facts presented are true and accurate.

If the removal of our essays and reviews has inconvenienced anyone among our loyal readers,greatcharlie offers its sincerest apologies.

Book Review: Raymond Batvinis, Hoover’s Secret War Against Axis Spies: FBI Counterespionage During World War II (University Press of Kansas, 2014)

In 2010, US counterintelligence and counterespionage efforts resulted in the take down of 10 Russian “sleeper agents” from the “S” Department of the Russian Foreign Intelligence Service (SVR). As Raymond Batvinis discusses in Hoover’s Secret War Against Axis Spies, the foundation of present US counterintelligence capabilities was laid 70 years before.

Outstanding spy novels tell exciting tales of spy rings, secret and double agents, surveillance, codes and ciphers, wiretaps, microdots, deception, disinformation, and even use of invisible ink!  That is what a reader would expect from the works of John le Carré, Frederick Forsyth, Robert Ludlum, or Tom Clancy.  In Hoover’s Secret War Against the Axis: FBI Counterespionage During World War II (University Press of Kansas, 2014), Raymond Batvinis recounts equally thrilling stories of international intrigue as the Federal Bureau of Investigation (FBI), working alongside other US government elements and allies, sought to overcome Germany’s efforts to disrupt and defeat its war effort in the US before and during the war.  They will transfix the reader to the book’s pages much as the writings of the great spy novelists.  However, unlike the novelists’ works, Batvinis’ accounts are not amusements, but discussions of real cases of a struggle between adversaries filled with lessons on counter-intelligence (spycatching) as well as counterespionage (turning enemy agents against their spymasters).  The stories present the thought provoking, sometimes absurd, and often horrifying realities of spycatching and turning spies into double-agents. The history is not presented as nostalgia, but as a text on a unique aspect of the intelligence war against Germany, and to a lesser extent, Japan, from which valuable lessons can be drawn.  It is not by chance Batvinis’ book would be presented in this fashion.  The work is a product of painstaking, detail oriented research, and the benefit of his experience as a former FBI special agent.

Indeed, during his 25 years as an FBI special agent, Batvinis focused on counterintelligence and counterespionage cases.  His assignments included work out of the Washington Field Office and the FBI Intelligence Division’s Training Unit at FBI Headquaters.  As a Supervisory Special Agent, in the Baltimore Division, Batvinis managed the espionage investigations of Ronald Pelton (a spy for the Soviet Union), John Walker and Michael Walker (spies for the Soviet Union), Thomas Dolce (a spy for South Africa), and Daniel Richardson (caught attempting to spy for the Soviet Union).  After the al-Qaeda attacks of September 11, 2001, Batvinis came out of retirement and returned to the FBI for three years in order to manage a team of former FBI special agents and Central Intelligence Agency (CIA) case officers who taught the Basic Counterintelligence Course at the FBI Academy.  With a continued desire to contribute to US national security efforts, Batvinis went on to teach a “Lessons Learned” course for counterintelligence personnel at FBI field offices throughout the US for two years.  Exploiting his doctoral studies in American History, Batvinis has lectured at George Washington University and has written several articles on counterintelligence.  Prior to writing Hoover’s Secret War Against Axis Spies, he published The Origins of FBI Counterintelligence (University Press of Kansas, 2007).

Hoover’s Secret War Against Axis Spies was designed to pick up where The Origins of FBI Counterintelligence finished.  Origins was an in-depth look at the FBI’s development in the 1930s from a small law enforcement organization to a counterespionage service.  The need for change was made stark in 1938 with the bungled handling of the long-running investigation of the Guenther Rumrich espionage ring.  A series of missteps allowed dozens of German agents from Abwehr (German military intelligence) to step out of the US and reach Europe safely.  The Interdepartmental Information Conference in 1939 brought all elements of the burgeoning US intelligence community together for the first time, to discuss creating a structure to handle the espionage threat to the US.  Rather than fight like a sack of wildcats, new linkages were created between the FBI and the US military, and partnerships were established with foreign services such as the Royal Canadian Mounted Police as well as Mexican and British intelligence officials.  The FBI’s General Intelligence Division was established to manage foreign counterintelligence and other intelligence investigations.  In 1940, US President Franklin Roosevelt signed a Presidential order allowing FBI director, J. Edgar Hoover, to begin wiretapping embassies and consulates.  The Rumrich failure, the new initiatives, and FBI’s education in managing the intricate details of counterespionage matters resulted in the surprise arrest of 33 German agents in 1941, effectively breaking the back of German military intelligence in the US.

Although the Special Intelligence Service (SIS) of the FBI (whose evolution and expansion into Europe, Latin America and Africa Batvinis discusses), was already engaged in foreign intelligence in the prewar years, in 1941 Roosevelt created a new foreign intelligence office under a Coordinator of Information (COI).  By the end of the year, COI’s director, William Donovan, managed 600 personnel.  Hoover and Donovan had a mutual dislike of each other that was over nearly 20 years old.  Hoover sensed the COI as an effort by Donovan to supplant SIS, and as both viewed the Oval Office as their turf.  Their poor relationship hampered coordination between their services. In 1942, the COI transformed from a civilian agency to a military intelligence service known as the Office of Strategic Services (OSS), the precursor of the Central Intelligence Agency

In extending his discussion beyond The Origins of FBI Counterintelligence , Batvinis relates the story of how William Stephenson of British Security Coordination (BSC), the center of MI6 (British Secret Intelligence Service) operations in the US, ran afoul of Hoover. Hoover railed on Stephenson for what he viewed as BSC’s rumor mongering and mischief.  Without spoiling this amazing segment of the book, it is enough to say MI6 personnel and MI5 (British Security Service) personnel also had a shaky relationship. Hoover skillfully managed to bypass MI6 and its BSC in the US to reach MI5 in London.  As result, the FBI gained access to Ultra, the British code name for its capability to intercept and decipher encoded German communications from the Enigma system.

Batvinis is at his best in Hoover’s Secret War Against Axis Spies in his discussion of the Double Cross System.  Although known historically as a British success during the war, Batvinis explains that achievements through Double Cross were the result of joint Allied efforts.  That includes the handling of the double-agent, Spanish pacifist Juan Pujol—codenamed “Garbo”—who deceived the Germans into believing the Normandy invasion would not occur, and then convinced them that the June 6, 1944 D-Day landings were a mere diversion for a larger invasion soon to come.  Double Cross began to make use of US based turned German agents after the British, with some difficulty, convinced the US there was great value in counterespionage work.  The very persuasive Ewen Montagu, from Bletchley Park, home of the Ultra secret, was brought into the fray to bring Hoover. Hoover and the FBI hoped through counterespionage, further control could be gained over German intelligence activities.

Among the several Double Cross counterespionage cases Batvinis discusses are that of: a flamboyant playboy who was also a central figure in the dispute between Hoover and Stephenson; a world renown French flyer, who had orders to infiltrate the US aircraft industry; and a lecherous Dutchman, who was deemed useless as an agent and whose activities in the US were fabricated for his spymasters while he remained bottled up in London.  Batvinis takes the reader to school, brilliantly teaching about the fundamental nature and “nuts and bolts” of counterintelligence and counterespionage in a manner understandable for both the intelligence and law enforcement professional and the laity right in the midst of his exhilarating storytelling.  To help readers understand the type of enemy the FBI faced, Batvinis explains how Germany acquired the often involuntary service from German expatriates as agents and their very capable and somewhat ingenious handling of them.  In Chapter 11 entitled “The Count from New York,” Batvinis discusses the case of Wilhelm Rautter, a scion of German aristocracy, who was recruited into the German military intelligence without choice, and tacit threat to his well-being and that of his family and property.  As Batvinis magnificently recounts, Rautter, searching for employment, was invited to interview at Remy and Company, by its owner Hans Blum. After a month at the company, during which he established a very cordial relationship with the owner, Rautter was abruptly interrupted in the midst of perfunctory business chatter when Blum said, “German military intelligence had investigated him, found him acceptable, and wished to use him for collecting information in the United States.”  Blum downplayed the request in a friendly, soft-spoken and reassuring, but subtly betraying a sinister, threatening tone indicating that he would not accept “no” for an answer.

Almost immediately, Rautter began training at Blum’s company’s in secret writing, radio construction, transmitting, receiving, coding, and decoding cabled messages using a standard work of fiction.  He was directed to recruit an experienced operator to handle transmissions once he reached New York City.  Rautter was given the address of a mail drop on Manhattan’s Upper Westside, and rented an apartment in Brooklyn near the famous Brooklyn Navy Yard. He was provided a contact, Heinrich Stuhl, whose home, also in Brooklyn, offered easy observation of Brooklyn and Manhattan piers where merchant ships routinely lined up to load cargo bound for Great Britain.  Rautter was given a catalogue of requirements to monitor shipping bound for Europe by riding the Brooklyn-Staten Island ferry.  He would use Blum’s business contacts to travel throughout the East coast of the US, to observe factory facilities of US Steel, Remington Arms Corporation, and twelve leading aircraft companies such as the Douglas and Boeing companies.  He also was directed to pick up intelligence in local bars and restaurants about troop strength, unit designations, military equipment, and specifics on armament production.  To evade capture, Rautter would vary the means of communication with Germany.  The unexpected collapse of the FBI’s capability to intercept radio transmissions also managed to temporarily thwart its counterintelligence effort.  Nevertheless, in 1944, Rautter was identified and waylaid by the US government as the outcome of some incredible investigative work by the FBI, along with the US Customs Service, comparing German handwriting samples with tens of thousands of baggage declarations of travelers going to Europe and British censors on Bermuda, sifting through mail to Europe.

To understand how the FBI handlers engaged in counterespionage operations against Germany, Batvinis illustrated how they concerned themselves with things that the average person might very well assume was minutiae or too esoteric, to matter.  Among the tactics, techniques, and procedures used, the FBI would first closely watch a German agent to determine his susceptibility for neutralization and recruitment before intercepting him.  Particular attention would be placed on his movements and behavior patterns.  The target’s mail and cable traffic would be copied and read, his contacts were identified, and his accommodations would be searched.  Once the turned agent was activated by the FBI, his reports to Germany were designed to match his trained capabilities and the degree of the agent’s access to information.  For example, if stationed in New York City, an agent from the marine branch of German intelligence would be expected to easily identify all types of Allied ships from specific combat vessels to cargo ships and tankers entering and departing the port.  Allowing a turned agent to remain positioned near a port or shipyard might require the FBI to sacrifice too much vital information about US activities, to legitimize his efforts, in exchange for a tentative counterintelligence reward. Moreover, the US Navy would never clear information on the departure of such convoys, and it would be difficult for a double-agent to explain the failure to collect such information to his intelligence principals in Germany.  The counterespionage agent would need to be placed in a plausible new post, such as Washington, which would allow for a mixture of valuable information, rumors, and other pieces of information picked up from soldiers and sailors in local bars and from senior military and military officials on the Washington cocktail party circuit.  A persona had to be established for counterespionage agents that would typically present them as being fiercely loyal and well-placed, making the most of access to important military secrets, but greatly concerned about being discovered by the FBI.  In one case, a counterespionage agent’s persona was spiced up with emphasis on his struggle with communications equipment and transmission problems, coupled with encoding and decoding errors.  When transmitting messages for a turned German agent, a painstaking effort would be put into mimicking his distinctive transmission style through the study of recordings.

In Chapter 13, entitled, “Peasant,” Batvinis explains that one case, to copy the style of a very inexperienced radio operator, his FBI substitute filled his messages with errors common to amateurs.  Further, by using his left hand, with the radio key placed on the edge of a table so that the hand and arm had no support, the technician found that he could easily produce scores of unintentional and intentional errors.  The FBI categorized messages from counterespionage agents to Germany as “A” or “B.” “A” messages held a blend of accurate and fabricated information, created by Joint Security Control (JSC) of the Military Intelligence Division, established in 1941.  JSC had a central deception staff to its portfolio of both the Army and the Navy to plan measures for disguising or concealing an operation against the enemy that would encourage enemy action on a belief that something true was actually false. “B” messages, developed by FBI special agents of the Washington Field Office from open sources were sent in the form of suggested messages with the actual source of information actually identified.  All “A” and “B” messages were first discussed with translators of the FBI’s Cryptanalytic Section, which helped assure that German intelligence service radio operators made no mistake in deciphering the information.  The reader will find many more comparable lessons in Batvinis’ book.

There is some discussion of FBI efforts against Japan.  One segment concerns German efforts to gather and transmit important information on B-29 bomber manufacturing, other war production relevant to the Pacific Theater of Operations, the increase in conscription in the US in 1945, and war plans.  The extent to which the FBI tried put Double Cross measures in play against the Japanese is discussed in Chapter 12 entitled “Japs, Aspirin, and Pep.”  Although Batvinis relays how the FBI had little success in positioning double agents among Japanese targets, he also uses this aspect of the history of US counterintelligence and counterespionage in World War II to explain how best to manage an effort when “That dog don’t hunt.”

Organizing the US counterintelligence effort was not based on a vain desire by the FBI to take on a new capability on top of its well-known criminal investigation work.  There was no other service fully engaged in counterintelligence work, and as the war drew close to the US, it became an absolute necessity.  There was no guarantee of success. The German intelligence service, and the various departments of German military intelligence were up and running full speed with well-trained and very capable agents spreading out worldwide.  Nevertheless, it was anticipated that through the right organization, appropriate preparation, and diligent work, as well as engagement with allies, the effort would be effective and possibilities for success would increase.  The FBI learned quickly that the fight against Germany was not taking place in some “war over yonder” but already underway in US.  Despite the difficulties the FBI had with the OSS, and its counterparts in Britain, those obstacles were overcome, and it was able to protect the US public and US interests from harm.

There is a breath-taking amount of amazing information on counterintelligence and counterespionage to learn from Hoover’s Secret War Against Axis Spies.  There is also much to that can be learned from the history it provides on US relations with Great Britain and other nations on national security issues. Batvinis’ book is also a real page turner, and one that will be difficult to pull away from.  Without reservations, greatcharlie.com provides its highest recommendation to Hoover’s Secret War Against Axis Spies to its readers. They are guaranteed to read at it over and over again.  Given the timeless value of its information, for some practicioners, it may even serve as a reference.  It is a book everyone will appreciate.

By Mark Edmond Clark