Literary Insight: James Risen, The Last Honest Man: The CIA, the FBI, the Mafia, and the Kennedys―and One Senator’s Fight to Save Democracy (Little, Brown and Company, 2023)

Senator Frank Church holding a poison dart gun developed by the US Intelligence Community (left) and Senator John Tower observing (right) at the Church Committee’s first open session on September 17, 1975. In the wake of Watergate, Church was tasked with investigating abuses of power by the US Intelligence Community. Rather than noting mere oversteps by the Intelligence Community, Church and his  Congressional Committee put forth dark truths about its work that they uncovered. Indeed, Church exposed a myriad of clandestine and covert plots orchestrated by the Central Intelligence Agency (CIA), the National Security Agency (NSA) and  the Federal Bureau of Investigation (FBI) as well as other federal organizations. In many cases, singular actions were taken by the Intelligence Community actually amounted to criminal violations of federal law. This essay is not a book review. Instead, it is a literary insight essay providing meditations of Risen’s The Last Honest Man. In this essay, greatcharlie’s insights are delimited to a discussion of occasional rogue behavior, abuses of law, by members of the US Intelligence Community. The book is remarkably suggestive with respect to contemporary times. Such an edict surely requires examination. In this essay, readers may come upon aspects of issues or view new angles of the discussion they may not have not recognized or perhaps would not have considered after reading the book.

James Risen’s The Last Honest Man: The CIA, the FBI, the NSA, the Mafia, and the Kennedys–and One Senator’s Fight to Save Democracy (Little, Brown and Company, 2023), [ISBN-13 9780316565134] tells the story of how Frank Church, at the the time  Senator of Idaho for almost two decades, attempted to reign in US Intelligence Community activities in 1975 after years of no Congressional oversight. Risen draws upon hundreds of interviews, thousands of pages of recently declassified documents, and reams of unpublished letters, notes, and memoirs, some of which remain sensitive today. The story as told in the 480 page tome is true to reality.

As a Senator, Church promoted, advocated, and vigorously defended the US Constitution. He was guided by US values and supported its interests. Church’s beliefs would compel him to lead congressional opposition to the Vietnam War and had become a scathing, radical critic of what he saw as US imperialism around the world. Yet, Risen suggests the “rebellious” Church was politically ambitious, and sough acceptance from the foreign and national security policy establishment of which he was very skeptical. He was also  interested in running for president. The author indicates that Church was not devoid of faults. In the wake of Watergate Church was tasked with investigating abuses of power by the US intelligence community. Rather than noting mere oversteps by the Intelligence Community, Church and his Committee put forth dark truths about its work that they uncovered. Indeed, Church exposed a myriad of clandestine and covert plots orchestrated by the Central Intelligence Agency (CIA), the National Security Agency (NSA) and  the Federal Bureau of Investigation (FBI) as well as other federal organizations. In many cases, singular actions were taken by the Intelligence Community that actually amounted to criminal violations of federal law.

The course taken seemed right to Church as the Committee’s Chairman. One might imagine he understood there was great pitfall involved with criticism the work of Intelligence Community, however, Church never hesitated. By Risen’s account, Church was in fact persistent in his pursuit of the matter. He would show historic strength in his greatest moment. Risen did not indicate that Church had wasted any of the Committee’s valuable time rooting around in extraneous matters. Church stayed focused on his task. 

This essay is not a book review. Instead, it is a literary insight essay providing meditations of Risen’s The Last Honest Man. In brief, a literary insight essay’s purpose is to express a readers feelings and ideas about a literary work. It is a journey of introspection. In this essay, greatcharlie’s insights are delimited to a discussion of occasional rogue behavior, abuses of law, by members of the US Intelligence Community. The book is remarkably suggestive with respect to contemporary times. Such an edict surely requires examination. In this essay, readers may come upon aspects of issues or view new angles of the discussion they may not have not recognized or perhaps would not have considered after reading the book

In previous times, one might have supposed the understanding, acceptance of what Founding Fathers who authored the US Constitution defined as the unalienable rights of life liberty, and the pursuit of happiness were sacrosanct. However, one might be able to comfortably conclude today that far less importance is given to those rights upon which the country’s soul and existence was once firmly based and upon which the US public’s expectation and requirement for the good governance of the democracy has its roots. What seemed so certain about the once lauded strictures–as a sampling, the Bill of Rights, the first 10 amendmens of the US Constitution–that would guide the country perpetually, is far less sure today than ever before. There are laws, but very often justice for the people is much harder to find. Breaches of regulations of the US Intelligence Community against ordinary citizen, not responsible for any wrongdoing, must not only be examined but vigorously pursued. Si quid novisti rectius istis, candidus imperti; si nil, his utere mecum. (if you can better these principles, tell me; if not, join me in following them.)

Meeting of the Members of the Church Committee prior to several hearings in autumn (above). Some Members of Congress in 1975 would likely have been more inclined to be dismissive of an investigation of the Intelligence Community than give serious attention to it. The Intelligence Community’s leadership could only hope that matters concerning its operations would be handled by the Church Committee with the same delicacy. The Congress for years had failed for years to put a leash on the Intelligence Community. Consequently, it ran off on its own in the world. Nothing but the foreign opposition, stood in its way. As for what remotely sufficed for “oversight” before the Church Committee was set up, information on Intelligence Community activities was curiously gleaned from the organizations’ directors by senior Members of both the House and Senate Armed Services Committees. They would meet with the directors to occasionally chin-wag likely on the latest activities, resources, personnel, latest activities, troublesome spots, and accomplishments. In those times, save the Congress and the free press, the US public would be assuredly have been kept in the dark regarding the government’s actions in the province of intelligence. The means today by which the US public is kept equally abreast of the Intelligence Community’s activities as then is not as certain. To that extent, what aided the Church Committee’s cause was the fact that certain elements of the national newsmedia, far less then than today, were nevertheless the best and only fount of information about the US Intelligence Community’s performance.

The Church Committee, known formally as the Senate Select Committee to Study Government Operations with Respect to Intelligence Activities established on January 27, 1975. Open sessions were held in September and October of 1975, but incisive research was conducted throughout that year.  Prior to the Church Committee, there had not been any formal Congressional oversight process for what became the US Intelligence Community for nearly 30 years. The CIA was established in 1947, and the NSA was organized in 1952.The FBI has been around since 1924. The intelligence activities of a White House domestic surveillance program and the Internal Revenue Service were also probed. Following up on information reported in a December 22, 1974 New York Times article authored by investigative journalist Seymour Hersh, there was plenty sitting in the vaults of the Intelligence Communityfor the Committee to investigate. It was not mere tittle-tattle.

Some Members of Congress in 1975 would likely have been more inclined to be dismissive of an investigation of the Intelligence Community than give serious attention to it. The Intelligence Community’s leadership could only hope that matters concerning its operations would be handled by the Church Committee with the same delicacy. The Congress for years had failed for years to put a leash on the Intelligence Community. Consequently, it ran off on its own in the world. Nothing but the foreign opposition, stood in its way. As for what remotely sufficed for “oversight” before the Church Committee was set up, information on Intelligence Community activities was curiously gleaned from the organizations’ directors by senior Members of both the House and Senate Armed Services Committees. They would meet with the directors to occasionally chin-wag likely on the latest activities, resources, personnel, latest activities, troublesome spots, and accomplishments. 

There was a danger that as a result of the Church Committee coming off the heels of the Vietnam War, the violent response to the Civil Rights Movement, the assassinations of Martin Luther King , Jr., Senator Edward Kennedy, and the earlier assassination of US President John Kennedy, Watergate, and the country’s continued disfunction on race, equality for women, and gross inequities in wealth establishing large divisions in social class, enabling poverty. the Intelligence Community would not be used as a depository for the ills of US foreign and national security policy.

Omne ignotem pro magnifico. (Everything unknown is magnificent.) In the old-fashion, out-moded sense, the US public at the time appreciated the services provided by its case officers and special agents, had possessed an sense of obligation to its Intelligence Community. However, ultimately,  the Intelligence Community is beholding to the people who expect and deserve its unwavering fidelity.

When evidence of Intelligence Community wrongdoings and abuses became overwhelming, much changed on all fronts. The US had to confront the truth about itself if it was reach the heart of the matter.The Committee soon discovered that there was no possibility to the limits of the Intelligence Community’s operations. It was clearly capable of any fantastic outrage. There was a certain method to the eccentric madness of the Intelligence Community. What was discovered was all outside of the common. There was no outlier so to speak. Nothing revealed could have dare been called trivial. It was essential for the Church Committee Members to be put in the full picture. A priority appeared to be to gain a sense of the scale of those activities. This matter went much deeper than originally supposed.

It required life experience to understand what might be possible, to explore with an open-mind, all that would likely stand much of what Church Committee Members believed to be known on its head. To accept all that was being exposed in Church’s Committee would require one to possess a mind that could view it all with a mixture of imagination and reality. At the same time, many Church Committee Members and staff served overseas during World War II, as well as in the Korean War and in the Vietnam War were not mystified by any of it. It was about killing, death. Nothing was beyond their comprehension. As with other Committee members, Church examined the Intelligence Community’s activities burdened with a rational frame of mind. There were difficulties, but there would always be difficulties.

True, what was done was done. However, there was the chance to prevent the furtherance of such activities, crimes and halt any additional damage to the reputation and standing of the US worldwide . The US is a constitutional federal republic, meaning its government is based on a Constitution which is the supreme law of the country and both citizens and their governing officials are bound to follow the rules established in that Constitution. The Intelligence Community’s actions overseas over the years fell under the jurisdiction of the countries in which the occurred. However, their actions against US citizens inside the US fell under federal and state law. Remarkably, an extraordinary number of operations conducted by Intelligence Community members and other government organizations against domestic targets were discovered.

In those times, save the Congress, as well as a free press, the US public will be assuredly kept in the dark regarding the government’s actions, particularly in the province of intelligence. The means today by which the US public is kept equally abreast of the Intelligence Community’s activities as then is not as certain. To that extent, what aided the Church Committee’s cause was the fact that certain elements of the national newsmedia, far less then than today, were nevertheless the best and only fount of information about the US Intelligence Community’s performance. At least for a generation or two, not too long afterward, certain services of the Intelligence Community would remain dark organizations in the minds of many conscientious US citizens. There has been nothing of such consequence concerning the Intelligence Community beyond the IranContra Affair in which its activities have been put from and center for the US public. As a news story in present times, Church Committee findings unlikely would be of interest to the overwhelming majority.

William Colby, Director of the CIA from 1973 to 1976 (above). Once the Church Committee came prying, the Intelligence Community’s leadership and even White House under US President Gerald Ford appeared to become unsettled. The Intelligence Community’s leadership knew exactly what had been transpiriing in their organizations over the years. A reasonable assessment, completely unbiased, would be that under the strictures of US law, particularly on the domestic front, much of it was wrongful. To that extent, the Intelligence Community’s leadership, particularly the CIA’s leadership, knew members of the Church Committee would light on them once they had the opportunity to become read in on information available and actiually see and handle some of the recherché tools and gadgets the Intelligence Community had developed. Given how the hearings were organized, Intelligence Community executives and senior managers would have a considerable measure of control over their organizations’ fates and their own careers as would provide testimony as key witnesses before the Church Committee in both open and closed sessions. Whatever the Intelligence Community’s leadership hoped to accomplish, particularly with regard to minimizing the shock to the US public over each fantastic outrage revealed, surely failed if disproving newly hatched fears about the Intelligence Community was one goal, their efforts were not successful. Contrary to whatever public relations benefit the Intelligence Community’s leadership may have been hoping to garner as result of the hearings, the Intelligence Community’s reputation instead was decisively sullied. Yet, years later, it is clear that whatever resulted from the Church Committee Hearings hardly held fast. The way that the US public thought about not only the government and the Intelligence Community and also the ability to hold it accountable, would shift, opening the door to abuses that would have been beyond the Church Committee’s wildest imagining.

Once the Church Committee came prying, the Intelligence Community’s leadership and even White House under US President Gerald Ford appeared to become unsettled. The Intelligence Community’s leadership knew exactly what had been transpiriing in their organizations over the years. A reasonable assessment, completely unbiased, would be that under the strictures of US law, particularly on the domestic front, much of it was wrongful. To that extent, the Intelligence Community’s leadership, particularly the CIA, knew members of the Church Committee would light on them once they had the opportunity to become read in on information available and handle some the recherché tools and gadgets the Intelligence Community had developed.

From their view, circumstances of the time, the Cold War, the Modern Age, surpassed the use of ordinary ways and means to defeat threats and assure policy aims. They expoused that extreme circumstances required extreme action. Much more was constantly being required to meet ends covertly. Despite the rather widespread disapproval of its actions, the Intelligence Community’s leadership never believed the use of “ramped up” tactics, techniques, and procedures was not a crime. Through there use, the Intelligence Community could fight adversaries by means other than war to safeguard US national security.

That explanation–that alibi–would not have a steadying effect on the US public, many of whom had been made quite concerned after learning from news media reporting of the open sessions of the Church Committee how the government, honorable and powerful, had been behaving in their name. Again, there was mostly disappointment among the people. A fearful mood had gripped some. If it were only a smattering of odd incidents, any audacious thinking and action perhaps might have seemed slightly tolerable. That by no means was the case. 

The Church Committee Hearings were a moment at time in which the Intelligence Community’s leadership would been behooved to guard against self-deception and delusion to avoid becoming too far a field. However, their conviction over everything the Intelligence Community did, however, was so unwavering that one might imagine a private response among some executives and senior managers was ironically to question the loyalty of Church Committee members. The pretense within the Intelligence Community’s leadsrship was that their organizations were “something above”,” something better”, than the rest of society and thereby they were entitled to do things outside US values,  principles, and laws.

Given how hearings were organized, Intelligence Community executives and senior managers would have a considerable measure of control over their organizations’ fates and their own careers as they would provide testimony as key witnesses before the Church Committee in both open and closed sessions.

If the Intelligence Community’s leadership had any thoughts of avoiding hearings, the Church Committee would brook no denial. Forced to go through the investigative process, they might have left the door open in their minds to the hope that the Church Committee’s findings would allow for the suggestion of a rationale for the behavior of their personnel and all the transpired over the years. They might have hoped to hear a plausible explanation that would circle around notions of the ubiquitous and ceaseless Communist threat posed by the Soviet Union, the Eastern Bloc countries,, and the People’s Republic of China to the US, its allies and friends, and other democracies worldwide.

A figurative pirate’s chest of the strange, unusual technologies and maccabre tactics, techniques procedures, and methods was unlocked and opened wide. It was trove of horrors. To the overwhelming majority of US citizens who gave their attention to the Church Committee hearings, all that was discovered felt, to turn a phrase of the era, very un-American. Risen describes Church Committee revelations on assassinations targeted at Cuban President Fidel Castro in Cuba, Congolese President Patrice Lumumba, and South Vietnamese President Ngo Dinh Diem. There were others. He reports on the CIA’s MKULTRA program.and the use of LSD. and it’s domestic surveillance program, HTLINGUAL. He tells the shocking story of the FBI’s surveillance and harassment of Martin Luther King, Jr. and other US activists under COINTELPRO operations. The CIA contacted an organized crime figure, Johnny Roselli, to act as an intermediary to elicit the assistance of  Chicago organized crime boss Sam Giancana, to coordinate CIA efforts to assassinate Fidel Castro with the Mafia. This list barely scratches the surface. 

There was a sense of revulsion among Committee members and staff. Each Committee Member may have felt something private, very intense, very off putting  about matter. Some might say that many of Intelligence Community lurid activities reflected a loathing of the human race. Seemingly, it was the organization’s preferred way to have others to perceive it. The Church Committee did not really warm to any of those who testified. The Intelligence Community’s leadsrship was not always well-collected while offering testimony. Still, among those Church Committee Members who may have felt disgust over the deeds of the Intelligence Community they had funded generously, there was no intention of allowing anger and grief conspire to create a blindness that might interfere with their vital work.

Whatever the Intelligence Community’s leadership hoped to accomplish, particularly minimizing the shock to the US public over each fantastic outrage, surely failed. If mitigating newly hatched fears about the Intelligence Community was one goal, their efforts were not successful. Contrary to whatever public relations benefit the Intelligence Community’s leadership may have been hoping to garner as result of the hearings, the Intelligence Community’s reputation instead was decisively sullied. Yet, years later, it is clear that whatever resulted from the Church Committee hearings hardly held fast.. The way that the US public thought about not only the government and the Intelligence Community and also the ability to hold it accountable, would shift, opening the door to abuses that would have been beyond the Church Committee’s wildest imagining.

Surely, nothing uncovered by the Church Committee was lost upon the Intelligence Community’s opponents overseas. Their opponents overseas were tough and numerous. However, it seems elements of the US Intelligence Community thought of themselves as being tougher, and sought to be rougher still. It is doubtful that the Soviet Union, the Eastern Bloc countries, and the People’s Republic of China saw or heard anything too shocking or surprising. The Church Committee’s findings were unlikely music to their ears regarding the international front. Clearly, the US was active clandestinely and covertly overseas in a big way. On the domestic front in the US, however, the situation was likely viewed as much better by adversarial foreign intelligence services. News of the Intelligence Community’s history of operations against political targets very likely indicated to the Intelligence Community’s opponents that it was flush with so much cash that it could divert resources and manpower to those efforts. 

Although it was not broached in Risen’s book, those political diversions may have provided enough reason for their foreign intelligence services to sense they were often operating with impunity in the US. Resources and manpower were not just diverted to that mission, but dedicated to it through multiple programs. Conceivably, that may have encouraged the Soviet Union,  Eastern Bloc countries, and the People’s Republic of China to increase their presence and efforts in the US. The Soviet spymaster of Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, Oleg Kalugin, indicates in his memoirs that the 1960s and 1970s were heady, fruitful times for Soviet and Eastern Bloc intelligence operations inside the US. (SEE greatcharlie’s April 30, 2020 post entitled, “Book Review: Oleg Kalugin, The First Directorate: My 32 Years in Intelligence and Espionage against the West (St. Martin’s Press, 1994)”) It would have been almost impossible for the Intelligence Community to know the totality of what foreign intelligence services might have been successfully collecting at the time until new political, economic, or financial information allowed some unexplained upper hand or scientific or technological advances would crop up that evinced tell-tales of its origins and that it had been stolen.

Risen explains Church worked after the Committee Hearings to establish Intelligence Community oversight. Steps included the development of the Foreign intelligence Surveillance Act (FISA) of 1978 and creation of the Senate Select Committee on Intelligence on May 19, 1976 and the House Permanent Select Committee on Intelligence on July 24, 1977.

James Angleton, Chief of CIA Counterintelligence from 1954 to 1975, at the Church Committee Hearings. A figurative box of the strange, unusual technologies and maccabre tactics, techniques procedures, and methods was unlocked and opened wide. It was trove of horrors. To the overwhelming majority of US citizens who gave their attention to the Church Committee hearings, all that was discovered felt, to turn a phrase of the era, very un-American. Risen describes Church Committee revelations on assassinations targeted at Cuban President Fidel Castro in Cuba, Congolese President Patrice Lumumba, and South Vietnamese President Ngo Dinh Diem. There were others. He reports on the CIA’s MKULTRA program.and the use of LSD. He tells the shocking story of the FBI’s surveillance and harassment of Martin Luther King, Jr. and other US activists under COINTELPRO operations. The CIA contacted an organized crime figure, Johnny Roselli, to act as an intermediary to elicit the assistance of  Chicago organized crime boss Sam Giancana, to coordinate CIA efforts to assassinate Fidel Castro with the Mafia. This list barely scratches the surface. During his testimony at the Church Committee, Angleton was pressed on the CIA’s domestic surveillance program, HTLINGUAL. It was sensed at the time that Angleton had not been completely forthcoming with Committee Members.

Without pretension, what greatcharlie relates in the following discussion is completely true and accurate to the best of its knowledge and belief. The information is simply laid out. There is no insistence that readers accept it. It is what it is.

After the September 11, 2001 terrorist attacks on the US, practically all curbs of the psyche and actual policy and legal parameters against abuses were not observed to the letter–somewhat overlooked–by the Intelligence Community in favor of a “go get ’em” attitude and offensive posture against “the enemy”. The priority became getting results: killing and capturing terrorists; uncovering and thwarting terrorist plots; destroying terrorist networks; and, seizing terrorist assets. The practice nearly became “anything goes.” The mainstream newsmedia in the US was supportive of just about everything done and a very vocal US public demanded further retribution. The emotional response of the US public was certainly understandable, however, most were abysmally ignorant of the Intelligence Community’s activities were overseas, literally on the high seas, and domestically. Among US public there are those who, even after being introduced to actualities, are unable to would hardly shake their views how their government can often operate. Today, only a fraction might take a firm interest in the misdeeds, violations of rights under the Constitution, or even larceny and outright violent crimes committed by the Intelligence Community.  It is likely the case for members of the US public that as long as the Intelligence Community’s actions do not directly effect them or their own, there is little to be concerned about. To go a step further, some members of the US public may not be willing to accept that rogue elements of the Intelligence Community and their contractors would engage in surveillance and direct acts against innocent US citizens. Nevertheless, it happens, as Risen’s book makes it very clear. 

The Global War on Terror has not ended. However, US President Joe Biden has reorganized resources and manpower in the over two decades long ubiquitous fight. Fewer airstrikes are ordered in fewer countries. US counterterrorism forces appear to be operating overseas in lesser numbers. The tempo of their operations has decreased. One would expect those decisions and others have had a correlative impact of ratcheting down the Intelligence Community’s use of resources and manpower. Looking a bit further on its tasks, no greater evidence of the Russian Federation’s potential for military aggression exists at the present than the Ukraine War. Yet, relative threats posed by the Russian Federation to the US and its interests has lessened. The degree of inefficiency and albeit incompetence that has been displayed by the Russian Federation Armed Forces and the intelligence services in the prosecution of operations of or pertaining to the Special Military Operation that the Cold War fears of the untamable and indomitable “”Russian Military Bear” has since faded at bit.. However, concerning the People’s Republic of China, however, its intelligence services have displayed an acumen in their espionage activities within the US that has been seemingly beyond the capacity of US counterintelligence services to combat. US foreign intelligence operations in the People’s Republic of China also have not met with great success. In the aggregate, the People’s Republic of China has delivered wrenching blows against the US. 

The point here is that with relatively reduced threats against some opponents and barely a modicum of success against espionage directed from the People’s Republic of China foreign intelligence services in the US, some unscrupulous individuals in the organizations of the Intelligence Community may feel a “greater flexibility to do other things” undistracted by real work upon which they could fully focus their minds and hone their “skills”. Thereby, in an odd and unhealthy, and criminal twist, they appear to have shamefully preyed upon the average US public. Rogue members of these organizations–and there always have been a few– have engaged have engaged in this behavior for years, but happens not with similar frequency. They generally engage in their wrongful acts well-below the radar.  It is awful to accept that a few personnel of the US counterintelligence services, including not so trustworthy contractors they call upon, to knowingly use the exquisite technical resources of the US and tactics, techniques procedures and methods to crush ordinary citizens who have no interest in doing anything against the US. (On this matter, greatcharlie writes not from study, but rather from personal experience as an innocent target of such wrongful and incredibly costly activities.)

The rogue federal officers and contractors have their own reasons for turning to villainy and own reasons for selecting their victims. The victims names may have been found on some innocuous list within the rogue federal officers organizations. Through wrongdoing, the names are apparently transferred to an active list of targets for the rogue federal officers and contractors to prey upon. Rogue federal officers and contractors will claim to have legitimate cause for their actions them. Warrants from “helpful” judges presiding on the Foreign Intelligence Surveillance Court (FISC) will be provided based on those claims, allowing electronic surveillance,  physical search, and other forms of investigative actions for foreign intelligence purposes. (The FISC was established by Congress in the aforementioned FISA.) More importantly, the warrants will allow the rogue federal officers and contractors to increase available financial resources for activities against their innocent victims. 

Needless to say, cellphone calls, texts, emails of victims are monitored. Letters and other missives are intercepted, extracted from, and occasionally inserted into, the victims mail deliveries. Electronic devices to monitor the victims in their own homes are used. Cable television and high speed internet services are weaponized for use as monitoring equipment. The technologies may have changed, but this practice of monitoring resembles that used against Martin Luther King, Jr. when he was, as noted earlier, the target of a federal surveillance and “dirty tricks” program. Yet, far much more, not relayed here, is done along this track. The individual’s personal life, finances, property, could are targeted. Doors will be closed to employment, association with social and professional groups, membership in organizations. Recognition and awards for achievement and excellent will be denied. Family members and friends will also face attacks designed to separate them from the individual or destroy them. Every effort will be made to shun the victim from society.

To gnaw a bit further on the surveillance of a victim, as a standard practice that task is performed through the use of manpower on the street. The personnel of a contractors are used mostly for this purpose. Some are employeed to engage in electronic surveillance.  To use manpower on the street in a very robust way, contractors, albeit errantly, will hire ordinary individuals from the US public to assist them. Greater budgets allowed once FISC warrants are secured mean bigger operations.  That permits exigent hires  For rogue federal officers and contractors greater budgets through innovative ways mean greater wrongful operations,, but also the potential for increased financial gains for them. (In the past, waggish federal officers were sometimes heard to jest that such improper efforts perfectly allowed for the creation of a “second retirement” much better than the one their organizations were going to provide.) C’est comme ça.

It is rarely difficult to find exigent hires willing for usually modest, but sometimes exhorbitant payment–bribes–to zealously engage in surveillance activities and aggressive, even criminal acts at the behest of rogue federal officers and contractors. Most of the exigent hires only understand “spy work” through Hollywood depictions and exciting novels. Most are thrilled to live out “Walter Mitty” fantasies of being a spy as they disrespect, betray and bully the innocent! The ranks of citizen hires are inflated by the exigent employ of permanent and temporary residents, visitors, tourists, and undocumented immigrants as well. The visitor to the US will receive an unforgettable lesson on the meaning and nature of civil rights in the country courtesy of the rogue federal officers and contractors. Whether a citizen or visitor, the hires receive remuneration. Exigent hires are compensated immediately for their wrongful service. The payments are in essence bribes to encourage and to reward their violation of the law. If prospective hires take the unusual step of asking why such surveillance of the victim is necessary, the rogue federal officers and contractors will offer an apocryphal story that may shock, anger, or outrage the prospect concerning the victim, tell outright, ghastly lies about the victim’s character, or conversely set aside any wrongdoing or any threat posed by the victim and convince the hire that anything done will be to the victims benefit! Intriguingly, the latter actually works exceedingly well.

Exigent hires will invariably  approach the surveillance of their innocent victim using the limits of their varied faculties. The results can be atrocious, shocking, and sometimes silly. Exigent hires can often be seen hiding behind pillars, jumping behind cars, and hiding their faces with their hands among a few things. As the vetting of hires is nonexistent, the dysregulated are often employed and they will often vent rage directly at the victim over false reports about them from rogue federal officers and contractors to relieve unbalanced levels of stress and frustration. Occasionally, participation is shamefully impelled not only by remuneration, but by racial, ethnic, religious, and gender prejudice. Those hires will indubitably make their offensive perspectives known to victims when walking by them or loitering near them. Evidence of how they manage racist and otherwise biased hires may offer an indication of whether the rogue federal officers and contractors harbor similar prejudices toward a victim. They can often develop a kinship with such odious individuals. On the odd occasion, one might unexpectedly observe the rogue federal officers and contractors communicating with them in plainview! Those hires surely receive opportunities for contracts and more chances to abuse a victim for payments. There is often a sense great importance and power that conspiring with “secret men” and “secret women” conveys to most hires, this can expectedly lead to hostility, aggression, and violence against an innocent victim.

Since none of the hires employed under these circumstances are not acting against actual officers or operatives of a foreign intelligence service or some other dangerous group, these exigent hires can act with relative impunity against victim. A victim’s response to the hires transgressions must not include acting physically. The rogue federal officers and contractors will use their standing and FISC warrants to ensure local law enforcement will arrest a victim and “friendly” prosecutors will secure fines or sentences against them. Such occurances have indeed been tragedies. Yet, the activities of the rogue federal officers and contractors will not stop even after causing that degree of harm. On s’en fout!

The exigent hiring of “operatives” by rogue federal officers and contractors is not always unsystematic. Some hires are offered contracts to encourage regular service against innocent victims. Often, contract hires are asked rogue federal officers and contractors to log their observations of victims via text or group chat. They often provide the information on what the victim is wearing, the number of the taxi in which the victim is riding, the direction the victim is walking or the activity in which the victim is engaged. (Interestingly, rogue federal officers and contractors always inform their hires of their victims whereabouts, yet they will often insist their hires log their “observations” of the victim by text or group chat. Other than creating activity for the hires, that work amounts to kabuki, hardly serving a useful purpose day-to-day when the rogue federal officers and contractors are watching the victim themselves. Maybe it is more a matter of keeping up appearances.

Some exigent hires are sought out because they are in a position to have opportunities for more than occasional contact with a victim. These “key hires” will,typically be associated with the victim’s personal and professional life, and the victim’s simple daily activities. A short list of such hires would typically include: neighbors; apartment building staff; contractors; locksmiths, municipal civil service workers of all types to include the police and emergency services technicians; dog walkers; taxi cab drivers; car service drivers; barbers; hairstylists; restaurant staff; pizza shop employees; coffee shop staff; street food vendors; conveniance store clerks; department store employees; luxury watch store employees;  supermarket employees; car garage attendants; storage company employees; moving company employees; realty agency staff; funeral directors, movie theater staff, museum staff; performing arts center staff; elementary and secondary school staff; parents of elementary and secondary school students; elementary and secondary school students; visiting professors at nearby universities; sports book authors; content management system employees; bank branch employees; accountants; tax preparers; paralegals; lawyers; medical office administrative staff and technicians; physical therapists; doctors; court house staff; and, judges. (The actions of judges co-opted by the rogue federal offcers and contractors in an US court proceeding against a victim are typically so remarkably corrupt that greatcharlie assures they must be seen to be believed.) It is fascinating to observe just how many individuals are typically made privy to the rogue federal officers and contractors “secret operations” against innocent victims.

Through contact with such key hires, the rogue federal officers and contractors aditionally hope to receive information about the victim through “clandestine conversation”. Usually, they will insist these hires ask victims specific questions about themselves which is most often incongruous with the natter in which they might be normally engaged. The activities of those key hires, along with other hires who have contracts, are controlled through cellphone calls, direct texting, and group chat. Group chat is at the present the most unified way for the rogue federal officers and contractors to assemble and mass their hires to act upon a victim collectively. Essentially, hires are organized for “gang stalking” and out-and-out harassment–bullying. These hires are compensated usually at central locations in the vicinity of their activity: a parked car or a coffee shop.

Interestingly, with warrants from the FISC in hand, rogue federal officers and contractors can also make use of programs created for use by employees of specific service industries to surveil and act against targets of investigations. In New York City for example, a clandestine program–so called a covert program by officials–was developed by federal and local law enforcement and US intelligence services to use taxi cab and car service drivers to surveil and photograph targets when they are on the street and to engage them in clandestine conversations as passengers with the aim of “surreptitiously interrogating” them or passing disinformation to them. Remember, the victims are absolutely innocent, have no special information offer. So, insisting the taxi drivers engage in such a practice, certainly not as training, along with simply using the shed light upon the mental state of the rogue federal officers and contractors. Maybe it is again a matter of keeping up appearances. It is as plain as a pikestaff that the taxi and car service drivers are impelled by pecuniary interest and ego, certainly not intellect. Clearly, most of the drivers take on their “secret work” having received insubstantial educations overseas, possessing a limited vocabulary as English is usually a second language for them, being devoid of sophisticated conversational skills–being tactless, and not knowing what it means to be congenial. One can imagine how awkward, clumsy, and better than annoying their efforts at “clandestine conversations” usually are. Ironically, the drivers must rely upon the politeness and tolerance of the victim to perform their “clandestine” work while lacking any compunction over deceiving a victim or potentially causing them harm.

It might be worth noting that warrants from FISC also allows for the rogue federal officers and contractors to cooperate with members of foreign intelligence and security services of US allies stationed in the US. The officers of some foreign intelligence and security services will make their presence known to victims by behaving overly aggressively, with hostility, and even a threatening them. Indeed, they take on this barbaric posture even against US citizens living in their own country. Officers of somewhat more sophisticated foreign intelligence and security services may make it a point to have an attenuated presence. However, they may deliberately make themselves known if they have been tasked to ask questions of–softly interrogate–the target. Interestingly, that task invariably falls to female officers of the foreign intelligence and security services who, with male colleagues close by, will “noticeably” spend an ordinate amount of time studying the victim before moving in. Such activities fall under the category of transnational repression and are illegal. Foreign intelligence and security services of US allies are surely pleased to receive financial resources from their US counterparts for their cooperation. Warrants from FISC open the financial spigot for such funding. However, what is imaginably most important for the foreign intelligence and security services of US allies who might participate in such activities at the victim’s expense is finding a place for themselves at the “high intelligence roundtable” with the powerful US. Once again, rogue federal officers and contractors more than likely trigger this activity by foreign intelligence and security services stationed inside the US as a matter of keeping up appearances.

Attempts to co-opt a victim’s immediate family members and other relatives are also made by rogue federal officers and contractors. If successful, they will usually forever destroy the victim’s immediate family unit and separate the victim permanently from other relatives. 

The definition of success among the Ancient Greeks was the full use of one’s powers along the lines of excellence. At a minimum, success for the rogue federal officers and contractors against their victims clearly has meant stripping them of anything resembling an ordinary life, completely restricting their liberties in a normal sense by standing between the victims contacts with others, and interfering with any effort to pursue happiness. The whole wrongful process can go on for years or at least as long as the victim lasts. Yet, very often the outcome desired by the rogue federal officers and contractors is far more sinister. The “stress response”, the flight or fight system, is triggered when mind and body are out of balance. When mind and body are out of balance, in stress mode, one is headed for health problems, disease, or breakdown. No organism can stand being in emergency mode all the time. The infliction of daily episodes of gang stalking and harassment can elicit heart disease, heart failure, and psychological disorders. Cases of suicide can also stem from a victims in ability to cope with strains too strong and too alien for “normal living” in an advanced industrial democratic society to countenance. Mere empirical observations of rogue federal officers and contractors actions and the results inflicted upon victims should reasonably assure one that there is not a shred of decency among them. Far more perverse actions are taken against victims. Plainly, the rogue federal officers and contractors have even acted in a variety of ways to cause a victim’s death.

As mentioned, the exigent hires and contract hires of the rogue federal officers and contractors are generally more concerned with how much money they will receive. Typically, hires will hardly notice, or even look to see on their own volition, if the victim were suffering physically or psychologically in some discernible way. As a combination of the hires’ “low-vibrational” character and their receipt of regular abhorrent reports from the rogue federal officers and contractors about the victim usually meant to infuriate their hires or even amuse them, there is generally no empathy shown by hires for the victim. The victim is not recognized as a human being. The victim is seen only as a commodity. Noticeably, hires are quite deliberately directed and bound as a collective through a form of mind control. From the prostitute and drug peddler to the doctor and state court judge, the rogue federal offcers and contractors get their hires to do exactly what they want them to do. The reality is there is no professional side to involving US citizens and so many others in the wrongful–illegal–surveillance and possibly the criminal homicide of anyone, especially an innocent victim. In their own criminal way, the rogue federal officers and contractors are destroying the fabric of the society.

Victims of rogue federal officers and contractors have no voice. The few who would make reports of their maltreatment and entreaties for justice are stifled by the corrupt. Through the use of their standing with law enforcement and judicial systems, FISC warrants, and long exercised technical ways to block a victim’s communications, it is assured that the victim’s pleas will go unheard. Many victims are so despaired by trying and failing to successfully report their mistreatment and circumstances surrounding it that they are led to either very quietly or very publicly self-destruct.

As suggested earlier, it is easy enough for those in the US public who cannot accept corruption and murderous criminality on such great scale among corrupt members of the US security services and their contractors and some will surely to find comforting ways to dismiss it or outrightly rebuke it. Yet, those who would accept this reality may be unwilling to speak against it. The number of other government officials in the organizations who may discover others acting corruptly and may wish to report or to investigate such criminality would be few as the consequences of their detection might be retribution in the form of daily attacks on the job equal or worse than those suffered by the innocent victims.

Leaders of organizations can be changed in response to revelations of wrongdoing at the senior level and within the rank and file. However, a subsequent change in leadership to that could lead to the rejuvenation of such vengeful, aggressive thinking and actions against the previously targeted inedividual found guiltless, incident free will be ordered. The individual’s personal life, finances, property, could once again be targeted. Doors will be closed once again to employment, association with social and professional groups, membership in organizations. Recognition and awards for achievement and excellent once again will be denied. Family members and friends not co-opted by the rogue federal officers and contractors once again will face attacks designed to separate them from the individual or destroy them without fail. Victims will once again be shunned by the society. During the new episode, the most devastating psychological and physiological attacks upon the individuals–by then a few years older and likely less interested in struggling against a tide a wrongdoing–would be launched by authorities with far greater intensity, to achieve their destruction or even deaths through suicide or violence so dearly wanted by others through the original effort. Ironically, the rogue federal officers and contractors who assisted in organizing and managing the individual’s destruction originally, will very likely have retired from their federal security service by then to enjoy the fruits of their wrongdoing. However, others would doubtlessly rush forward to take their place. Où va-t-on à partir de maintenant?

This is in some small part the actual state of affairs for many victims of rogue federal officers and contractors at the moment. It is a whole world invisible to the ordinary citizen. As explained earlier, there is no insistence that anything discussed here be accepted by readers who are unfaniliar with it all. Nevertheless, everything presented is true and can be easily substantiated with the cooperation of honest and thoughtful law enforcement officials. (Note: All that is discussed concerning the mistreatment of citizens by rogue federal officers and contractors is based on the author’s personal experience!) One might suppose that for those who may be interested in how surveillance is conducted on the street level in the US, this discussion may prove instructive. It is unlikely lost upon readers that “one” who might desire to penetrate domestic surveillance activities in the US, not too much would be involved with becoming a “contract hire”. Once onboard as a hire, one would potentially have access to details about the daily surveillance activities of some US intelligence service or law enforcement organization, such as what organization was currently tasked with, who exactly is being targeted, where the target is acting, and who the organization’s street “operatives” are. What could be accomplished by “one”, one in a hypothetical case being a foreign intelligence officer or a team of officers and operatives tasked with the mission of infiltrating surveillance activities of a US intelligence service or law enforcement organization, must be left to the imagination. 

One possibility might be the regular successful “collection” of vital information to protect their country’s foreign intelligence operations inside the US. One can only guess how difficult it would be to launch successful counterintelligence operations against a wily foreign intelligence sserviceoperating inside the US when it knows everyday where its opponent’s officers and operatives are and who and what they are looking at. Perhaps something of the kind is already happening on some scaleg. For that reason, for more than a theory, on-going surveillance operations as discussed here, either sanctioned by authorities or wrongful conducted by the rogue federal officers and contractors, should be immediately rolled up, audited, and assayed. Perhaps doing any of that would be too bothersome. (Curiously, the average individual in the US public may not accept that such wrongful behavior by rogue federal officers and contractors occurs, however foreign intelligence services surely have no doubts about what transpires.) Born Jacques Anatole François Thibault, known as Anatole France (April 16, 1844-October 12, 1924) was a French poet, journalist, and novelist. Considered in his day as the ideal French man of letters. He was awarded the 1921 Nobel Prize in Literature in recognition of his literary achievements. In Le Petit Pierre (1918), ch. XXXIII, he wrote: “De toutes les définitions de l’homme, la plus mauvaise me paraît celle qui en fait un animal raisonnable.” (Of all the ways of defining man, the worst is the one which makes him out to be a rational animal.)

Martin Luther King, Jr. (above). When King was the victim of FBI’s surveillance and harassment under its COINTELPRO operations, he had committed any federal crimes and was not a threat to US national security. He was an innocent US citizen. To that extent, actions taken against him by Intelligence Community organizations once uncovered by the Church Committee were shocking and surprising. In previous times, one might have supposed the understanding, acceptance of what Founding Father’s who authored the US Constitution defined as the unalienable rights of life liberty, and the pursuit of happiness were sacrosanct. However, one might be able to comfortably conclude today that far less importance is given to those rights upon which the country’s soul and existence was once firmly rooted and upon which the US public’s expectation and requirement for the good governance of the democracy has its foundation. What seemed so certain about the once lauded strictures–as a sampling, the Bill of Rights, the first 10 amendmens of the US Constitution–that would guide the country perpetually, is far less sure today. There are laws, but very often justice for the people is much harder to find. Breaches of regulations of the US Intelligence Community against ordinary citizen, not responsible for any wrongdoing, must not only be examined but vigorously pursued.

Seared in the minds of the authors of the US Constitution, the Founding Fathers, were the extraordinary sacrifices made by thousands of Colonists before and during the Revolution. Attendant to that were acts of tyranny leveled upon colonists by authorities in the Kingdom of Great Britain. There was usually much suffering dealt by the British Army to the rebellious in territory controlled by the British Empire. Methods used by the professionals of the British Army for the purpose of assuring the Kingdom’s grip on the Empire’s many lands overseas were tried and true. Given the that, the victory of the American Colonists, with assistance from France, was spectacular and almost supernatural. The tyranny resulting from the imposition of coercive power by the Kingdom of Great Britain was a manifestation of what was intrinsic in mankind: the desire to control others for self-interest. The despotic intrusion of ones will upon another compelled in some. The Bill of Rights, the initial 10 Amendments of the US Constitution are in part responses of the Founding Fathers. to egregious injustices under which Colonists suffered much of which was intended to break any sense of unity among them.

It is greatcharlie’s firm belief that few in the US public–indeed, relative to the size of the population and to include officers of the court–are aware of the contents of the Bill of Rights and their meaning. There is the real possibility that many in the US may have no interest at all in the matter. Rather than simply utter the term, Bill of Rights, which for many may amount to empty words, greatcharlie offers the concisely authored first 10 amendments of the Constitution passed by Congress on September 25, 1789 and ratified on December 15, 1791.

The First Amendment states: “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press, or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”

The Second Amendment states: “A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.”

The Third Amendment states: “No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law.”

The Fourth Amendment states: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

The Fifth Amendment states: “No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb, nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.”

The Sixth Amendment states: “In all criminal prosecutions, the accused shall enjoy the right to a speedy and public trial, by an impartial jury of the State and district wherein the crime shall have been committed; which district shall have been previously ascertained by law, and to be informed of the nature and cause of the accusation; to be confronted with the witnesses against him; to have compulsory process for obtaining witnesses in his favor, and to have the assistance of counsel for his defense.”

The Seventh Amendment states: “In Suits at common law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved, and no fact tried by a jury shall be otherwise re-examined in any Court of the United States, than according to the rules of the common law.”

The Eighth Amendment states: “Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted.”

The Ninth Amendment states: “The enumeration in the Constitution of certain rights shall not be construed ttho deny or disparage others retained by the people.”

The Tenth Amendment states: “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.”

It must be noted that under the Fourteenth Amendment, which concerns civil rights–as well as Senators, Representatives, and the public debt, citizens in the US, born or naturalized, and other individuals living in the US are entitled to equal protection under the law of the US and the State in which they reside and no person shall be. deprived life, liberty, or property, without due process of law under either jurisdiction.

Two centuries after the Bill of Rights were ratified, power can still corrupt. In the country the Founding Fathers constructed, led by a government formed of the people, for the people, and by the people, the aforementioned intrinsic negative impulses in mankind could nevertheless manifest within those who were members of the citizenry themselves. Despite swearing to an oath to support, protect, and defend the US Constitution and the solemn compact between government and the people, various episodes of corruption have taken their place in the country’s history.

Sojourner Truth was a 19th century African-American abolitionist and activist for civil rights, women’s rights, and alcohol temperance. Truth was born into slavery in Swartekill, New York, but escaped with her infant daughter to freedom in 1826. Sojourner Truth is known for saying “The truth is powerful and will prevail.” The truth will “prevail.” That is as may be. However, without some preconcerted, energetic effort to make certain the truth is heard, understood, and accepted by all who are reasonable and rational, it will unlikely have an impression and be unappreciated. Only a precious few open-minded individuals, following the law and holding firm to their beliefs, spiritual or philosophical, will hold firm to the truth.

Reportedly, the writer, professor, political activist, Nobel laureate, and Holocaust survivor, Eli Weisel, once explained God created man because He loves stories: Weisel would cite the Chasidic tale of the Baal Shem Tov. Accordingly, when misfortune threatened his community, Tov would venture into a certain part of the forest to meditate. There he would light a fire and say a special prayer. In consequence, misfortune would be averted miraculously. During a later time of peril, a despondent Rabbi Israel of Rizhyn addressed God as follows: “I am unable to light the fire. I do not know the prayer; I cannot even find the place in the forest. All I can do is to tell the story: this must be sufficient.” It did suffice, and God saved His People. Dum spiro spero. (While I breathe, I hope.)

By Mark Edmond Clark

The Defection That Never Was: Meditations on the Dong Jingwei Defection Hoax

People’s Republic of China Vice Minister of State Security Dong Jingwei (above). Beginning in February 2021, Dong became the subject of a rumor alleging that he, along with his daughter, defected to the US. The possible implications of his supposed defection were staggering. It was eventually revealed and proved that the rumor was pure fiction.  Never before has Dong’s name, or any other Chinese counterintelligence official’s name, been bandied about in the US newsmedia or worldwide in the manner it has been lately. An attempt is made by greatcharlie to some degree how this all came about and what was the purpose of it all.

Rumors of the alleged defection of Dong Jingwei, a vice minister of the People’s Republic of China Ministry of State Security–China’s relative equivalent to the Central Intelligence Agency, were the subject of intense discussion in the US newsmedia and social media particularly in June 2021. Allegedly, Dong fled China in February 2021 and handed himself over to US intelligence officials. Dong would have been one of the highest-ranking officers from China’s Intelligence Community, and the Chinese government in general ever to defect to the US. Yet, alas, the rumored defection never occurred.

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping, is now highly selective, positively picky, about those who serve in national security positions in his government. Considering what would be the most likely nature of the man or woman who would be able to serve as his Vice Minister at MSS for counterintelligence, it is hard to form a mental picture of where the rumor that Dong had defected to the US with his daughter, or who, or better, what organization, may have actually given it wings. It is harder to understand how those who ignited the rumor of Dong’s defection intended to benefit from its formulation and promotion. It is hardest to envision who among those with any knowledge of the Chinese government and the national security apparatus would believe, would ever consider defecting to the US no matter what the circumstances may be within the Communist Party of China or in his personal life. One could imagine Dong would be a deadender, sticking with the Party and his country until the rattle. There is always the possibility–though there are absolutely zero newsmedia reports anywhere that suggested some proceeding mental health episode had befallen him–that Dong may have been overwhelmed by some cacoethes. Barring that, there was no earthly reason to believe that he would defect, and to the US nonetheless. The puzzle now having been “resolved”–the whole truth is out there somewhere, greatcharlie gives a go at parsing out some of these issues hoping it does not come off as l’esprit de l’escalier. In that process, greatcharlie, albeit, steps out on shaky ground to present some unsolicited–and hopefully not unwanted–suggestions on how similar false reports in the future might be given appropriate consideration. Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.)

Some might conclude after noting the topic of this post that this is one more by greatcharlie on Chinese espionage in the US. Some, perhaps duly, might also grumble to the effect: “Now greatcharlie is all China, all the time!” While greatcharlie approaches the defection that did not happen out of academic interest, this examination, much as those of proceeding posts, is part of an ongoing effort by greatcharlie to give consideration of what it could offer to contribute to development more effective approaches to such hostile intelligence collection efforts against the US. Indeed, with the objective of being transparent, greatcharlie must disclose that on the matter of Chinese espionage in the US it is partisan, giving its complete support to the US, the homeland. Readers will likely discern facts are interpreted from that perspective. However, no information is skewed or bent with preconceived ideas or bias.

Who Is Dong Jingwei?

Dong was born on November 18, 1963. At the time of this writing, he is presently 57 years old. In China it would be of some significance to note that he is of Han nationality. As for his studies, he has earned a master of science degree. The only publicly reported member of Dong’s family is his daughter, Yang–also known as Dong HuaHua on social media, who as part of the defection hoax was said to have allegedly fled China with him. She is the ex-wife of Alibaba executive Jiang Fan, who now heads the company’s powerful e-commerce platforms, Tmall and Taobao. 

Dong is a member of the Communist Party of China. Highlights of his career include service as the Secretary of the Party Committee and Director of the State Security Department of Hebei Province from 2006 to 2017. He served as Director of the Pokitical Department of the Ministry of State Security from 2017 to 2018. He eventually became a Member of the Party Committee and Vice Minister of the Ministry of State Security and the Chief of MSS Counterintelligence. It was noted in the July 24, 2015 edition of Intelligence Online that Dong’s heading of the State Security Department in Guo’anbu in the Hebei Province was significant for him as that province has reportedly produced many of Xi’s “securocrats.” Loyalty to superiors, reliability, and regional background apparently put him in good standing with senior party officials under Xi. By 2015, Dong reportedly became part of the “Xi Jinping Clique”, one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles and accolades provided to Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS, where Dong is vice minister, is an intelligence service responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems mainly from providing consumers in Beijing to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, and ministers and senior executives of appropriate ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions.

As noted in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1),” the primary targets of the MSS hands down are its chief competitor, the US, the Russian Federation, Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes. In the countries of Eastern Europe, China has achieved some prominence in their space. China must equally measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. Taiwan, which Beijing declares is part of China, is a special case and a very important MSS target. The second rung of competitors would include India, Pakistan, Nepal, and Mongolia. India has doubtlessly garnered a bit more attention from MSS due to its ongoing border struggle with China. MSS has stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

In defining counterintelligence, James Olson, the former chief of Counterintelligence for the Central Intelligence Agency and author of To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), which greatcharlie reviewed for its January 2021 post, states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” The primary mission of MSS counterintelligence is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide. MSS shares the counterintelligence role with Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS. MPS is an intelligence service under the State Council in charge of the country’s internal and political security and domestic intelligence.

The achievements of MSS in the US have certainly been no mean feat, and should not be underestimated. As discussed in the February 26, 2021 greatcharlie post entitled,”Suggestions for Resolving the Conundrum of Chinese Intelligence Operations in the US: Fragments Developed from a Master’s Precepts,” the tide of essentially unchallenged Chinese espionage has lapped up so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among possible dissenters, an interest, not solely due to exigency, will grow on the idea. Chinese intelligence services have hampered the work of US businesses, research and development firms, high-tech firms, academia, and the federal government itself. They have created spy networks within institutions critical to US economic security and defense. They have attempted to inconvenience the US in its efforts to improve bilateral and multilateral relations in under-developed, less industrialized countries and even long time friends of the in certain regions, and multilateral institutions that the US actually had a hand in creating. One might speculate that having achieved countless victories with near impunity inside the US, Chinese foreign intelligence services now very likely conduct counterintelligence exercises in the field, likely in a nondisruptive way vis-a-vis ongoing operations, to ensure that in their present state, their intelligence networks are free from US counterintelligence detection and interference and that no intelligence service from anywhere could play havoc with them.

Dong (above)  once headed the State Security Department in Hebei, a province which has reportedly produced many of Xi’s securocrats.” Loyalty to superiors, age and regional background apparently won him favor with senior party officials under Xi. He then became part of the “Xi Jinping Clique,” one of the main political factions within the Communist Party of China. By 2018, Dong was close to Xi. Other important Communist Party of China titles held by Dong include: Representative of the 18th and 19th National Congress of the Communist Party of China; and, Member of the 13th National Committee of the Chinese People’s Political Consultative Conference.

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use force and aggression to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so. It stands to reason that in order to be a successful vice minister for MSS counterintelligence. Dong must be a man who has a deep understanding of how people tick, how they fit in and feel where they live and work, and how they can get the ones they have targeted tangled up in their respective espionage enterprises.

In attempting to ascribe certain traits to Dong given his role at MSS, those considered by greatcharlie may appear to be mere abstractions. However, the few traits listed here along with a reliable intuition and challenging experiences within his own intelligence organization may very well have enabled Dong to perceive likely thinking, decision making, planned approaches, and actions within adversarial intelligence services. These same traits perhaps have also assisted Dong in successfully navigating the top rung of China’s national security apparatus and to perform well at the side of leaders of the Communist Party of China.

One might first postulate that Dong possesses the traits of clarity, purpose, and focus. Surely, Dong puts his intentions forward for the best outcome possible. Clarity would allow Dong to concentrate with intention on what is ahead, on what needs to be done. One might expect that Dong believes by now that serving in MSS, performing executive duties for counterintelligence is his purpose. To that extent, purpose was likely revealed to Dong when he discovered the ability to use intuition to understand what may not be clear to others. He would be able to focus on what truly matters, and understand what needs to be avoided, such as anything that might frustrate, seriously inconvenience, hamper, or inevitably destroy his organization’s efforts

Dong is an intelligence officer and political leader of great energy, enthusiasm, and creativity. That energy is transmitted through the MSS. In the US, it would be transmitted not only to officers in the field but to errant citizens and Chinese émigrés recruited to serve the purposes of the intelligence service. He would exude a positive attitude that encourages officers, operatives, and informants to do their utmost in the field. He would be able to find unlocked potential in situations and determine ways to uncover what may be hidden away

What Was Reported on Dong’s Alleged Defection

Relate retero. (I tell what I have been told.) Some simple falsehoods went some way to explain and support what was from the outset a questionable story. From what can be gathered about the episode, stories about Dong’s alleged defection initially emanated from conservative websites in the US. Newsweek points decidedly to a June 4, 2021 report from the conservative political commentary website, RedState, as a source of the rumor. Discussion within conservative circles reportedly became even more intense as days passed. There was considerable discourse on Dong’s defection found in Chinese-language, anti-Communist newsmedia outlets in the US and on Twitter.

Among those who reported on the defection, there was general acceptance of the sequence of events. The defection scheme as laid out was indeed mad-capped. Dong allegedly defected in mid-February, flying from Hong Kong to the US with his daughter, Dong Yang. Dong supposedly provided the US government with information about the Wuhan Institute of Virology that allegedly impacted the position of the administration of US President Joe Biden and Vice President Kamala Harris on the origins of the COVID-19 pandemic. According to Han Lianchao, a former People’s Republic of China Ministry of Foreign Affairs official who defected in the wake of the Tiananmen Square massacre, Dong’s defection was raised by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi at the US-China Summit in Anchorage, Alaska in March 2021. On June 16, 2021, Han, citing an anonymous source, alleged that in Anchorage, Yang and Wang demanded that the US return Dong to China, but US Secretary of State Anthony Blinken refused. Subsequent reports, coupled with analyses by China specialists continued as Dong’s precise whereabouts remained unknown. Speculation had even reached Chinese social media threads after Dong had not been seen or photographed for several weeks.

While preparing a story on the alleged defection, SpyTalk, an online news site offering reports on national security topics, with an emphasis on US intelligence operations, had sought comment from the State Department last week, however, it did not respond. In the first public clarification put out by the US government on the affair, a US official, speaking anonymously, “reached out” to say reports of Dong’s defection were not true. With regard to Dong’s whereabouts, he stated “We can’t confirm or deny where he is exactly,” but hinted he remained in China. The official refused to go any further. When SpyTalk asked why the Biden-Harris administration sought to knock down rumors of such a high level defection, an ultra-sensitive issue, the official reportedly stated, “that’s more of a policy question”and referred SpyTalk to the White House. Reportedly, the National Security Council did not respond to SpyTalk’s request for comment.

Notably, Newsweek reported on June 22, 2021 it was informed by a US government official that the reports about Dong’s defection “are not accurate,” without elaborating. A second US government source, also speaking on condition of anonymity, said the rumors were “absolutely untrue.” Yet, such reporting still did not cause those insisting on the defection to retreat back, away from the issue. It is always a capital mistake to reach conclusions before having all of the facts on a point at issue.

The Chinese government, itself, delayed publicly addressing the stories about his alleged defection. Then on June 23, 2021, officials of the People’s Republic of China Embassy in Washington informed that Dong made a recent public appearance despite rumors that he had defected to the US four months ago. According to minutes released by the Communist Party’s Central Political and Legal Affairs Commission, Dong was among five Chinese officials who attended the 16th meeting of the Security Council Secretaries of the Shanghai Cooperation Organization (SCO) Member States on June 23, 2021 Reports of the meeting were also shared on Weibo, China’s largest social media service.

Sources of the Hoax: Views on That in the Newsmedia

The Daily Beast quoted Robert Manning, a former top Asia specialist in both Republican and and Democratic administrations for more than 30 years as saying the decision of the Biden-Harris administration’s willingness to address such a normally highly secretive issue was “to excise an unnecessary additional irritant in the still downward-spiraling bilateral relationship” between the US and China. The Daily Beast also reported another possible motive was to beat back a Republican campaign to deflect blame for the COVID-19 pandemic in the US from the erstwhile administration of US President Donald Trump to China’s Wuhan Virology Lab and, by extension, Anthony Fauci, director of the National Institute of Allergy and Infectious Diseases, who has been critical of the former president’s response to the disease. In the same vein that the motivation may be domestic politics, the Daily Beast reported that a leading China watcher suggested the objective was to head off Republican accusations that the Biden-Harris administration was “hiding a defector who has info on the lab leak or [other] embarrassing stuff.” Essentially amplifying what was aforementioned here, the Daily Beast explained reports of Dong’s defection originated in conservative circles here and abroad that have been critical of the scientific consensus that the COVID-19 pandemic was transmitted from animals in Wuhan’s “wet market.”

On June 4, former Fox News reporter Adam Housley tweeted that “US intelligence has a Chinese defector with Wuhan info. and China is trying to produce variants that suggest it came from bats to cover up that coronavirus originally came from a lab.” Housley’s report was referenced by RedState, which alleged that “a person believed to be among the highest-ranking defectors ever to the United States from the People’s Republic of China has been working with the Defense Intelligence Agency (DIA) for months.” Citing anonymous sources “inside the intelligence community,” The Daily Beast further reported that Red State cautiously claimed “the defector has direct knowledge of special weapons programs in China, including bioweapons programs,” and that the alleged information had created “a sudden crisis of confidence in Dr. Anthony Fauci.”

In a June 24, 2021 Washington Times story, it was suggested by a former National Security Agency counterspy that the defection rumors were “part of a Chinese disinformation effort to distract attention from growing international concern over reports the coronavirus pandemic may have originated in a Wuhan laboratory.” If that intriguing possibility is true, it would seem that the other shoe dropped when Dong was seen at a meeting with the head of MPS later in the month. It might be said the some in the US newsmedia are so expectant and desirous of good news for the US on the Chinese espionage front, that some outlets were even ready to jump at a contrived one. he US Intelligence Community did not flinch in response to the defection reports at any point until,  as aforementioned, one US official spoke “just looking to correct the record.” 

Other Suggestions

One can only imagine–if he was actually unaware that the fiction of his defection, would be laid on so thick in the newsmedia worldwide–what Dong’s immediate reaction was when he received news that he was the subject of a farce that put his loyalty and honor in question. Dong was imaginably a little put out. It may have also caused him some embarrassment, some loss of honor. While the truth of Dong’s loyalty to the Communist Party of China and his country would eventually be made very clear, he would surely recognize that once his name was associated with he would indubitably feel was a damnable rumor, that taint would still stick, even if only to some small degree, long afterward. 

 Perchance that the defection rumor was contrived by MSS, then it would be accepted honorably as an unavoidable sacrifice he had to make with the aim of protecting China. Perhaps some monitoring should be done to see if somewhere along the line in the near future, there is some sudden mention of Dong awarded some high honor for his “service” from the Communist Party of China. Perhaps he would receive the award from Xi, himself. That may very well signal, and could help support the idea, that the defection story was indeed part of some nefarious MSS scheme.

Quis custodiet ipsos custodes. (Who watches the watchmen.) Dong has unlikely gotten lost in any hurt. Yet, one might speculate that perhaps somewhere, someone believes Dong pretends to have an inner strength, nerve, that he actually lacks. Though the true source remains publicly unknown, so far to greatcharlie’s knowledge, no one has been denounced at least publicly in China for having responsibility for igniting the rumor against Dong. One could hypothesize that if the source of the rumor was actually in China, it may have been the case that Dong recognized attempting to establish blame among any rivals for the episode would only be corrosive, and trying to reconcile with some sense his own guilt for leaving himself open to the of such a rumor would be self-defeating. In such a hypothetical case, an expression of such acrimony within days of the celebrations of the Centennial of the Communist Party of China taking place in Beijing on July 1, 2021, would unlikely be of any benefit to Dong politically, professionally, or personally. To that extent, in the eyes of Communist Party of China leaders, he likely would do himself much honor by deciding to hold his tongue at this time, if he even needed or desired to speak out at all.

Arthur Conan Doyle in “Adventure IV. The Boscombe Valley Mystery” of his twelve short stories in The Adventures of Sherlock Holmes published in the Strand Magazine (1891) had his main character, the damnably good detective Holmes, state the following which is apposite here: “Circumstantial evidence is a very tricky thing. It may seem to point very straight to one thing, but if you shift your own point of view a little, you may find it pointing in an equally uncompromising manner to something entirely different.”

Xi Jinping’s Counterintelligence Concerns

Xi has placed considerable focus on police, judges, prosecutors, public security, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. Xi has ordered China’s security forces to be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. In his address at the ceremony, Xi lauded the major contributions made by the Chinese police to safeguarding national security, social stability and people’s interests, He called them a mighty force that can be fully trusted by the Party and the people, and spoke highly of the major contributions made by the Chinese security forces to safeguarding national security, social stability and people’s interests. Xi also called upon the security forces to uphold the Party’s absolute leadership.

People’s Republic of China President Xi Jinping (above) has placed considerable focus on police, judges, prosecutors, public security, and state security officers as part of a new Communist Party of China drive against graft, abuses and disloyalty in their ranks. Xi has ordered China’s security forces to be loyal to the Party, serve the people and be impartial in law enforcement. Xi also demanded the police force forge iron-like discipline and conduct. Clearly, Dong has been mindful of Xi’s concept and intent and obedient to the new counter-espionage regulation that came into effect in April 2021.

Would Beijing Call It a US Counterintelligence Plot?

As discussed already here by greatcharlie and in previous posts, little progress has been made in halting it or even making a discernible dent in Chinese intelligence operations. Many minds in the US national security bureaucracies are certainly working fiercely on this matter of utmost importance, but it seems too few facts have been collected for them to run on to break new ground or produce anything worthwhile. Trails of espionage may lead to the MSS and PLA, directly in many instances, but those who commit the devilry of spying on Beijing’s behalf, in the US and from China, are seldom caught. With estimates as high as 25,000 Chinese intelligence officers, operatives, and informants on the loose in the US, it is difficult even the most partisan US observers such as greatcharlie to deny China has secured a massive advantage for itself. Publicly, there appears to be not much of anything comparable achieved to knock back Chinese espionage.

Dong’s team and counterintelligence executives and managers of the other Chinese intelligence services surely study the tactics, techniques, procedures, and methods of US foreign intelligence and counterintelligence services. They would seek to better understand and prepare for expectant future attempts to covertly insinuate operatives into the Chinese foreign and national security apparatus, including particularly both the clandestine posts and covert networks of civilian and military Chinese intelligence services and Communist Party of China organs operating overseas.

Dong and his counterintelligence managers at MSS doubtlessly understand the situation the US Intelligence Community has faced, scoring few victories and suffering many defeats in the intelligence struggle with China, and they very likely recognize that US foreign intelligence and services are anxious to turn the situation around and get some things going. They have likely concluded US foreign intelligence and counterintelligence services are under stress and are bound to take risks to score a victory or win the whole ball game. 

To that extent, one might imagine it could plausibly be claimed within MSS headquarters that whole episode was a US counterintelligence artifice, designed to twinkle out Chinese intelligence service officers and operatives based on the their reactions by some the following: movements–attempt to leave US; communications–sending communiques by codes and encryption to provincial departments and municipal bureaus to confirm rumors and see instructions on next actions; contacts–reaching out to network managers in distress or panic; and, email, text, call, and meet other intelligence officers to parse out situation as reported. Alternatively, also with a counterintelligence purpose, the US could be said to have attempted to smoke out prospective defectors among those officers and operatives, attempting to convince them that some “tower moment” for Chinese intelligence service operations in US had occurred and the moment had arrived to choose to remain part of Communist Chinese system or seek refuge in the US. 

Dong and his manager further parsing out the matter might have speculated that beginning in February 2021, he may have been out of pocket for an extended period or on medical leave for some illness. Such speculation could go further to suggest the US Intelligence Community became aware of the situation, which would have been a chilling prospect in itself for MSS counterintelligence, and sought to capitalize on it 

What might cause Dong and his managers some discomfort even though the whole defection story was revealed as a hoax, and if it was the actual source of the hoax, is that for a while at least there appeared to be good news about success against China. Even if proven false, it would be good to have such positive news reach the ears of the US public, and Beijing would not want that. Further, even though the truth is out, the belief may exist among many in the US public that the “super secret” US Intelligence Community may have truly scored the specified success, and now, for reasons unknown, want to conceal it. Among conspiracy theorists in the US, the imagination may have also been given fuel to run wild and the whole matter of the defection will linger for a while. Chinese intelligence services would likely hope that some sense of discouragement might reach into the psyche of the US public over how Chinese espionage in their country appears unstoppable, even though it may be an issue somewhat outside of the average citizen’s day-to-day concerns.

As for the Communist Party of China, propaganda elements might eventually seek to use the whole circumstance to an advantage against the US. The goal would be to embarrass the US by making it appear as if the US Intelligence Community conjured up a story of defection because that has had no real successes at all against China. What would then perhaps be called “the big US lie” or something to that effect would doubtlessly be denigrated by Beijing through declaring it as being too contrived, unsubtle, poorly executed, and further evidence of how little the US Intelligence Community knows about the Chinese intelligence services. Then again, there may just be silence from Beijing.

A Novel MSS Counterintelligence Tactic to Smoke Out “Disloyalty in the Ranks?”

It would appear Dong may have actually been expecting to face something out of the ordinary from US and other foreign counterintelligence services much as discussed here, and it factored into MSS calculations on operations against the US. According to a story in the June 18, 2021 edition of the South China Morning Post, a report on a seminar on a counter-espionage regulation that came into effect in April 2021 was posted on Changanjian, the social media account operated by China’s top law enforcement agency, the Central Political and Legal Affairs Commission of the Communist Party of China. At the seminar, Dong urged the country’s intelligence officers to step up their efforts to hunt down foreign agents and insiders who collude with “anti-China” forces. A read-out from the seminar quoted Dong as explaining: “The promulgation of such regulations provides us, the principal agents responsible for counter-espionage work, with the legal means to prevent, stop and combat criminal activities that would jeopardize our national security.” Dong went on to state: “This will reinforce our responsibility in counter-espionage work, and enable us to do a better job in organising and mobilising all social forces in waging ‘people’s warfare’ against espionage activities.”

In addition to Dong’s expressions on catching foreign spies, the actual report as posted stated that the intelligence officers must also go after “insiders” and “people who bankroll their activities behind the scene.” On that point, the report additionally noted: “At present, infiltration and spying activities by foreign intelligence agencies and hostile forces have increased significantly.” It went on to say, “In particular, there are individuals who have willingly become ‘insiders’ colluding with foreign intelligence agencies and hostile forces and engaging in anti-China activities.” The South China Morning Post story lastly noted the insistence in the report that “All state security agencies must stand firm … deepen and carry out our various counter-espionage work to safeguard our national security.”

Given what was stated by Dong at the June 18th seminar on the counter-espionage regulation that came into effect in April and the report on the event, it may be grotesquely improbable, yet all the same conceivable, that the defection hoax was actually an MSS loyalty test on a grand scale to as was suggested, to step up their efforts to hunt down foreign agents and insiders who collude with “anti-China” forces.

Attempting to look at thinking in MSS from the outside, trying to put moments and trifles from recent events in order and give them a deeper meaning, greatcharlie hypothesizes that Dong and his counterintelligence managers at MSS could not be certain of how the US Intelligence Community, and other foreign intelligence services for that matter, might apply pressure to its officers and operatives. For them, that is always the pinch. To do something more than just study the matter, they may have created a scenario that would likely shock MSS personnel in the field: the defection of the MSS Vice Minister, for counterintelligence nonetheless. That might explain why Dong’s good name was thrown into the mix of something so repugnant. Dong and his managers could test what may have been a working theory on the likely causality of some occurrence, in this case it would have been collusion with anti-China forces, and see if it could be confirmed by facts through investigation. Indeed, Dong and his managers would have wanted to see for themselves how officers and operatives in the field would respond to a very deceptive approach that perchance in their minds could have plausibly been attempted by US counterintelligence.

Many of the MSS foreign intelligence networks and operations in the US, and elsewhere overseas, are run by MSS Provincial departments and municipal bureaus. It would most likely be the case that foreign intelligence and counterintelligence managers of those departments and bureaus would have understood that there would be no reason to leave their locations or try to leave the US in the case of such a defection. It would stand to reason that their identities as spies would likely remain unknown for the time being and everything would be handled by Beijing to prevent their capture and keep them safe. That would likely be instilled in training and before deployments. Expectedly, as a result of training, loyalty and dedication, equanimity and sangfroid would be displayed by officers and operatives. However, through experience one might postulate Dong could have felt that there are patterns one can discern that establish order in the human mind. An unexpected blow to the MSS leadership as a defection of its chief of counterintelligence, which they depended upon for their very lives, might surprisingly elicit inordinate behavior among trained officers and operatives.

Dong might have conceptualized further that if one of his officers or operatives had even considered going over “to the other side” or perhaps might have already been in “friendly contact” with so-called “anti-China” force, the former might fear of being uncovered by an alleged defecting chief of MSS counterintelligence might impel them to act, the latter might want to use the situation to capitalize on the connection already made and go to the other side. (After reading what is presented here, perhaps some may accuse greatcharlie of having too much imagination, others may say, too little.)

A Thought about Future Defections by Foreign Intelligence to the US

As expressed in previous posts by greatcharlie, how the US handles every defection will surely shape decisions by officials to defect in the future.What US counterintelligence services do with defector would certainly have value for MSS to the extent that it could be used to discourage, plant in minds of officers and operatives that turning to the US would not be a wise choice. What prospective defectors might gather from the whole Dong business is that his or her defection could easily become a very public matter, very quickly in the US and eventually worldwide. It could be imagined by them that facts concerning who or what, when, where, how, and why would somehow be leaked to the news media. Rather than a serious concern, their defection might be presented and looked upon at least among some in the US as a banal amusement. Bookmakers in Las Vegas may very well have been taking bets on the outcome of it all: “Did he or did he not defect?, and “Will he stay in the US or be returned to China for one of our spies?” Regardless of the rank or position a prospective defector might be, he or she would hardly get the impression that the way Dong’s name was tossed about was nothing to signify, but rather unseemly. They would perhaps recognize that they would have little cause to expect any better treatment for themselves. None of this should be looked upon as exaggeration or fanciful if the Dong episode might be considered at all instructive. Using the backdrop of this episode as a gauge, one can only imagine what would go through the mind of an intelligence officer of adversarial country, wanting to defect when thinking about the treatment and well-being of his or her family members and himself or herself, how seriously their situation would be taken by the US, and what would be their final disposition. That may not portend well for the US Intelligence Community or prospective defectors. Hopefully, that will not be the case.

The Way Forward

Praeterea qui alium sequitur nihil invenit, immo nec quaerit. (Besides, he who follows another not only discovers nothing but is not even investigating.) Despite pronouncements of Communist precepts that are designed to allow the society to evolve socially, economically, and politically, declarations to maintain an orderly society though a system of justice demanding obedience and assurances from the Communist Party of China on the smooth running of the state and conduct of government affairs aimed at supporting a high quality of life for the people, visible and publicly released reports of scientific achievements in the medical field to high-tech, greater endeavor in the vast ocean and into space, and the notices of accomplishments externally on foreign affairs and guaranteed that the country cannot be threatened, bullied, or taken advantage of ever again, China is nonetheless a nontransparent society. What one knows about China is what Beijing says is true. Independent observations that defy its realities are anathema in Beijing, and can be responded to harshly. There is plenty of secrecy. The frugal release of information on the Wuhan virus is the latest best example of that. Beijing, without fail, will double down further in secrecy when it comes to national security. Yet, to discerning eyes, what the world observes China doing also speaks volumes about what is highly likely being decided behind the scene. That was especially true in this case when ostensibly a man viewed widely in the Communist Party of China as one of the country’s most loyal and dedicated servants, was accused of what could be called the unthinkable. 

While Dong’s name has never been bandied about in the US newsmedia or worldwide in any way close to the manner it has been in just days before thus writing. For those somewhat familiar with such matters, greatcharlie’s editor, himself, being simply an enthusiast and nonpracticioner, well-separate from the intelligence world, the notion that that he of all people in Chinese intelligence would defect would be a bombshell neatly as big if Alexander Bortnikov of the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB, was said to have defected instead. That is simply unimaginable. 

Revenons à nos moutons. The hope of US counterintelligence should be “simply” to come into positive contact with an officer, operative, or informant with an albeit some leaning toward an idealistic vision of China as the dominant power and shape of the world for the future, but with reservations, serious reservations. Those sentiments would need to be worked on. The next best hope would be to find the officer, operative, or informant who is not doing things for an ideal, and whose reasons for turning on China would be venal. 

Given the peculiarities of the world of intelligence, this analysis should not be considered too extravagant. The desire of greatcharlie is that nothing in this post would be deemed too fanciful by readers and a bit of their curiosity on the topic at hand would be satisfied. Admittedly, it would be doubly satisfying to know what is presented here might  resonate with a few in US counterintelligence services grappling with the Chinese espionage conundrum. However, if greatcharlie has not achieved the latter, the 18th century French Enlightenment writer, historian, and philosopher, François-Marie Arouet, known by his nom de plume Voltaire, sums up its sentiment in Poème sur la Loi naturelle (1756), Quatrième partie: Je n’en dirai pas plus sur ces points délicats. / Le ciel ne m’a point fait pour régir les États, / Pour conseiller les rois, pour enseigner les sages.” (I will not say more on these delicate points./ heaven made me not to govern states, / To counsel kings, to teach wise men. Spero melior. (I hope for better things.)

Book Review: Bill Gertz, Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (Encounter Books, 2019)

People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping in People’s Liberation Army uniform (above). Successive US administrations, both Democrat and Republican, stuck to a belief that by maintaining good relations with China and conducting trade and other business with it, the Communist regime in Beijing would eventually evolve into a free market, democratic system. However, it is clear now that China has reverted to its Maoist Communist roots. Instead of becoming more moderate and more democratic, China has become a more repressive dictatorship domestically. Internationally, instead of becoming more integrated, China has emerged as a dangerous threat to peace and security as it seeks to become the world’s dominant power. How this all came about and what the US can expect from all of this is elaborated upon in Deceiving the Sky: Inside China’s Drive for Global Supremacy.

In Deceiving the Sky: Inside Communist China’s Drive for Global Supremacy (Encounter Books, 2019), Bill Gertz, the author, directs a flood light on China’s practices that are designed to undermine the US economy, weaken and ultimately defeat the US military, and diminish the global influence of the US. An emphasis of Gertz’s discussion is how US leaders have repeatedly failed to understand the preparations in which Beijing is engaged to ready China for a confrontation with the US in the near future. Gertz also asserts the US leaders have also habitually failed to take appropriate steps to deter and act appropriately in response to Beijing’s threatening moves. An example of how destructive and impactful such delinquencies have been is the US response following Beijing’s use of the People’s Liberation Army (PLA) to crush the democratic aspirations of thousands of Chinese in Tiananmen Square in June 1989. China was sanctioned. However, Gertz says that far more consideration should have been given to how China would and actually did react to sanctions. Gertz says what China actually did was launch an unbridled campaign over the next three decades to steal and otherwise acquire some of the most valuable technology from the US. The theft has been staggering, estimated to be as much as $600 billion annually in stolen technology and intellectual property. However, in successive US administrations, both Democrat and Republican, there was a wilful blindness toward what was occurring. They stuck to a belief that by maintaining good relations with China and conducting trade and other business with it, the Communist regime in Beijing would eventually evolve into a free market, democratic system. 

Gertz says the outcome of this decades long policy failure by the US has been the emergence of an expansionist, hard line Communist regime headed by a supreme leader, who took power in 2012, with unchecked powers matched only by Mao: People’s Republic of China President and Communist Party of China Party Secretary Xi Jinping. Gertz asserts that Xi has ruled with an iron fist. China has reverted to its Maoist Communist roots. Instead of becoming more moderate and more democratic, China has become a more repressive dictatorship domestically. Fundamental freedoms rights and prosperity for the Chinese people have essentially been eliminated.Internationally, instead of becoming more integrated, China has emerged as an ever more dangerous threat to peace in security as it seeks to become the world’s dominant power. Communist ideology is the centerpiece for that Chinese drive for dominance. How this all came about and what the US can expect from it all is elaborated upon in Deceiving the Sky: Inside China’s Drive for Global Supremacy.

The attention of greatcharlie was drawn to Deceiving the Sky at first upon recognizing the title’s reference to “The Thirty-Six Chinese Strategies.” The Thirty-Six Chinese Strategies or Stratagems are a collection of tactics that can be applied to very different situations. The strategies are derived from military tactics applied during the Warring States Period (403-221 B.C.) or during the Three Kingdom Period (220-265 B.C.). Comparisons are naturally made to other Chinese military texts such as Sun Zu’s Art of War focus on military organization, leadership, and battlefield tactics, the Thirty-Six Strategies, is a unique collection of ancient Chinese proverbs, more apt for the fields of politics, diplomacy, and espionage. The origins of this book are unknown. No author or compiler has ever been mentioned, and no date as to when it may have been written has been ascertained. Deceiving the Sky is the first stratagem of the thirty-six.

Gertz explains in the text that the title Deceiving the Sky comes from an ancient Chinese strategy used by generals to win battles called deceive the Sky to cross the ocean. As the story goes, an Emperor was hesitant to launch a military campaign against neighboring Koguryo, now Korea. In reaction, one of his generals convinced the Emperor to go to dinner at the home of a wealthy peasant. As the Emperor entered the house for a meal, the residence moved. The emperor had been tricked onto a boat ended for battle across the sea. Rather than disembark, he ordered the military campaign to advance, and the battle was won. What is derived from this story is that a leader’s determination to win a war should be so unrelenting that even an Emperor, viewed in Chinese culture as the son of heaven or the Sky, can be deceived. Translated into military precepts, deceiving the sky suggests that a commander: 1) Openly act as if intending to do one thing then do something else; 2) Create false alarms until the opponent no longer takes notice of alarms; 3) Lull the opponent into a sense of false security by appearing innocuous. Then when the opponent ignores you, one can attack at will; and, 4) One can also do the reverse, acting mysteriously and pretending to know things onees do not. Try different things and watch the opponent’s responses. The opponent will react most strongly to that which creates most concern. (See Stefan Verstappen, The Thirty-Six Strategies of Ancient China (China Books and Periodicals, 1999))

As Gertz discusses how China has acted against the US in recent decades, no doubt is left about how pertinent this ancient yet timeless stratagem is to its approach. According to Gertz, the strategy well-reflects the Marxist maxim that the ends justify the means. Beijing practices strategic deception known in the ancient formula as using false objectives to facilitate true objectives. It is another way of describing the Communist strategy of using all means warfare against the US which is the sole obstacle to China crossing the ocean and achieving the rightful place as the most powerful state in the world. Nemo repeite fuit turpissimus. (No suddenly becomes bad.)

So impressed was greatcharlie with Deceiving the Sky, it has sought to allow its readers to gleen enough about the book in a review that they would choose to well-thumb its pages themselves. What greatcharlie can state in all conscience that if one really does not have much time to dig deep into the crisis of Chinese actions and intentions, Gertz’s breakdown of the whole matter is about as accurate and concise a report on the matter as one is going to get. What is most impressive to greatcharlie about the book is the manner in which it stimulates thought on the grave issues concerning China. As greatcharlie has stated in previous reviews, books that can stir a fire inside the reader, and a passion for a subject, are the most memorable and most enjoyable to sit with. The role of reviewer, an unsolicited intermediary between a book’s prospective reader and the author, is a responsibility that greatcharlie takes seriously. Rarely if ever, will greatcharlie read a book then take the time to write a negative review, presenting its judgments on the shortcomings and failures of an author’s toil on a manuscript. It is greatcharlie’s preference to provide reviews of books that readers of blog can enjoy and from which they may edify themselves. Never is harm intended.

Gertz is an award-winning national security journalist and author of eight books, four of which were national bestsellers. He is currently national security correspondent for The Washington Times. On China, he is accepted in both journalistic and foreign and national security policy circles as being an authority. Even more, he is something of a treasury of knowledge on its pursuits versus the US. Confidential sources for years within the US national security bureaucracies have shared what they have reasoned was permissible with Gertz that clarified much about personalities, events, and situations concerning China with all possible precautions concerning national security firmly in mind. Gertz’s considerable standing among federal employees in rather sensitive positions is a reality that the most senior executives in the US government have recognized and have begrudgingly accepted. Gertz has been a guest lecturer at the FBI National Academy in Quantico, Virginia; the Central Intelligence Agency; the National Defense University at Fort McNair, and, the Brookings Institution.

The Author

Gertz is an award-winning national security journalist and author of eight books, four of which were national bestsellers. He is currently national security correspondent for The Washington Times. As a journalist, he recognizes his responsibility to speak truth to power. On the issue of China, he is accepted in both journalistic and foreign and national security policy circles as being an authority. Even more, he is something of a treasury of knowledge on its pursuits versus the US. 

Confidential sources for years within the US national security bureaucracies have shared what they have reasoned was permissible with Gertz that clarified much about personalities, events, and situations concerning China with all possible precautions concerning national security firmly in mind. Gertz’s considerable standing among federal employees in rather sensitive positions is a reality that the most senior executives in the US government have recognized and have begrudgingly accepted. In his biography posted by the Harry Walker Agency, a speaker’s bureau, it is noted that former Central Intelligence Agency (CIA) Director R. James Woolsey stated: “When I was DCI [Director of Central Intelligence] Bill used to drive me crazy because I couldn’t figure out where the leaks were coming from. Now that I’ve been outside for two years, I read him religiously to find out what’s going on.” During the 1990s, Secretary of Energy Bill Richardson told the author: “We talk about your stories at Cabinet meetings.” Defense Secretary William S. Cohen once remarked to China’s military intelligence chief that Bill “has access to more intelligence information than anyone I know.” Former Defense Secretary Donald H. Rumsfeld once told him: “You are drilling holes in the Pentagon and sucking out information.”

Gertz has also been a guest lecturer at the FBI National Academy, the CIA, the National Defense University at Fort McNair, the Brookings Institution, and Hillsdale College. He has participated in the National Security Studies Program at the Johns Hopkins University School of Advanced International Studies and the Syracuse University Maxwell School of Citizenship and Public Affairs.

In Deceiving the Sky, Gertz has provided a most discouraging account of how the US has fared in a “struggle” to claim the perch of the dominant power in the world which China has promoted. At the same time, he answers in an admirable way the questions that US policy makers and decision-makers should be asking. To that extent, he has supplied the US foreign and national security policy bureaucracies with their deficiencies. An earlier work by Gertz, The China Threat: How the People’s Republic Targets America (Regnery, 2000), was prescient in assessing Communist China’s goals and intentions. Deceiving the Sky includes new details of the danger and proves his warning was correct. Gertz warns that if nothing significant and lasting is done, it will only get worse.

Gertz digs into the dark roots of Beijing’s plans. Readers will find that the information Gertz provides will prove to ring true on every issue. He demonstrates that there are clearly greater issues hanging from any issue with China than usually appear at first glance. Surely, presenting a full excavation of China’s actions and intentions was unlikely desired or practical given the larger audience Gertz sought to reach. Perchance if Gertz were to write enough works on the matter he will manage to at least touch upon all of its many aspects. Gertz is not a storyteller. His job is not to entertain, despite what his publishers might desire without the ultimate objective of every publisher which is to sell books. As a journalist, he delivers the news, lays out the facts as they are, and to the extent that he may provide analysis, he edifies and enlightens with his insights. Gertz has the power to intellectually stimulate with his words

The present situation between the US and China is recognized by many scholars, academics, policy analysts, and journalists as being unhealthy. Gertz’s reports on Chinese plans and actions have run concurrently to those of other journalists and scholars writing on the subject and the main features of their stories tally. Indeed, a lengthy list of authors have written fine books on the matter and offer similar perspectives. Concerning those other books, greatcharlie would not dare offer even a short-list of them for it would only open the door to judgments on the the selection of them and perhaps their numerical order. As this review is focused on Gertz’s work, all of that would be beside the matter.

It would be difficult to convince greatcharlie that Gertz wrote Deceiving the Sky with the objective of eclipsing the whole of its kind. What he has done is add an invaluable volume to the body of literature that accurately discusses “The China Threat.” He articulates the struggle in a manner that gives all matters that hang from it real meaning. Gertz only asks readers to follow closely what he has written and learn. Some seem disposed to remain content with that situation as long as it lasts. Though he lays it all out impressively before his readers, those not so warm to Gertz’s views will for themselves determine what if anything in the book is essential and what is not. Certainly, one must also accept that not everyone will be attuned to the scream of writers such as Gertz on the real and immediate threat China poses. 

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they do see.) To those who seek to find normality and safety in what China is doing in Asia and beyond and see it all as being modest enough, it is likely Deceiving the Sky put their noses are not out of joint. Whether they might be characterized as rejectionists or alarmist in accord with their responses to Gertz, nothing in Deceiving the Sky was apparently intended to harshly cut so deep into the foundations of thinking of proponents of an ascending China that they should find his facts and deductions threatening to their own analyses or interests. He is not on the attack. His goal is to illuminate. He encourages all readers to simply evaluate for themselves how things have actually been moving and where they are actually heading. Not just out of a sense of professional satisfaction but rather the urgency and importance of the matter, he would welcome and wish for an effort by them to test the virtues of what he presents.

Xi and senior decision makers on foreign policy within the Communist Party of China albeit are individuals of an exceptional nature judging from what they have displayed of themselves in challenging the US for the position as the world’s dominant power. That is a desire that they have in abundance. They have shown themselves to be a thoroughly bad lot. Gertz paints an even more sinister picture of Xi in a discussion of historical figures among his role models.

To accept that China would cause the release of COVID-19 through what might be called deliberate negligence would cause one to accept China was capable of any fantastic outrage. Doubtlessly, many already believed that. Gertz would perhaps be among their number. China was frugal with information about COVID-19 enough so that rather than being seen as heroes, they have set themselves up as the antagonist of every Western country, primarily the US, struggling to resolve the COVID-19 pandemic in this all-too real global tragedy. Many in the federal government foreign and national security policy bureaucracies and the US Congress with the responsibility to monitor what China is doing, have refrained from telling too much about its actions and intentions and the full extent of what its intelligence services are doing against the US to the public possibly for fear of figuratively frightening the horses. An unwavering conviction over China’s malign intentions appears to be a luxury that many especially in US foreign policymaking circles sense they cannot afford to have. They understand that one’s political fortune could possibly be balanced against it. That job has really been left to individuals as Gertz.

It appears important to note that in more than one spot in Deceiving the Sky, Gertz’s discussion on US policymaking on China is colored by his political perspective, recognizably conservative. As aforementioned, Gertz is a national security correspondent for the Washington Times, a daily newspaper with a conservative political alignment and was employed in that position at the time he wrote Deceiving the Sky. The book was published in 2019, and Gertz also expressed some satisfaction with the decision-making of the administration of US President Donald Trump under a strategy of competitive engagement. (Readers for whom this will pose some problems have been forewarned.) Not to make a labor of this matter, suffice it to say that such digressions in the text should not distract somber and astute readers from taking into consideration the healthy, accurate, and urgent message Gertz offers exposing the true intentions. That discussion, in greatcharlie’s assessment, is not partisan.

What greatcharlie Found Most Interesting

Deceiving the Sky is 256 pages, portioned in 13 chapters and a titillating conclusion. It presents what could perhaps be called a catalogue of sins by China. The range of Gertz’s coverage of China’s activities in Deceiving the Sky can be readily observed in his descriptive chapter titles. They include: Chapter 1: How Communists Lie: The 2007 ASAT Test; Chapter 2: The East Is Red: Communism with Chinese Characteristics; Chapter 3: China Wars: The Failure of Pro-China Appeasement; Chapter 4: The Coming Space War with China; Chapter 5: Assassin’s Mace in Space; Chapter 6: Seeking Digital Superiority: China’s Cyberattacks; Chapter 7: High-Tech Totalitarianism; Chapter 8: Chinese Intelligence Operations; Chapter 9: Influence Power: Beijing and the Art of Propaganda and Disinformation Warfare; Chapter 10: Financial and Economic Warfare with Chinese Characteristics; Chapter 11: Corporate Communism: Huawei and 5G; Chapter 12: Military Might: World Domination Through the Barrel of a Gun; and, Chapter 13: Flashpoints at Sea and China’s String of Pearls Expansion. He sums up the book with the thought-provoking segment: Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People. 

It would be impossible for greatcharlie not to receive the lessons and messages of books as Deceiving the Sky and feel compelled to ruminate upon them. Yet, in this review, greatcharlie’s focus is not turned dutifully and perhaps expectedly toward the fundamental and vital issues of concern such as China’s military growth, military strategy, investment in space platforms, ties to Russia, moves in the South China Sea, threat to Taiwan, and other issues of the utmost importance concerning its expansion and hegemony in its the Far East and ambitions beyond Asia. Regular readers of greatcharlie are aware that the blog’s editor has a keen interest in what author’s offer about what makes those of interest to them tick. For years, such independent analyses by reliable sources have often saved federal bureaucracies an infinity of extra trouble by offering insight on what may very well be on the minds of decision makers in foreign capitals. After examining a sufficient record of an individual’s attitudes and behavior in the aggregate sometimes, their motives may still remain inscrutable and those writing books on their policy making and decision making with little resource may turn to speculation. An additional interest of greatcharlie of late are the activities of Chinese intelligence services in the US.

Four chapters in which Gertz offers insights into the thinking of the leadership of the Communist Party of China at the present and into the future  and Chinese intelligence services that caught greatcharlie’s attention are: Chapter 2: The East Is Red: Communism with Chinese Characteristics; Chapter 3: China Wars: The Failure of Pro-China Appeasement; Chapter 8: Chinese Intelligence Operations. Insights Gertz offers in the book’s close, Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People, are also worthy of special note.

According to Gertz, no other Chinese leader since Mao has embraced the rigid orthodox Communist ideology more than Xi Jinping, who came into power in 2012. Soon after, Xi engaged in a ruthless, albeit less viable, ideological cultural revolution of his own, a political purge of thousands of officials, some were among the most powerful players in the system. By 2018, under Xi, the Party once again emerged with Mao-like devotion to the Socialist ideal of creating New Chinese Man. He lays out how Xi has assumed more power than any Chinese leader since Mao.

Chapter 2 The East Is Red

It is in Chapter 2, Gertz’s more fully explains, as mentioned earlier, that no other Chinese leader since Mao has embraced the rigid orthodox Communist ideology more than Xi Jinping, who came into power in 2012. Soon after, Xi engaged in a ruthless, albeit less viable, ideological cultural revolution of his own, a political purge of thousands of officials, some were among the most powerful players in the system, such as regional Communist Party boss Bo Xilai, police, intelligence and security czar, Zhou Yongkang, and former Vice Chairman of the Central Military Commission, General Guo Boxiong. 

Gertz reminds that beginning in the 1980s and over the decades that China noted the post-Mao policy dubbed “reform and opening up,” Gertz has readers cast their minds back to the years when Chinese Communist leaders went to great lengths to hide their ideology. He states that “ideological speeches were reserved for Party meetings and three-hour long recitations on the great works of the Party.” He continues further explaining that propaganda organs deliberately substituted the more-moderate sounding Socialism in place of Chinese Marxist-Leninsm in a strategy designed to win widespread support from non-Communist countries around the world.

Gertz then emphasizes how all of that changed with Xi. By 2018, the Party once again emerged with Mao-like devotion to the Socialist ideal of creating New Chinese Man. He lays out how Xi had assumed more power than any Chinese leaders since Mao. Gertz notes that following the death of Mao, the next leader of China, Chairman Deng Xiaoping, argued that Mao’s fanatic view of the World Communist Revolution needed to be changed. In its place, he adopted a new strategy called “Beyond Ideology and Social Systems” that sought to scale back Maoist ways but not give up Communism. Deng intentions were not benign. Gertz asserts that Deng believed world peace was at hand and that China should find a way to exploit it. To that extent, Gertz writes, Deng put forth China’s pragmatic strategy enabling massive trade and investment with the Capitalist world. As Gertz explains,”Bide our time, build our capabilities” was the Dengist ideology, and when the peace eventually collapsed, China would be ready both economically and militarily to dominate. Interestingly, despite appeasement of China by successive US administrations after Chinese tanks crushed the hopeful democracy movement in Tiananmen Square in June 1989, Gertz notes that Beijing continued to harbor the conspiracy theory of US plans to subvert and contain the People’s Republic.

As a very intriguing and instructive point, Gertz explains that “Chinese Communism mimics religion-it presents a version of history with a journey of deliverance played out in chapters written in a chosen language. It boasts its own priesthood–political commissary ubiquitous throughout–and an enforced infallibility of its leadership.” There are prophets and devils, along with a council of senior religious leaders who have the power to change or interpret the Communist historical narrative. Gertz goes on to state that Party loyalty equals morality; doubting history is blasphemy, heresy and treasonous. He then declares: “There is a chosen people, the Chinese, a promised land, China, temples, pilgrimages, faith in the face of contrary facts, deep intrusion into the personal life of each person, and the indoctrination of children into the tenets of Chinese Communism.”

Perhaps a very apparent expression of Chinese Communism as religion is through united front work. To better understand united front work, greatcharlie turns to the expert source for perspective, Peter Mattis. Since leaving the CIA, where he was a highly-regarding analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis, along with a former military intelligence officer and diplomat, Matthew Brazil, published a superb book, Chinese Communist Espionage: An Intelligence Primer (United States Naval Institute Press, 2019). According to Mattis, the central element to understanding what the Chinese Communist Party is doing and why to shape the world outside the party is united front work. Mao described the purpose of this work as mobilizing the party’s friends to strike at the party’s enemies. In a more specific definition from a paper in the 1950s, the Central Intelligence Agency (CIA) defined united front work as “a technique for controlling, mobilizing, and utilizing non-communist masses.” In other words, united front policy addresses the party’s relationship with and guidance of any social group outside the party. To that extent, as Mattis explains, united front work entails shaping those outside the party, and not simply the Chinese people or world outside the People’s Republic of China. United front work must also be a tool of political struggle. It is not confined to activities that we would call propaganda or public diplomacy. It is not limited to covert action. In 1939, Mao wrote: “Our eighteen years of experience show that the united front and armed struggle are the two basic weapons for defeating the enemy. The united front is a united front for carrying on armed struggle. And the Party is the heroic warrior wielding the two weapons, the united front and the armed struggle, to storm and shatter the enemy’s positions. That is how the three are related to each other.” Mao’s outline of united front work within the party’s toolbox remains as the core understanding of it within the Communist Party of China today. United front activities have “aided” the Communist Party of China in resolving several dilemmas of the post-Mao era. That was most apparent following the Tiananmen Square and the death of Deng.

Evaluated on the basis of the united front policy system, the Communist Party of China’s management of political influence operations runs to the very top of the party, involving senior leaders directly. The policy system extends through the party’s hierarchy and spills over into China’s government ministries as well as other state-owned and state-administered organizations. The State Council ministries to include the Ministry of Foreign Affairs and many other organizations with a party committee offer unique platforms and capabilities that the united front policy system can draw upon for operational purposes. United front work is conducted wherever the party is present. To that extent, as Mattis explains, united front work is not an “influence operation” or a campaign. It is the day-to-day work of the party. The importance of united front work to the Chinese Communist enterprise is the reason why Xi has repeatedly emphasized the importance of a working organ of the Communist Party of China’s Central Committee, the United Front Work Department (UFWD ), to China’s rejuvenation. Among experts on China, UFWD is generally understood to be a Party intelligence organ,

One could only have imagined that foreign policy decision makers at the top of the Communist Party of China were aware that if the COVID-19 disaster was not put right with urgency, it would have had an unfortunate effect on US-China relations. Relative to the enormity of the crisis created, Beijing’s response could not reasonably have been considered apologetic or a recognition of their misstep at all. Overall, the design of the response appeared to be to protect the image and reputation of the Communust Party of China, and leave the impression that it was infallible in its response.

United front work in diplomacy can often be a dominant feature. Diplomacy with leading industrialized Western countries and prominent industrialized countries in their own region is used as a platform to promote the message of the Communist Party of China and bolster its standing. To discern such efforts, one might watch for matters stated publicly that might have little purpose in a more private setting and in fact might be best conveyed on the sideline meeting or during a break in bilateral or multilateral talks.

The reason for this is that the target audience of those comments will not be the party to the negotiation. The target is the people of China and people of underdeveloped and burgeoning industrialized countries who erroneously might see China as having eclipsed the power of leading industrialized countries and directly confronting them. China’s effort to pull countries of the Third World in Asia and Africa and even countries in Eastern Europe, with a particular focus on the Balkans, within its sphere of influence to turn a phrase has the characteristics of a near collection mania. However, the behavior of the Communist Party of China perhaps has had its best results among countries led by tyrants and other potentates who themselves have engaged in the ions old quest for dominance in their region or in the world. Aliquis latet error. (Some trickery lies hidden.)

A tangible demonstration of how China is leading the march to a “better” future for the world, by taking on US power publicly. This was recently done during a two-day bilateral meeting from March 18, 2021 to March 19, 2021 at the Captain Cook Hotel in Anchorage, Alaska. A  US delegation led by US Secretary of State Antony Blinken and US National Security Adviser, Jake Sullivan met with a People’s Republic of China delegation led by the Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi, and People’s Republic of China Foreign Minister Wang Yi. The two-day meeting got off to a tense start, with a public display of the strained nature relations between the US and China. 

Blinken laid out many of the areas of concern, from economic and military coercion to assaults on basic values. Sullivan made clear that the overriding priority of the US was  to ensure that its approach in the world and approach to China benefits the US public and protects the interests of US allies and partners. Further, he explained further that the US did not seek conflict, but welcomed stiff competition and will always stand up for its principles, for its people and its friends.

Yang responded boldly, taking a bit of time to express sharp criticism of the US. He spoke with great authority. There was an air of ceremony in his reproach. Yet, through his words were evinced the restricted, mental prison of Communism. His statement must be examined in some detail to allow readers to sense the style, tone, rhythm, mood, the expression of indignation, and the recognition that a new world order is on the horizon that will have Chinese characteristics. One can discern a certain flavor in expressions of united front work in diplomacy.

Yang explained: “We believe that it is important for the United States to change its own image and to stop advancing its own democracy in the rest of the world. Many people within the United States actually have little confidence in the democracy of the United States, and they have various views regarding the government of the United States. In China, according to opinion polls, the leaders of China have the wide support of the Chinese people. So no attempt to–the opinion polls conducted in the United States show that the leaders of China have the support of the Chinese people. No attempt to smear China’s social system would get anywhere. Facts have shown that such practices would only lead the Chinese people to rally more closely around the Communist Party of China and work steadily towards the goals that we have set for ourselves.”

In an effort to turn a disadvantage into advantage with mere words, Yang went on to say: “On human rights, we hope that the United States will do better on human rights. China has made steady progress in human rights, and the fact is that there are many problems within the United States regarding human rights, which is admitted by the US itself as well. The United States has also said that countries can’t rely on force in today’s world to resolve the challenges we face. And it is a failure to use various means to topple the so-called authoritarian states. And the challenges facing the United States in human rights are deep-seated. They did not just emerge over the past four years, such as Black Lives Matter. It did not come up only recently. So we do hope that for our two countries, it’s important that we manage our respective affairs well instead of deflecting the blame on somebody else in this world.

Ostensibly speaking on behalf of peoples “oppressed” and formerly oppressed by Western powers as China, itself, once was. Yang was particularly biting, stating: “The United States itself does not represent international public opinion, and neither does the Western world. Whether judged by population scale or the trend of the world, the Western world does not represent the global public opinion. So we hope that when talking about universal values or international public opinion on the part of the United States, we hope the US side will think about whether it feels reassured in saying those things, because the US does not represent the world. It only represents the government of the United States. I don’t think the overwhelming majority of countries in the world would recognize that the universal values advocated by the United States or that the opinion of the United States could represent international public opinion, and those countries would not recognize that the rules made by a small number of people would serve as the basis for the international order.”

No doubt was left as to his loyalty and dutiful nature toward the Communist Party of China as Foreign Minister Wang performed his united front responsibilities expressing the following position: “China certainly in the past has not and in the future will not accept the unwarranted accusations from the US side. In the past several years, China’s legitimate rights and interests have come under outright suppression, plunging the China-US relationship into a period of unprecedented difficulty. This has damaged the interests of our two peoples and taken its toll on world stability and development, and this situation must no longer continue. China urges the US side to fully abandon the hegemonic practice of willfully interfering in China’s internal affairs. This has been a longstanding issue, and it should be changed. It is time for it to change. And in particular, on the 17th of March, the United States escalated its so-called sanctions on China regarding Hong Kong, and the Chinese people are outraged by this gross interference in China’s internal affairs and the Chinese side is firmly opposed to it.”

Latrant et scitis estatint praetesquitantes estis. They bark, so you know that you are in front of them.) One could reasonably presume any genuine negotiations planned by Chinese officials was secondary to what was stated at the outset of the meeting. Nothing stated by them could have led one to believe they were negotiating, seeking to establish common ground and points of agreement on issues and ways to come together on the most nagging ones. The meeting in Anchorage, Alaska provided a grand stage. The target audience of the Chinese officials’ reproaches was not really Blinken and Sullivan who were present in the room, but rather the people of China stand people of underdeveloped and burgeoning industrialized countries who would likely see China directly confront the US through their words. The Chinese officials sought to establish separate warring identities between the US and China. They sought to create the impression that some equipoise of power had already been by China versus the US.

Further, the Chinese officials clearly wanted to establish an image for the world to see of how disassociated China’s worldview was that of the US. They also appeared to want to demonstrate that China’s old view was more closely related with underdeveloped and burgeoning industrialized countries. They wanted to create the impression that there were both positive and negative forces present at the meeting, setting China up as the positive force and the US as the latter. 

Director of the Central Foreign Affairs Commission of the Communist Party of China Yang Jiechi in Anchorage, Alaska, March 2021 (center). Gertz explains that in the 21st century, “the US is facing the potential of a new world war by miscalculation involving China that has been quietly and systematically building up what it terms comprehensive national power–military, diplomatic, economic–for what the Chinese Communust leadership believes will be an inevitable showdown in creating a new anti-democratic socialist and communist world order without the US.” In his most acidulous commentary, Gertz declares that “the pro-Beijing hands in and out if government were complicit in these policy crimes that deliberately appeased China through a rigid, establishment view that ignored the reality of the People’s Republic and cast it as a normal nation and not as a nuclear armed Communist dictatorship.” Gertz says that it was not until 2015 that the pro-China view was recognized as being no longer sustainable.

Chapter 3: “China Wars: The Failure of Pro-China Appeasement”

In the four decades after the period of reform and opening up began in 1972, Gertz says that “the vast majority among a relatively small and close knit community of China experts who glowed into government policy positions, intelligence agencies, and the officer corps from universities and think tanks produced one of the most serious failures of foreign and security policy in US history.” Gertz explains again that “forty years of willful blindness about China led to the adoption of disastrous policies toward China that have produced a new era of danger many experts see as analogous to the 1930s,” a period when shortsighted diplomats and policymakers prevented the US military from preparing to meet the threat of the growing power of the Japanese Empire. As that story goes, tabletop war games against Japanese forces were forbidden. The ruling elite feared that “it would create a new Japanese threat where there was none.” Gertz says that similarly, pro-Beijing hands created another strawman argument for the appeasement of China. In the aggregate, the result according to Gertz has been “a devastating run of policies toward Beijing that avoided all reference to China’s illicit activities and behavior from the massacre of unarmed pro-democracy students in Beijing’s Tiananmen Square in 1989, to China’s role in stealing US secrets on every deployed nuclear weapon in the US arsenal and hastening their spread globally by supplying nuclear warhead design secrets to Pakistan.”

Cuiusvis hominis est errare, nullius nisi insipientis, in errore perseverare. (Any man can make a mistake, only a fool keeps making the same one.) Gertz explains that in the 21st century, “the US is facing the potential of a new world war by miscalculation involving China that has been quietly and systematically building up what it terms comprehensive national power–military, diplomatic, economic–for what the Chinese Communust leadership believes will be an inevitable showdown in creating a new anti-democratic sociakist and communist world order without the US.” In his most acidulous commentary, Gertz declares that “the pro-Beijing hands in and out if government were complicit in these policy crimes that deliberately appeased China through a rigid, establishment view that ignored the reality of the People’s Republic and cast it as a normal nation and not as a nuclear armed Communist dictatorship.” He goes on to state the dominant pro-China community of both officials and non-government experts “inflicted serious damage on US interests by consistently producing biased and misleading assessments on both China’s intentions and capabilities.” Gertz says that it was not until 2015 that the pro-China view was recognized as being no longer sustainable.

As greatcharlie discussed in its March 29, 2021 post entitled, “Listening to and Understanding the Positions of Others: A Requirement for Thoughtful and Fruitful Talks in All Cases,” diplomacy has been defined as the established method of influencing the decisions and behavior of foreign governments and peoples through dialogue, negotiation, and other measures short of war or violence. In its practice, its key for negotiators to ensure the other side is listening and understanding what they are communicating. That necessitates managing negotiations without arousing hostility. Any awkward situations must be handled with tactfulness. 

Although only in office for a few months at the time of this writing, the administration of US President Joe Biden and Vice President Kamala Harris presumably has used US citizens, individuals with the very best reputations to contact Beijing through so-called back channels. Those individuals would be doyens, men or women of the world with a natural turn for diplomacy, and for discreetly presenting issues of concern and arranging delicate matters as a point of honor for Washington. China appears to commit itself to nothing where the US and Western countries are concerned, or where any other country is concerned for that matter. China’s government is founded on a movement that produced a revolution. It believes it provides a way of living based on Mao’s teachings that should be embraced for all humanity. It will never be satisfied until it puts the rest of the world’s government’s on a solid footing in that direction.

Whether diplomats, intelligence officers, Communist Party of China operatives, or businessmen, they spout the old propaganda line while overseas, “Communism is the wave of the future.” The Biden-Harris administration’s policy makers will have ample opportunity to test theories on how to get the best results from US bilateral relations and economic competition with China. Gertz does not use page space to present readers with exact details of how the US has bargained and negotiated with China, or the tone heard during opportunities in which they communicated bilaterally. The outcomes of such talks speak for themselves. It is one thing to establish a competitor firmly in one’s mind to help drive the effort “to up one’s game.” It is wholly another thing to seek something akin to world domination and to find a way up by stealing from, forcing out, and stepping upon, others. China is attempting to do all of the latter to the US. China will almost always be happy to meet with US officials to negotiate and sign any agreements both to humor themselves, satisfy those among US policy makers and decision makers naive enough to believe there would be any hope of hampering China’s march to dominance, and mollify others who may “fear” the change that Beijing assures is coming.

Qui cumque turpi fraude semel innotuit, eriemsi verum dicit amittit fides.  (Whoever has once become known for a shameful fraud, is not believed even if he speaks the truth.) One could go as far as to say it is delusional to persist in communicating entreaties of that kind to Beijing. This is especially true when it is clear how the troubling behavior in question is associated with China’s quest for dominance. There is no shortage of ambition. One cannot show a tender conscience to Beijing without soon facing a test of will or other undesired effect. The next generation may say preceding ones were dull indeed not to recognize and respond to China’s maneuvers. To go on in partnership with the Chinese, US administrations have forgiven, while not warranted, its worsening behavior. They have forgiven much. Diplomatic outcomes on contentious matters may often be part of larger arrangements, schemes of the Chinese. Indeed, Chinese negotiators will expect that parties to a negotiation will be willing to accept and start with the conditions they initially present. They will strenuously negotiate. If the Chinese can find no flexibility and no further room for satisfactory results from the negotiations they may alter their position more in line with the other party’s terms. The other party may be eager to accept China’s new amiable terms but they may be unaware that there could be a catch. A follow-on malign action, may weaken the benefit of any settlement on the same original matter. An opportunity for the Communist Party of China to test the the virtues of this approach presented itself with the Trump administration when it negotiated and signed a trade agreement in 2020. The Communist Party of China was already aware of the burgeoning COVID-19 crisis at home. It no longer appears Beijing is disposed to negotiating fairly, nobly, on anything. This may appear all the more the case as Beijing may feel it is moving closer and faster to its goal of overcoming the US as the world’s dominant power. After examining this, readers should recall the discussion earlier in this review of the “decieving the sky” strategy ascribed to China’s approach. It is very fitting. Quite so!

By the time the second action is realized by the second party, be it the US or otherwise, it is usually still too unfathomable to imagine that the more malign outcome was sought all along by China. By the time it may be accepted by the second party that every step taken by China was part of one larger scheme, the dye will have long since been cast. In its business of conquest, Beijing almost always does everything completely. China’s efforts in this manner do not seem to have an end.

US political leaders must be willing to do the hard yards to ensure its position is protected. This is not a situation that can be nuanced through talks at the negotiation table. China will not surrender any of its gains or leave what appears to be clear paths to its objective for anything the US might offer, except surrender or capitulation.

However, those US political leaders might also consider the words of Paine, 18th Century American political writer, theorist, and activist of the American Revolution asserted in The Crisis No. V (1778): “To argue with a man who has renounced the use and authority of reason, and whose philosophy consists in holding humanity in contempt, is like administering medicine to the dead, or endeavoring to convert an atheist by scripture.”

Workers in a high-tech facility in China (above). Gertz explains that an expert source in the US Intelligence Community revealed to him that Chinese intelligence operations only began receiving the attention they deserved in the late 2010s after China stopped using more cautious methods and adopted bolder approaches to stealing secrets and recruiting spies. Citing a retired source from the US Intelligence Community, Gertz notes that Chinese intelligence activities are akin to a storm. That Chinese intelligence storm is a secret assault on the US that is without parallel since that mounted by the Soviet Union in the 1930s and 1940s. Gertz explains that current Ministry of State Security recruitment efforts are focused on all US citizens with access to secrets China wants. Those secrets come in two main categories: counterintelligence information about Chinese working for US intelligence, and government secrets and even openly available information that will boost China’s military and civilian modernization and industrialization programs.

Chapter 8: Chinese Intelligence Operations

In Chapter 8 “Chinese Intelligence Operations”, Gertz takes the reader into the arcane world of espionage via the operations of Chinese intelligence services in the US. US counterintelligence services have tried to grapple with the matter of Chinese espionage, however the situation with the activities of Chinese intelligence services nevertheless has become an impossible one for them. The anecdotes that Gertz presents well depict the course of that intelligence struggle. He reconstructs the drama of each case. He does this so clearly, that one would believe that he was present in each case to watch events unfold.

At the core of the chapter’s discussion, Gertz explains that today, the Ministry of Public Security (MPS), Ministry of State Security (MSS), and People’s Liberation Army (PLA) intelligence agencies, along with the United Front Work Department, a Communist Party intelligence unit, are the leading forces of China’s intelligence power. Gertz supports the well-established view that the power of those services is focused solely on maintaining and expanding the power of the Communist Party of China in its drive for global domination. At the end of the chapter, Gertz briefly explains that there was ano important reorganization of the PLA intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence capabilities (including cyber, signals, and imagery intelligence) now resides with the new Strategic Support Force under the Central Military Commission. To provide a bit more detail on that transition, the Second Department of the People’s Liberation Army, responsible for human intelligence, the Third Department of the People’s Liberation Army, the rough equivalent of the National Security Agency, responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army, responsible for electronic warfare have been rolled into the new Strategic Support Force. The PLA’s human intelligence operations are managed by the Joint Staff Department, and comes under the Central Military Commission. Surely, Gertz is aware of all of this. However, as the main focus of Deceiving the Sky was shed light on the realities of China’s attitudes and behavior, actions and intent, with regard to the US, it was reasonable for him to preclose where he saw fit in his discussion of the Chinese intelligence services.) As for the United Front Work Department, as mentioned earlier in this review, it is one of four key bodies of the Communist Party of China’s bureaucracy at the central level for building and exercising political influence outside the party, and especially beyond China’s borders. The other three are the Chinese People’s Political Consultative Conference, the International (Liaison) Department, and the Propaganda Department.

Regarding MPS, Gertz says that it is the Chinese version of what has been called intelligence led policing that seeks to preempt crime. Yet, unlike the West, where laws limit the activities of police and security services, Gertz says Chinese security operations have few boundaries. One feature of the MPS is a system called “the Big System” that seeks to fuse masses of data from Chinese police and intelligence services into one program. Big intelligence is the intelligence version of the PLA’s drive for “informatization,” a term used for high technology analysis activities. 

Gertz informs that the massive police intelligence apparatus promises to make it more difficult for those seeking democratic political reforms in China to operate. As Gertz puts it, dissidents and enemies of the state as well as actual criminals will find it hard to plan and organize without leaving behind digital breadcrumbs that security services can collect and connect. He notes that theos MPS has also created the Golden Shield, a military style command structure designed to share intelligence throughout China. The systems have created pathways designed to breakthrough bureaucratic obstacles and link data. Golden Shield involves automatic analysis and cloud computing for analyzing masses of data including computerized facial, voice, and gait recognition. While MSS and PLA focus their spying operations on technology acquisition, MPS agents are engaged in spying on Chinese dissidents in the US.

Citing a former CIA director of counterintelligence, Gertz notes that Chinese intelligence activities, lay those of MSS and the PLA, are akin to a storm. That Chinese intelligence storm is a secret assault on the US that is without parallel since that mounted by the Soviet Union in the 1930s and 1940s. Gertz appears absolutely taken by the fact that penetration of US national laboratories has led to the loss of at least six nuclear weapons designs and the enhancement of Chinese offensive and defensive capabilities. Gertz explains that current MSS recruitment efforts are focused on all US citizens with access to secrets China wants. Those secrets come in two main categories: counterintelligence information about Chinese working for US intelligence, and government secrets and even openly available information that will boost China’s military and civilian modernization and industrialization programs. The modus operandi of MSS counterintelligence Includes the recruitment of foreign intelligence officers and their agents for work as double agents. Gertz tries to get to the center of the mystery of how MSS was able to completely destroy the CIA’s networks in China through combination information from an operative within the CIA and communications system breach. An estimated 30 agents were caught of which three were killed.

Beyond its own human intelligence activities, the PLA, particularly what Gertz, as mentioned, still refers to as the 3rd Department of the PLA, has engaged in a cyber campaign which has inflicted considerable damage to include the theft of sensitive government trade and industrial secrets.

Much Gertz explains here, greatcharlie has also observed in previous posts that little progress has been made in halting it or even making a discernible dent in Chinese intelligence operations. Many minds in the US national security bureaucracies are certainly working fiercely on this matter of utmost importance, but too few facts have been collected for them to run on to break new ground or produce anything worthwhile for that matter. Trails of espionage may lead to the MSS and PLA, directly in many instances, but those who commit the devilry of spying on Beijing’s behalf, in the US and from China, are seldom caught. With estimates as high as 25,000 Chinese intelligence officers, operatives, and informants on the loose in the US, it is difficult even the most partisan observers such as greatcharlie to deny China has secured a massive advantage for itself. Publicly, there appears to be not much of anything comparable achieved to knock back Chinese espionage. If US counterintelligence services had ever managed to achieve some significant breakthrough on the Chinese intelligence front, one would hear “singing in the valleys.” US intelligence services, much as those of other countries, abhor the prospect of public scrutiny, but it is too late now to be concerned by such anxiety.

The deluge of Chinese espionage has torn away so much information, eroded so many formerly reliable defenses, that each day the situation moves closer to the tragic and the terrible. Hopefully, among possible dissenters, an interest, not solely due to exigency, will grow on the idea. Chinese intelligence services have hampered the work of US businesses, research and development firms, high-tech firms, academia, and the federal government itself. They have created spy networks within institutions critical to US economic security and defense. They have attempted to inconvenience the US in its efforts to improve bilateral and multilateral relations in under developed, less industrialized countries and even long time friends of the in certain regions, and multilateral institutions that the US actually had a hand in creating.

In Aristophanes’ play, Birds (414 BC), the character Epops states: “The wise can often profit by the lessons of a foe, for caution is the mother of safety. It is just such a thing as one will not learn from a friend and which an enemy compels you to know. To begin with, it’s the foe and not the friend that taught cities to build high walls, to equip long vessels of war; and it’s this knowledge that protects our children, our slaves and our wealth.” Chinese intelligence services, perhaps at one time, expecting to face something out of the ordinary, that US counterintelligence services would have a few tricks up their sleeves, have not been challenged in any way that has halted or deterred their cyberintelligence or human intelligence activities. Chinese intelligence services have unfortunately managed to do their job successfully, collecting mountains of secret and information from the government bureaucracies and research and development sites, private businesses, high-tech firms particularly, academia, and think tanks. Surely there must be an atmosphere of optimism in the halls of the headquarters buildings of the Chinese intelligence services. The Communist Party of China most likely delights that without openly admitting to possessing such intelligence capabilities, at least through perception, it has that power over the US. 

One can imagine that on more than one occasion, resources, energy, and time were squandered following a false scent. (God help those who have been wrongfully suspected and falsely accused by mistaken or errant officers of any of the US counterintelligence service. It happens. No amount of reparation could ever fix the psychological and material damage very likely done to innocent targets and their loss of reputation and honor.)

Nam qui peccare se nescit, corrigi non vult. (If one doesn’t know his mistakes, he won’t want to correct them.) Perhaps US counterintelligence services are applying old ways of thinking to a new type of intelligence struggle that bears little resemblance to previous ones. The key to it all remains out there somewhere. Finding those who would be capable and disposed to sniff it out using traces available would seem to be the real task ahead. One might presume that US counterintelligence services would hardly imagine anyone from outside the bureaucracy would be capable of producing some shred through their amateur study of the matter. Indeed, some senior executives and managers of US counterintelligence services, determined to stand as solid pillars of standard thinking and behavior that will not be blown down by the winds of change, may brook the idea of bringing in outsiders to handle sensitive matters. They may be mistaken. 

The solution to this espionage riddle, at least based on public reports, appears no closer within their reach. If the matter has not indeed already been settled, it may seem to some that it is at least at the edge of the end. The chance for US counterintelligence services to exhale will not come for a while. Chinese intelligence services do intend to let it come at all. US counterintelligence services have not despaired of getting a handle on the situation. Uppermost in the minds of senior executives and managers in US counterintelligence services is whether anyone within the bureaucracy can produce the magic that will allow them the ability to gain and retain the initiative in a cause that appears to be lost. They must press ahead on the forward foot.

A US B-2 bomber and two US F-22 fighter jets fly in formation (above). The rocky nature of US relations with China is a matter of great urgency. Yet, Gertz is not planting seeds of war in a time of peace. Despite how he labels his conclusion, he does not propose war as a solution. He still holds hope that US officials will come across something along the way that might bring a solution to the crisis. Gertz explains that there is a growing bipartisan political consensus that new strategies and policies urgently are needed to deal with China. Ostensibly to assist in that effort, he presents a set of 14 recommendations for a policy of liberation for the Chinese people from the yoke of Marxist-Leninism with Chinese characteristics.

Conclusion: What Is to Be Done? Declare China an Enemy, Liberate the Chinese People

Readers might recall the words of the 16th century Italian diplomat and political theorist Niccolo Machiavelli in his famous instruction guide for new princes and royals by The Prince (1532): “There are two ways of contesting, the one by the law, the other by force; the first method is proper to men, the second to beasts.” The rocky nature of US relations with China is a matter of great urgency. Yet, Gertz is not planting seeds of war in a time of peace. Despite how he labels his conclusion, he does not propose war as a solution. Prosing out on that matter, he still holds hope that US officials will come across something along the way that might help them develop a solution to the crisis.

Gertz explains that there is a growing bipartisan political consensus that new strategies and policies urgently are needed to deal with China. He does not believe it will be impacted by what he calls the national predicament, a seeming loss of clarity amid increased political polarization. To assist in finding that solution, he presents a set of 14 recommendations for what he hopes will be a policy of liberation for the Chinese people from the yoke of Marxist-Leninism with Chinese characteristics. Gertz emanates a sense of assurance in his writing that the recommendations he offers in Deceiving the Sky would obtain good results.

Each of the 14 recommendations is sufficiently self-explanatory, some are accompanied here with a précis of his summary on it or greatcharlie’s own comments on it. Together, his recommendations have a cumulative effect. They include: 1) Information: Conduct aggressive competition in the realm of ideas. He proffers that the first step in creating a free and democratic China would be regime change, an effort to peacefully oust Communist Party of China; 2) Reciprocity: Restrict access by China to the US in ways equal to Chinese restrictions. A key measure would be to counter Chinese financial warfare with a US program of economic warfare; 3) Intelligence: Shift the focus and operating methods of American intelligence toward more robust and aggressive operations and more effective analysis. Rather than accept being pushed back on its heels, Gertz recommends that the US Intelligence Community should step up aggressive intelligence and counterintelligence operations against the Communist Party of China and the PLA; 4) Foreign Policy/Diplomacy: Restructure and Reform the diplomatic system. Such reforms would need to be implemented in a way that would allow the US to better confront and counter growing Chinese hegemony; 5) Alliances: Create a pro-freedom, pro-prosperity, and pro-rule of law network in Asia. What was already seen in the Trump administration and still being seen in the Biden-Harris administration is Gertz recommendation that the US develop “a global network of democratic alliances targeting China that will seek to pressure Beijing into abandoning its totalitarian communist system and global designs.”; 6) Cultural/Educational: Severely restrict activities by Chinese nationals in the US who are abusing the American system. Gertz suggests that such activities should be restricted in recognition of the subversion and technology theft threats many unfortunately pose; 7) Counterintelligence: Major strategic counterintelligence operations and analyses should be implemented that focus on aggressively targeting Chinese intelligence and security services; 8) Economic: The US should begin a gradual policy of disengagement from Communist China economically; 9) Financial: Plan and carry out covert financial warfare operations against China; 10) Military Exchanges: The Pentagon and US Military must adopt a new policy that recognizes the Communist Party of China and the People’s Liberation Army as the main enemy; 11) Military Missile Defense: Expand American Regional missile defenses. As part of a strategy of neutralizing China’s massive and growing force of ballistic, cruise and hypersonic missiles, Gertz says US missile defenses around the world should be expanded; 12) Military Gray-Zone Warfare: Develop asymmetric warfare capabilities designed to negate Chinese military, cyber, electronic, and psychological warfare capabilities; 13) Political: Create a Parliament in exile. The creation of a “democratic Chinese parliament in exile” that will develop new policies for a free China is an old chestnut.; and, 14) Russia: Play the Russia card. One might call Gertz the suggestion that the US should play the “Russia card” against China by seeking a free and democratic Russia aligned with the free world somewhat fanciful.

Most notable to greatcharlie in the context of this review is Gertz’s recommendation on “Foreign Policy/Diplomacy: Restructure and Reform the diplomatic system.” In his summary of that recommendation, Gertz suggests that US diplomats and foreign service personnel should be retrained in the use of new and innovative diplomatic methods and techniques for the information age that emphasize successfully implementing new strategic objectives toward China that reject the failed diplomacy of the past. The new diplomacy will be rooted in honest assessments and understandings of the true nature of Communist China. A new objective will be to report on and take steps to force an end to the systematic abuse of human rights in China as a high priority. The US should seek to create a new alliance of nations that will seek to isolate China and spur internal democratic political reforms and promotion of freedom and free market systems in the region. Strategic and economic dialogues such as those in the past that produced no results must be ended. New engagement should be limited to conducting bilateral and multilateral talks on concrete, achievable objectives such as verifiable arms limitation and enforceable trade agreements. It certainly would not be velvety going forward if such a course were followed, but perchance US values and interests would be well-served.

In Deceiving the Sky, Gertz’s research sheds an extraordinary side light on the undeniably aggressive thinking of Beijing. While US political leaders are still in a position to reexamine the facts, they should do so. Surely, if any of them were to take the time to look at Gertz’s book with an open mind, it would given them the necessary nudge to begin thinking in that direction. Deceiving the Sky could also lend support to deliberations among colleagues on the matter. 

There are likely quite a few citizens in the US who have heard about China’s aggressive activities. Surely, they would appreciate reading Deceiving the Sky as it would provide them a firm basis for understanding the many issues involved. As greatcharlie has already stated in this review, information from the text that is discussed here only represents a fraction of what the reader will find in Deceiving the Sky. For greatcharlie, the book was both edifying and a pleasure to read. Without hesitation, greatcharlie recommends Deceivibg the Sky to its readers.

By Mark Edmond Clark

Book Review: James M. Olson, To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019)

In a nine-count US Deparment of Justice indictment filed in an Atlanta federal court in 2017, the four members of the People’s Liberation Army (PLA) in the FBI poster above were accused of hacking into the Equifax credit reporting agency’s systems, creating a massive data breach that compromised the personal information, including Social Security numbers and birth dates, of about 145 million people, nearly half of all US citizens. There is little need but for citizens to read reports in the news media to know foreign intelligence services were operating inside and outside the US with the intention of causing the country great harm. In To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), James Olson places the efforts of dangerous foreign forces front and center. He explains the efforts being taken by US counterintelligence services to unthread the complicated nature of foreign intelligence activities in the US and drive away the dangers they pose.

There is little need but for US citizens to read reports in the news media to know foreign intelligence services were operating inside and outside their country with the intention of causing the country great harm. In To Catch a Spy: The Art of Counterintelligence (Georgetown University Press, 2019), James Olson places the efforts of dangerous foreign forces front and center. However, more importantly, Olson explains the efforts being taken by US counterintelligence services to unthread the complicated nature of foreign intelligence activities in the US and drive away the dangers they pose. As the former chief of Counterintelligence for the Central Intelligence Agency (CIA), Olson is eminently fitted to represent US counterintelligence officers and present their work. In defining counterintelligence, Olson states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” Reportedly, over the years 80 countries, to include allies and friends, have engaged in espionage operations against the US.

As with all other elements of the intelligence industry, counterintelligence work requires wisdom, reason, and logic to be performed well. It is not the nature of intelligence services to regularly use aggression and force to halt an opponent, shut down its networks, thwart its operations, and intercept its intelligence officers, operatives, and informants. The intellect is the tool used for doing so.

From what Olson explains, counterintelligence organizations worldwide must detect necessary attributes of an actor, certain indicia, before initiating a counterintelligence investigation on a suspected “foreign spy” or operative or informant or  foreign intelligence service. The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. That process may not always be easy going. A foreign intelligence officer’s tradecraft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some. Counterintelligence may very well be the greatest manifestation of the paranoia business.

Regarding his career, again, for over thirty-one years, Olson served in the Directorate of Operations of the CIA, mostly overseas in clandestine operations. He was deployed overseas for several assignments, and eventually became chief of counterintelligence at CIA headquarters in Langley, Virginia. At the time he wrote To Catch a Spy, he was retired and working as a Professor of the Practice at the Bush School of Government and Public Service of Texas A&M University. Robert Gates, the former Director of Central Intelligence, 1991-1993 remarked about Olson: “James Olson is a legend in the clandestine service, having served in some of the most difficult, dangerous, and complicated assignments at the height of the Cold War. As director of Central Intelligence, I trusted him without reservation when he was chief of counterintelligence not only because he was enormously capable but also because I knew he thought deeply about the ethical and moral dimensions of what we did every day. Amid the countless books and memoirs of retired spies, especially at this time, this one is essential reading.” Olson was born and raised in Iowa. He studied mathematics and economics at the University of Iowa. Following college, he took a commission in the US Navy, serving aboard guided missiles destroyers and frigates. After a period, he would return to Iowa to study law at the University of Iowa. Apparently, Olson had every intention of practicing law in a small county seat town in Iowa. However, the CIA approached him and invited me to apply for a position in the clandestine service.That us when the story of his life in counterintelligence began.

This book has immediate historic significance because Olson is recognized as an authority among intelligence circles worldwide. There are not so many that have been written so well by former professionals. While others may have their preferences, three of special note and highly recommended by greatcharlie are: Raymond Batvinis, Hoover’s Secret War Against Axis Spies: FBI Counterespionage During World War II (University Press of Kansas, 2014); David Martin, Wilderness of Mirrors (HarperCollins, 1980); and, Scott Carmichael’s True Believer: Inside the Investigation and Capture of Ana Montes, Cuba’s Master Spy 1st ed. (Naval Institute Press, 2007) which Olson refers to in To Catch a Spy.

In Hoover’s Secret War Against Axis Spies–reviewed by greatcharlie on April 30, 2014, the historian, Batvinis, a former Federal Bureau of Investigation (FBI) special agent, presents a crucial chapter in the history of World War II during which the FBI really began and refined its counterintelligence mission. He discusses the FBI’s then new reliance on intrusive investigative techniques (wiretaps bugs, access to bank and financial transaction records), and the evolution of the Bureau’s liaison relations with the British, Canadian, and US military intelligence agencies. (In a proceeding book, his acclaimed, Origins of FBI Counterintelligence (University of Kansas, 2007), Batvinis went off from scratch to tell the reader about the situation.) In Wilderness of Mirrors, Martin tells the story of how an ex-FBI agent William “King” Harvey identified the notorious Soviet double agent Kim Philby in conjunction with James Jesus Angleton, the CIA’s chief of counterintelligence responded to the betrayal of family friend Philby’s betrayal and descends into a paranoid wilderness of mirrors. Wilderness of Mirrors set a benchmark for studies, memoirs, and all other written works on US counterintelligence. It was once required reading for some intelligence professionals–and perhaps it still is. The author of True Believer, Carmichael, was a senior security and counterintelligence investigator for the Defense Intelligence Agency and the lead agent on the successful spy hunt that led to Ana Montes. He provides an inside account of how his espionage investigation, with the eventual help of the FBI, progressed over a period of several years to develop a solid case against Montes. She is the only member of the US intelligence community ever convicted of espionage for the Cuban government. Every twist and turn is all the more intriguing as truths become lies and unlikely scenarios are revealed as reality.

To Catch a Spy is not Olson’s first book. He is also the author of Fair Play: The Moral Dilemmas of Spying (Potomac Books, 2006) Fair Play examines ethical challenges facing US intelligence officers as they attempt to operate within a standard of acceptable moral behavior. That examination is couched in an insightful summary of intelligence history through fifty reality-based scenarios.

To Catch a Spy, 248 pages in length, was released by Georgetown University Press on April 11, 2019. Since then, many others have already formed their own opinion of Olson and his work. For those who may excavate through To Catch a Spy to thoroughly consider points of exposition concerning both himself and activities in which he was engaged, the book has doubtlessly been substantially edifying. The reader is provided with an amazing opportunity to see it all through the prism of a master craftsman as he discusses his profession. Indeed, as with Fair Play, everything Olson provides in To Catch a Spy is founded on his experience during a lengthy career in US counterintelligence. Nevertheless, To Catch a Spy is not a memoir of his life or of his career. That has yet to be written, and perhaps may not be. Still, if one were to go off anyway and measure Olson’s book against the memoirs of Cold War Soviet, Eastern Bloc adversaries of the US there is a decided difference. Those memoirs have a tendency to be anecdote laden, picturesque and exciting. While those who have professionally analyzed them judge them as omitting much, their books typically provide enough nuance to allow for extrapolation, inference, and conceptualization of their tactics, techniques, procedures, and methods. They also often point to their bad choices, pitfalls and ways to minimize losses after encountering them, commonplace wrong turns and remedies to them. That is really what the neophyte needs to receive most.

The author of To Catch a Spy, James Olson (above). Olson is eminently fitted to represent US counterintelligence officers and present their work. For over thirty-one years, Olson served in the Directorate of Operations of the Central Intelligence Agency (CIA), mostly overseas in clandestine operations. He was deployed overseas for several assignments, and eventually became chief of counterintelligence at CIA headquarters in Langley, Virginia. In defining counterintelligence, Olson states that it “consists of all the measures a nation takes to protect its citizens, secrets and technology from foreign spies.” Reportedly, over the years 80 countries, to include allies and friends, have engaged in espionage operations against the US.

Surely for readers thrilled by spy novels, there was enough provided by Olson to allow them to live vicariously through his anecdotes. In the genre of fiction and nonfiction spy stories, there is an artistic milieu in which–often under the demands of publishers who are intensely interested in selling books–writers seek to position themselves amidst. It cannot be denied that human nature instinctively finds entertainment more compelling than edification. Perhaps even among them, there may be some who will decide after reading To Catch a Spy, that there is nothing so outré about counterintelligence. However, often things seem simple once they have been explained.

Among professionals, not only in the US, but worldwide, To Catch a Spy was likely anticipated with baited breath. That stands to reason that this category of reader would be aware that Olson possesses a huge body of thoughts that most US counterintelligence officers on the job today. There was considerable satisfaction among professionals with his first book, Fair Play. They could have only imagined that To Catch a Spy would be another gem. One might perceive while reading To Catch a Spy that Olson subtly takes on the role of instructor, introducing somewhat nuanced details about certain matters in his lecture as if he were trying to impart the full benefit of his experience to prescient, young CIA counterintelligence officers. To that extent that he does all of this, there is a trace of something akin to a pedagogy for developing the reader’s understanding of the world he is moving them through. A quote widely attributed to one of the most influential artists of the 20th century, Pablo Picasso: “Learn the rules like a pro so you can break them like an artist.” To that extent, novice US counterintelligence officers must master the fundamentals, and the foundation will be laid to explore one’s potential with confidence and an assured step with knowledge and experience of those who came before.

One might expect copies of To Catch a Spy, that may be possessed by US counterintelligence officers from the various services, are treasured and well thumbed. Spotted among reviews of the book on Amazon.com are comments from US intelligence officers in which they attest to the value, positive impact To Catch a Spy had on their thinking and their work. Alex J. Vega IV, Joint Counterintelligence Training Activity (JCITA), Defense Intelligence Agency, and Former U.S. Army Attaché, U.S. Embassy, Moscow, Russia wrote: “Jim Olson has shared with us his accumulated wisdom, lessons learned, and roadmap for the future. To Catch a Spy is the new U.S. counterintelligence standard. It is a must read for serious professionals and anyone interested in the spy world. Jim has done a tremendous service, not only to our generation, but also to those of the next who choose to answer the call to join the counterintelligence battle.” Henry A. Crumpton, a twenty-four-year CIA veteran, author of The Art of Intelligence: Lessons from a Life in the CIA’ s Clandestine Service (Penguin Press, 2012), and CEO of Crumpton Group LLC. remarked: “The author, America’s counterintelligence guru, has crafted a remarkable, indispensable book rich in heartbreaking detail and sharp analysis–serving as a clarion call for a stronger response to the unrelenting, sophisticated, and successful foreign espionage assault on our nation.” Robert M. Gates, Director of Central Intelligence, 1991-1993, stated: “Amid the countless books and memoirs of retired spies, especially at this time, this one is essential reading.”

One could safely state that To Catch a Spy has not been everyone’s cup of tea. Despite such glowing expressions of satisfaction and appreciation, there is a view of the book in which it is asserted that Olson really did not dig down so deep on issues in the text to display his full capabilities as a counterintelligence thinker. He could hardly be so profound, or candid at all. Some professionals worldwide who may have acquired a copy of To Catch a Spy were disappointed when they discovered that the text is not heavy with inferences and insights, and analysis supported by references. In fact, such are rather sparse in the book. In Mark Soares’ review of the book in the scholarly journal Intelligence and National Security, (Mark Soares (2020) To Catch a Spy: The Art of Counterintelligence, Intelligence and National Security, 35:7, 1079-1081, DOI: 10.1080/02684527.2020.1746125), he begins by saying: “James M. Olson has written a deeply personal composition of his extensive career to counterintelligence with the Central Intelligence Agency  (CIA) using a loose and relaxed format not typically seen in intelligence literature.” Explaining Olson’s purpose in writing the book, Soares remarked: “To Catch a Spy serves as Olson’s caution to future US intelligence practitioners and to his country as a whole to pay far more attention to counterintelligence matters rather than focusing all efforts on collection.” However, Soares would eventually judge the book critically, stating: “Though To Catch a Spy is undoubtedly an entertaining read, scholars and academics will be disappointed by the absence of references, with Olson opting instead to use informal notes to add background details to organizations,  individuals, tradecraft terms, or historical events mentioned in the book (pp. 203-217). Many of the events described by Olson could have been referenced more properly given the abundance of information available on such topics.”

For security reasons, Olson admits to having doffed his cap to his former employer so to speak by submitting To Catch a Spy to his former employer, CIA, for review. It is a requirement for officials from the US Intelligence Community with backgrounds as Olson. In Olson’s case, his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any information that would provide some nuance on how the US detects and catches spies would be of the utmost interest and importance to the foreign intelligence services of adversaries as well as allies. One can only imagine an individual with his wealth of knowledge is holding back considering how much more he could have potentially ruminated upon in the book. Under such circumstances, it is understandable that Olson’s lack of profundity would disconcert some.

If Olson were writing only for intelligence professionals, he would have a diminutive audience. While some US counterintelligence professionals might nonetheless view it as their book, To Catch a Thief is a book published for the largest audience possible. To that extent, Olson does not take for granted how much the reader can absorb from what he teaches. It is evident that he takes control of that process, apportioning how much of the story he feels would be appropriate. When he feels the reader should be ready for more, Olson increases the quantity and complexity in his anecdotes.

Even after what could be sardonically characterized as Olson’s generous effort to spoon-feed some readers, other concerns about how the book was written were voiced by reviewers from outside of the profession. In the New York Journal of Books, Michael McCann wrote: “To Catch a Spy struggles to the finish line far behind many other, better publications in terms of immediate relevance. Which invites an important question: Who is Olson’s intended audience?” On that point McCann goes on to state: “To Catch a Spy will provide a useful textbook for students taking Olson’s courses at the Bush School. No doubt they will be quizzed on his ten commandments, the three principles of workplace counterintelligence, and other key points. It will also help them write summaries of important counterintelligence cases over the years and the lessons learned from them.” Leaving no doubt that he was disappointed by the book, McCann states: “For the general reading public, however, To Catch a Spy doesn’t really appeal. Those looking for “juicy new disclosures” will be disappointed as they wade through material just as easily accessed at no cost by googling for it online.”

In its review, greatcharlie, using its understanding of the subject as a nonpracticioner, observing from outside the bureaucracy, follows those aspects of the book closely. The last outcome greatcharlie wants is for its review to boil down to discussion of “Olson left this out. He left that out. He did not elaborate enough here or there.” Despite any concerns about what was missing in the text, in its review of To Catch a Spy, greatcharlie explores what one can appreciate and learn about Olson’s thinking process from what he does provide in the text. However, what is most impressive about To Catch a Spy to greatcharlie is the manner in which it stimulates thought on the issues presented. Books that can stir a fire inside the reader, and a passion for a subject, are the most memorable and most enjoyable to sit with. To that extent, included in the review are greatcharlie’s own thoughts about counterintelligence topics covered by Olson which hopefully will assist some readers in better understanding what Olson is presenting to them. It is also hoped that thoughts shared by greatcharlie will encourage readers to weigh  their own impressions on those topics and develop of their own insights on them whether they may be actual intelligence practitioners or just enthusiasts. Additionally, greatcharlie offers its own thoughts on those topics to assist in giving context to the work of US counterintelligence to the US public, nonprofessional readers, in particular, and, in turn, offer some perspective to the counterintelligence professional on how the ave4age US citizen perceives his or her work. With any luck, what is presented will appropriately resonate among both sets of readers. Rationale enim animal est homo. (Man is a reasoning animal.)

The Headquarters of the Russian Federation SVR in Yasenevo (above). The first three chapters of To Catch a Spy  form a compendium of efforts Olson spotlights of respective Chinese, Russian, and Cuban foreign intelligence services against the US. This is a matter that absolutely merits treatment particularly for the sake of the intelligence enthusiasts and the nonpracticioner. It is great that Olson broached the matter early in his book. The intelligence services of China, Russia, and Cuba are driven by the same concepts and intent that typically drive the leadership of their respective authoritarian countries: greed, cruelty, and lust for power, even world domination. It is fairly well-known outside of the intelligence world that China has concerned the US greatly of late.  Olson’s compendium of adversarial intelligence services activities essentially provides a run down of those respective adversaries’ intelligence operations, both successes and defeats. Much of the information on the cases used to support any small assertions by Olson on the nature of these adversaries’ respective efforts has already been made public. In fact, they were presented in some detail via US Department of Justice indictments and criminal complaints for those cases.

Country Reports on the Main Adversaries of the US

The first three chapters of To Catch a Spy  form a compendium of efforts Olson spotlights of respective Chinese, Russian, and Cuban foreign intelligence services against the US. This is a matter that absolutely merits treatment particularly for the sake of the intelligence enthusiasts and the nonpracticioner. It is great that Olson broached the matter early in his book. The intelligence services of China, Russia, and Cuba are driven by the same concepts and intent that typically drive the leadership of their respective authoritarian countries: greed, cruelty, and lust for power, even world domination. It is fairly well-known outside of the intelligence world that China has concerned the US greatly of late.  Olson’s compendium of adversarial intelligence services activities essentially provides a run down of those respective adversaries’ intelligence operations, both successes and defeats. Much of the information on the cases used to support any small assertions by Olson on the nature of these adversaries’ respective efforts has already been made public. In fact, they were presented in some detail via US Department of Justice indictments and criminal complaints for those cases.

Suspected spy for the Communist Party of China, Christine Fang (above). It was revealed in 2020 that Fang had established contacts and some relationships with several political officials from mayors and local council members, to Members of the US Congress as part of an effort by China to infiltrate US political circles. Olson explains that the Chinese have been trying to influence US political campaigns through illegal contributions since at least the 1990s. Olson says China is in a class by itself in terms of its espionage, covert action, and cyber capabilities. He admitted the US was not doing enough now to prevent China from stealing its secrets. Olson reports that the goal of China’s massive espionage, cyber, and covert action assault on the US is to catch up with the US technologically, militarily, and economically as quickly as possible.

China

Olson explained that China is in a class by itself in terms of its espionage, covert action, and cyber capabilities. He admitted the US was not doing enough now to prevent China from stealing its secrets. Olson explains that the goal of China’s massive espionage, cyber, and covert action assault on the US is to catch up with the US technologically, militarily, and economically as quickly as possible. Olson asserts that if the average US citizen fully understood the audacity and effectiveness of this campaign, they would be outraged and would demand action. 

There were four important disclosures by Olson on Chinese espionage, which, despite claims from some reviewers were well-known, in greatcharlie’s view can at least be said to have been given “proper” additional light in his discussion. They include the restructuring of the Chinese intelligence services, the political work they do in the US, concerns that a possible mole is ensconced in the US Intelligence Community, and again, the enormity of Chinese espionage. Regarding the Chinese intelligence apparatus, he explains that it was restructured in 2015 and 2016. The principal Chinese external intelligence service is the Ministry of State Security (MSS)., which is responsible for overseas espionage operations. The Ministry of Public Security (MPS) concentrates on domestic activities but also occasionally runs agents abroad. The MSS and MPS were relatively unaffected by recent organizational changes in the Chinese intelligence community. The major impact has been on the People’s Liberation Army  (PLA), which since the 1950s has been heavily engaged in intelligence operations. The PLA in theory has concentrated on military intelligence, but it has actually defined its role more broadly. Olson reports that it has competed with the MSS in a wide range of economic, political, and technological intelligence collection operations overseas, in addition to its more traditional military targeting. The PLA is still responsible for the bulk of China’s cyber spying. However, Olson points to indications that the MSS has been assigned an expanded role in this area as well. Concerning how it is all organized, Olson reveals that the PLA’s human intelligence (HUMINT) operations are managed by the Joint Staff Department, and comes under the Central Military Commission. The previous breakdown of the PLA into intelligence departments has been eliminated. Oversight of the PLA’s technical intelligence like certainly capabilities (including cyber, signals, and imagery intelligence) resides with the new Strategic Support Force under the Central Military Commission.Thus, the Second Department of the People’s Liberation Army (2PLA), responsible for human intelligence, the Third Department of the People’s Liberation Army (3PLA), the rough equivalent of the National Security Agency (NSA), responsible for cyber operations, and a Signals Intelligence, or a Fourth Department of the People’s Liberation Army (4PLA), responsible for electronic warfare have been rolled into the new Strategic Support Force. Olson explains that much as all intelligence services worldwide, both the MSS and the PLA make regular use of diplomatic, commercial, journalistic, and student covers for their operations in the US. They aggressively use Chinese travelers to the US, especially business representatives, academics, scientists, students, and tourists, to supplement their intelligence collection. Olson takes the position, disputed by some experts, that Chinese intelligence services take a vacuum cleaner approach and collect literally any kind of data they can get their hands on in the US.

Olson explains that the Chinese have been trying to influence US political campaigns through illegal contributions since at least the 1990s. He points to the huge row raised in 1996 when the Washington Post reported that the US Department of Justice was investigating possible illegal Chinese contributions to the Democratic National Committee (DNC) in an effort to influence both the Presidential and Congressional election that year. After getting into a handful of pertinent details about two Chinese businessmen, Johnny Chung and John Huang, Olson explains that the FBI determined that the 1996 illegal funding operation was coordinated from the Chinese Embassy in Washington. Olson says the issues at stake for the Chinese government are not difficult to devine: US support to Taiwan, intellectual property law, trade policies, the environment, human rights, and Asian security. China denied any role in the influence buying. Going a step further, Olson warns that candidates of both political parties have been targeted for influence buying. Chinese hackers have been detected in the campaign websites of both candidates in every presidential election since 2000, another indication that the threat of Chinese election tampering has not gone away. In 2016, Virginia governor Terry McAuliffe was notified by the US Department of Justice that he was the target of investigation for allegedly accepting a questionable campaign contribution of $120,000 from Chinese businessman Wenqing Wang. McAullife was not charged with any crime. There has been considerable controversy lately about alleged Russian tampering in the US presidential Election of 2016. Such allegations, Olson duly notes, should  be investigated thoroughly, of course, but he points out that the Chinese have been engaged in such activities for 20 years.

Olson notes that in a May 20, 2017 New York Times article informed that 18 to 20 of the CIA’s best spies inside China had been imprisoned or executed. The New York Times based its information on “ten current and former American officials” who chose not to be identified. According to Olson, the losses actually occurred between 2010 to 2012 and effectively wiped out the CIA’s excellent stable of assets inside the Chinese government. Olson proffers, “If true, this disaster is eerily reminiscent of the decimation of the CIA’s Soviet agent program in 1985.” The fact that Olson would even discuss the New York Times report in To Catch a Spy, gives the story far greater credence than it would have otherwise. With regard to what occurred from 1975 to 1985, the CIA built up a remarkable inventory of well-placed agents inside the Soviet Union–only to see them disappear, one by one, because of what Olson describes  “the perfidy” of Edward Lee Howard and Aldrich Ames. According to the New York Times report, the CIA’s counterintelligence theories about what went wrong in China have mirrored the same avenues that  it explored after 1985. Olson laid out a few of the questions that were asked by US counterintelligence services: “Could our compromises have been the result of sloppy tradecraft? We’re we being beaten on the street? We’re our secret communications being intercepted? Or did we have a mole?”

Olson says arrests in rapid succession in a compressed period usually point to a mole. In fact, a former CIA case officer, Jerry Chun Shing Lee, was arrested by the FBI in January 2018 and charged with espionage. After Lee left the CIA in 2007, he moved to Asia with his family and was doing business there. In 2010, he was allegedly approached by Chinese intelligence officers. If, as alleged, Lee gave up the identities of CIA spies in China, Olson believes he either took notes with him when he left the agency in 2007 or remembered who they were. Olson reports that the FBI, as part of its investigation, was looking closely at deposits made to Leeds bank account. It took 9 years to catch Ames. Olson states: “I hope it will not take that long to figure out what happened in China and, if the problem is in fact human, to bring the traitor to justice.

Olson submits to the reality that enormity of the Chinese espionage effort is staggering, noting that the FBI announced in 2015 that it had seen a 53 percent increase in economic espionage against US companies over the previous year, and most of it from China. US companies remain extremely vulnerable despite being aware of the Chinese threat. According to Olson, the MSS and PLA primarily play the ethnic card in their recruitment operations. They target a large number of ethnic Chinese–the “overseas Chinese”–who live in the US and virtually every other country in the world. Still, the MSS and PLA would also engage in nonethnic recruitment of US citizens. Those nonethnic recruits, Olson says are few in number, have done serious damage given reports on their activities.

Olson presents the statistic that approximately 4 million ethnic Chinese in the US are only a generation or less from the mainland and great numbers of them still have relatives in Communist China. He says many of them also still feel pride and sympathy for the culture and accomplishments of China, particularly the build up of economic and military strength under Mao and his successors. Olson states that the common tactic is to play on loyalty to Mother China and to exert pressure via relatives still living in China. A Chinese-American working in the US government or in a high-tech firm would usually be approached on that basis, but he notes that venality and greed can also play a large role in any recruitment of a spy. Olson says that all US citizens who visit China are assessed as potential recruitment  targets–and those who he access and show susceptibility are singled out for aggressive development. To emphasize how well Chinese recruitment efforts work, Olson provides a partial listing of Chinese-Americans who have fallen to this trap, the information they were instructed to collect, and where they were located: US Navy Lieutenant Commander Edward Lin, caught providing classified military information; Szuhsiung Ho, caught recruiting six other US engineers to provide nuclear technology to China; Peter Lee, caught providing naval technology and defense information to China; China Mak, caught passing classified information on surface ships and submarines; Fe Yei, caught stealing computer microprocessor technology for China; Walter Lian-Heen Liew, caught providing chlorides-route titanium dioxide production technology to China; and, Greg Chang, caught providing proprietary information on the US space program to China. Olson then devotes a page and a half to the case of Katrina Leung, whose objective was not to steal technology but to infiltrate US counterintelligence. His account provides less about tradecraft, having been errantly recruited by the FBI as a counterespionage agent, she used and told more about the details of her relationship with two FBI counterintelligence officers, James Smith and William Cleveland.

As for nonethnic recruits of the MSS and PLA, Olson presents summaries of the cases of Benjamin Bishop, caught passing classified defense information to his young Chinese girlfriend; Candace Claiborne, having served in Shanghai and Beijing as a State Department employee, she was caught cooperating with Chinese intelligence; and, Glenn Duffie Shriver, recruited by MSS while visiting China as a student was caught delivering stolen military technology to his intelligence handlers. Curiously, even though Olson explains that he has presented only a partial list of ethnic and nonethnic recruits caught by US counterintelligence services, the list appears rather diminutive given his own admission that there is a vast Chinese intelligence collection effort currently underway in the US. There would surely be some reason for US counterintelligence services to be proud of the outcome of investigations into the activities of those captured. However, far more will need to be done before they begin to even stem Chinese espionage in the US. (A discussion of the transition from ethnic to non-ethnic recruitment by can found in greatcharlie’s July 31, 2020 post entitled “China’s Ministry of State Security: What Is this Hammer the Communist Party of China’s Arm Swings in Its Campaign against the US? (Part 1).”

Olson touches on two recurring themes in discussions on Chinese intelligence: students and cyber attacks The question of Chinese students in the US, is especially pertinent. According to another statistic that Olson offers, in 2016-2017 there were 350,755 Chinese nationals studying at US colleges and universities, accounting for approximately one third of the total of international students in our foundry. He points to that fact that a large majority of Chinese students are studying science or engineering, fields that have direct relevance to China’s industrial and military aspirations. Olson reveals that many Chinese students are encouraged by Chinese intelligence to remain in the US, to obtain employment, and to acquire lawful permanent resident status. Lawful permanent residents can apply for US citizenship after five years of residence, three years if they are married to a US citizen. Naturalized US citizens are eligible for US government security clearances after five years of citizenship. Olson says these regulations represent a trade off between our need for certain skills–particularly technical skills–and security. Olson notes that the US Intelligence Community feels any intelligence service worthy of the name would jump at the chance to infiltrate its officers and co-optees into government agencies, national laboratories, and high technology firms of a priority target country. While admitting that he had no data to support that position, he says it is inconceivable to him that the MSS and PLA would have overlooked this enticing and easily exploitable path to access.

Regarding cyberattacks from China, Olson notes that they are nothing new. The first major attack was discovered in 2005, but it was quickly determined that infiltrations of US government computer networks had been going on since at least 2003. Olson relates that the 2003 operation, dubbed Titan Rain, was a coordinated attack by Chinese cyber spies to download sensitive Data from networks at the US Departments of Defense, State, Energy, and Homeland Security, as well as a host of US defense contractors. In one day, the hackers stole reams of sensitive aerospace documents with schematics of propulsion systems, solar paneling, and fuel tanks for NASA’s Mars Reconnaissance Orbiter. Other targeted locations included the US Army Information Engineering Command, the Naval Oceans Systems Center, the Missile Defense Agency, and US national laboratories. Olson says cyber attacks such as Titan Rain present a unique challenge in terms of attribution. In the case of Titan Rain, however, Olson explains that it is not credible to conclude that a multifaceted and sophisticated operation of this magnitude could be anything other than a Chinese government-sponsored activity.

In 2010, Google announced that the company had detected a “highly sophisticated and targeted attack on [its] corporate infrastructure originating from China that resulted in the theft of intellectual property from Google.” While China’s involvement in cyber attacks was by no means surprising, Olson supposes Google’s decision to publicize the breach was unusual. Typically, companies are wary of publicizing such leaks for fear that perceptions of insecurity could negatively affect their business. The explanation may lie in the fact that Google executives, who had continually met resistance from the Chinese government regarding censorship since the company had entered the Chinese market in 2006, finally decided enough was enough.

Google first learned of the attack from Chinese human rights activists in the US who had reported that their Gmail accounts had been accessed by unknown users. As details of Operation Aurora, as it was called, surfaced, it became clear that the attack was highly tailored and complex. The cyber spies exploited a flaw in Internet Explorer 6.0 to gain access to targeted computers. Once the vulnerability was identified, the hackers determined which officials at various companies had access to sensitive information. Emails that, once opened, installed malate on the target computers were then sent from servers in Taiwan to the chosen company officials. The hackers from then on had unfettered access to the officials’ computers and could steal any information they deemed valuable. Google was not the only US firm targeted by the Aurora cyber spies. No less than 34 companies, to include Yahoo, Symantec, Adobe, North run Grumman, and Dow Chemical, were victimized. The Washington Times reported, “Each of the companies was targeted differently, using software developed from the attackers’ knowledge of the individual networks and information storage devices, operating systems, the location of targeted data, how it was protected, and who had access to it.” According to federal cybersecurity experts, attacks of Aurora’s precision and sophistication could be achieved only with substantial the government’s support.

Perhaps the most egregious of all the attacks on US computer systems became public in June 2015, when the Office of Personnel Management (OPM) announced that its database had been breached by unknown persons. The personnel records of 21.5 million US government employees, past and present–including Social Security numbers, biographical information, and the results of security background investigations–were stolen. The information, in Olson’s informed view, would be a gold mine for any intelligence service seeking to spot, access, and develop US government employees for future recruitment. The US Intelligence Community placed blame for the attack squarely on China. Beijing denied any official responsibility for the breach and, in fact, announced in December 2015 that it had arrested a small group of nongovernmental hackers for having committed the crime. No information was provided on the hackers’ identities, place of deployment, or sentencing. Skeptics suspected a convenient cover-up to ease tensions with the US before a scheduled visit of People’s Republic of China President Xi Jinping. Olson s that the only Chinese entity, state sponsored or otherwise, that he could think of that would have a motive for stealing all the OPM data is the MSS. The administration of US President Barack Obama signed a bilateral agreement in September 2015 pledging that neither side would use cyber attacks to steal intellectual property for commercial purposes. According to Olson, a US cybersecurity company documented a Chinese cyberattack on a US company the day after the agreement was signed. In the three weeks that followed, there were at least seven more attacks from China against US high-tech companies. 

The current director of the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, Sergey Naryshkin (above). Second place on Olson’s list of  counterintelligence threats to the US goes to the Russian Federation Following the Soviet Union’s collapse, the monolithic Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. was divided into two new agencies, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB and Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Despite the democratic posturing and economic liberalization of the early years, in the end, not to much changed about Russian activity in the US. Many of the KGB’s old and young guard stayed on and simply moved into new offices in Yasenevo for the SVR or the Lubyanka for the FSB.

Russia

Second place on Olson’s list of  counterintelligence threats to the US goes to the Russian Federation (Russia). Despite the democratic posturing and economic  liberalization of the early years following the collapse of the Soviet Union, Russian security services did not change much. Intelligence was reorganized in Russia in 1991. The monolithic Soviet Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB. was divided into two new agencies, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB and Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR. Unlike the former satellite countries of the Eastern Bloc (e.g., Poland, Bulgaria, Czechoslovakia, East Germany, Romania, Hungary, Latvia, Lithuania, and Estonia), where intelligence services of the new democratic regimes purged old Communist apparatchiks, many of the KGB’s old and young guard stayed on and simply moved into new offices in Yasenevo for the SVR or the Lubyanka for the FSB. The Russians did not consider it professionally disqualifying for someone to have served previously in the repressive and undemocratic KGB.  When Olson mentions that organization, it must be made clear that he viewed it as “a ruthless and vicious organization that oppressed its own people, crushed religion, sent political dissidents to gulags or psychiatric hospitals, and killed its enemies.” Olson describes the FSB as being responsible for Internal security in Russia, specifically counterintelligence, counterterrorism, domestic unrest, state crimes, and border security. Meanwhile, the SVR is responsible for external intelligence collection and covert action. With this structure Russia has aligned itself more closely to the US and United Kingdom models , in that the FSB is the rough equivalent of the FBI or the Security Service (popularly referred to as MI5) and the SVR corresponds to the CIA or the Special Intelligence Service, popularly known as MI6. (An explanation of the United Kingdom’s nomenclature of MI5 and MI6 is provided in some detail in greatcharlie’s December 11, 2020 post.) Russian military intelligence is the responsibility of the Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU which has operated under that name since World War II. 

Olson says that there was real optimism, even a belief in some quarters, that the US Intelligence Community could forge a new relationship with the Russian intelligence services on the basis of trust and cooperation, particularly in areas of common concern, transnational interests. They included counterterrorism, narcotics, and organized crime. Olson said that some of the early talks between representatives of the two services were so encouraging that “the US side decided it did not want to jeopardize this potential intelligence détente by getting caught in any kind of provocative spying against our new ‘friends.’” The problem with that line of thinking was illustrated by Olson when pointed to the episode of former KGB archivist Vasil Mitrokhin. Mitrokhin provided MI6 with a gold mine of documentary intelligence on Russian espionage information from the revolution to the 1980s. However, Mitrokhin had initially attempted to provide the information to the CIA, but Olson explained he was rebuffed based on the rationale that the CIA did not want to antagonise the SVR given its aims of establishing a cooperative relationship with that Russian intelligence service. 

Then what Olson describes as an avalanche of bad news came when it was discovered that both the SVR and the GRU intelligence operations against US personnel and installations worldwide had never ceased. They were in fact being conducted aggressively. Olson then points to the cases of CIA officers Aldrich Ames, Edward Lee Howard, Harold James Nicholson, FBI special agents Earl Edwin Pitts and Robert Philip Hanssen, and the US Army’s George Trofimoff.

Another Russia concern to which Olson draws the reader’s attention was the case of a group of illegals–described by Olson as professional intelligence officers living in the US under false identities–intercepted by the FBI in 2010. The case was made very public and news stories on it garnered considerable public interest, with focus placed on a divorce, Anna Chapman, who held dual Russian and United Kingdom citizenship. Olson remarks on the politics of the illegals detainment, trial, and exchange. Olson also gives attention to Russian information warfare, which he explains supplements their human intelligence efforts. 

Cyber spying is widely used by Russia to interfere in the politics of other foundries, to manipulate their populations, to spread disinformation, to conduct unconventional warfare, and to collect intelligence. The Russian objective is to harass, to discredit, to disrupt, to deceive, and to spy on rival states. The last ten years have seen not only a dramatic increase in the frequency of Russian cyber activity, but also, what Olson alarmingly characterizes as a quantum leap in the brazeness, sophistication, and destructiveness of the attacks.

Olson reports that the FSB has taken the lead in launching denial-of-service attacks on foreign governments and sponsoring anonymous “web brigades” that bombard political blogs and other forums with disinformation and pro-Russian propaganda. The GRU’s cyber capabilities are primarily directed at supporting military interventions, but the GRU is suspected of also having carried out cyber attacks on non-military objectives, such as the German Bundesamt and French television station. The lines of responsibility between the FSB and GRU are blurry and overlap, leading to a possible duplication of cyber efforts. The SVR uses cyber operations to support human intelligence operations. Although it is not as directly involved in cyber operations  as the FSB and GRU are, it plays a planning role in overall cyber strategy.

According to Olson, Russian cyberspying first surfaced on the world stage in a big way in Estonia in 2007. Russian-Estonian relations fell to a new low over the removal of a Russian war memorial. At the height of the controversy, Estonia was hit by a massive denial-of-service attack on government offices, political parties, banks, and media outlets. In 2008, as a prelude to the Russian armed forces invasion of the Republic of Georgia, the voluntary was victimised by well-orchestrated cyber attacks creating disarray. Internet services were rerouted and blocked, websites were defaced with pro-Russian propaganda, and news agencies websites were attacked, and in some cases brought down. The Russian annexation of Crimea in 2014 was followed by waves of sophisticated cyber attacks against Ukraine’s central government in Kiev. Separate attacks on energy suppliers, the power grid, the financial sector in Ukraine, as well as the Ministry of Defense in years since.

Olson asserts that unlike Chinese espionage, which he characterized as being based on China’s cold, objective attitude toward the US, an impersonal self-interest, Russian spying is predicated on a certain animus toward the US. Olson concludes that Russian Federation President Vladimir Putin “does not like us,” and says his grudge is personal. Olson believes that in sheltering Edward Snowden, who he describes as a “contemptible US turncoat,” Putin is showing his disdain for the US.

Olson informs that when the US Intelligence Community is interviewing applicants for employment today, it sometimes refers to the “Big Five” foreign languages that are in highest demand: Chinese, Arabic, Farsi, Korean, and Russian. The Russian language is still on the list for good reasons, not the least of which is that the SVR and the GRU are all over us. Olson believes that Russia will remain a major counterintelligence concern for the US for the foreseeable future. He concludes that the US would be naive in the extreme to believe that it could ever expect good faith from Putin.

Ana Montes (above) was a Defense Intelligence Agency analyst arrested in 2001 on charges of committing espionage on behalf of Cuba. According to Olson, the Cuban DGI was the most effective intelligence service the US counterintelligence faced. A noteworthy aspect of Cuban intelligence activity in the US is the quality of the tradecraft. In the case of Montes, for 16 years she passed the DGI everything she could get her hands on related to US counterintelligence efforts against Cuba. It was no small feat for the Cubans to run her case and others as long as they did and in hostile territory under the noses of US security and counterintelligence officials without getting caught. (Olson gives the Montes case substantial treatment in Chapter Eight.)

Cuba

Olson’s review of the Cuban threat was perhaps the best written of the three assessments. Olson declares that the Cuban Intelligence service may be the most effective service that US counterintelligence services face. The Cuban Intelligence Directorate, formerly known as General Intelligence Directorate or DGI was established by the First Secretary of the Communist Party of Cuba, one time Cuban Prime Minister, then Cuban President, Fidel Castro, in 1961 to preserve the Revolution; to collect intelligence on Cubans enemies, both foreign and domestic; and, to carry out covert action operations as directed. Castro was aware as early as 1961 that President Kennedy and his brother Robert Kennedy, the US Attorney General, were trying to have him assassinated through a variety of CIA plots that never came anywhere near fruition. The DGI reportedly became Castro’s tool of choice to carry out his vendetta against the CIA and the US.

Olson states the Cuban DGI cannot compete with the Chinese or the Russians in terms of overall damage to US national security, but that is primarily a function of its smaller size, narrower objectives, and limited resources. However, perhaps  it should  have been added, as Olson is surely aware, under furtive cooperative arrangements, foreign intelligence services, not knowing the true nefarious nature of a case, are often asked or position themselves, to support the intelligence efforts  of other countries when there is a common interest or considerable benefits of all kinds. Reportedly, friendly foreign intelligence services are often asked to engage in surveillance activities and initiate clandestine contacts with innocent US citizens outside and  inside the US. Many foreign intelligence services of other countries, particularly medium to small sized organizations actually love being brought into US intelligence operations of any kind. It gives them the opportunity to have a place at the table with the US, there will usually be important lessons learned, supposedly good relationships with US counterparts will be enhanced or created, and most of all, there will be financial benefits courtesy of the US taxpayer.

In their recruitment operations against the US, Olson reveals that the Cubans, much as the Chinese, often benefited from non-monetary inducements, ideological  in the case of the Cubans, ethnic in the case of the Chinese. That sort of recruitment is often facilitated by the fact that many of the US citizens who worked for the DGI and the MSS essentially volunteered their services. Another noteworthy aspect of Cuban intelligence activity in the US that Olson points to is the quality of the tradecraft. The longevity of an espionage operation is largely a result not only of the skill of the handling officer but also the techniques and equipment used to run the operation securely.

Olson reveals that in 1998, the FBI broke up a large Cuban espionage operation in South Florida called the Wasp Network (Red Avispa). This network consisted of fourteen or more Cuban spies who had the mission of penetrating anti-Castro organizations in Florida. Evidence against some of the members was too thin for prosecution, but five ringleaders stood trial and we’re convicted of espionage and other crimes. One of the Cuban-American groups, the Wasp Network, infiltrated was an organization named Brothers to the Rescue. Brothers to the rescue flew aircraft in and around Cuban airspace to assist people fleeing in boats and to drop anti-Communist propaganda leaflets. The organization was clearly a thorn in Castro’s side. As the story goes, a member of the Wasp Network found out the flight plan of Brothers to the Rescue flight to Cuba in February 1996. Cuban fighter aircraft shot down the plane in international airspace, and all four Cuban-American on board were killed. (It stands to reason that the Soviet Union, which in its day essentially armed the Cuban military and security forces, would have provided Cuba with more than a rudimentary capability to monitor nonmilitary flights from the US that did not use electronic countermeasures as well as the weapons systems to shoot down from the ground and fighter-jets that could scramble and intercept Brothers to the Rescue missions. Perhaps there was a greater reason to shoot down the 1996 flight, due to someone in particular being on board or to demonstrate Cubans capability to some operatives or informants that supported the collection of the flight plan, that led to what occurred.)

While Olson gives the case of Ana Montes greater treatment in Chapter 8 “Counterintelligence Case Studies,” notes in this chapter that due was a Defense Intelligence Agency analyst arrested in 2001 on charges of committing espionage on behalf of Cuba for at least 16 years. During that period Montes passed the DGI everything she could get her hands on related to US counterintelligence efforts against Cuba. Olson writes that the tradecraft the Cubans used in handling Montes was fantastic, a credit to the art of espionage. Olson comments that it was no small feat for the Cubans to run cases as long as they did and in hostile territory under the noses of US security and counterintelligence officials without getting caught. Montes was sentenced to 25 years in prison. 

Interestingly, Olson notes here that the CIA could penetrate the KGB and sometimes count on it to make tradecraft mistakes, but it was not so fortunate when dealing with the the DGI. Perhaps Olson was a bit exuberant about presenting the DGI as a formidable foe or maybe there was some simple oversight, but the notion that the Cuban intelligence was somehow less able to make mistakes somewhat contradicts what was one of the more remarkable aspects of the Montes case as recounted in the text. As Olson describes in Chapter 8, Montes was coached by DGI on tradecraft to include erasing everything incriminating from her hard drive. He notes that Montes either did not follow instructions or they did not work because the FBI recovered a treasure trove of espionage traffic on her Toshiba laptop.

Olson goes on to discuss the case of a retired State Department official, Kendall Myers, and his wife, Gwendolyn Myers, who were arrested on charges of having been DGI agents for almost 30 years. Myers joined the US Foreign Service with a top secret clearance in 1977. Later he was given even higher clearances when he was assigned to the highly sensitive Bureau of Intelligence and Research  at the State Department. Myers sympathised with the Cuban Revolution and believed that the US was subjecting Cuban government and people to unfair treatment. His response, probably beginning in 1979, was to spy for Cuba. With help from his wife, Gwendolyn, he engaged in a full-fledged espionage relationship with the DGI. Until Myers’ retirement in 2007, he passed top-secret documents and other classified material to the DGI in a sophisticated system of dead drops and brush passes. During their trial, it became known that the Myers had received personal congratulations from Fidel Castro. The damage they did to US national security was incalculable.

As for the CIA’s recruitment of DGI officers, it was more likely that there would be a walk-in, attempting to escape from problems of their own making with the DGI. The case Olson points to is that of Florentino Aspalllaga Lombard. Referred to by Olson as Aspillaga, he was the highest ranking defector from DGI that the US ever had. Olson was directly involved in his case. In 1987, while Olson was posted to the US Embassy in Vienna, he was summoned to his office by an agreed parole indicating that there was a walk-in. That walk-in was Aspillaga, and he was accompanied by a teenaged girl who was his mistress and the daughter of an official of the Cuban Embassy in Prague. Aspillaga, had left his wife and three children and was on the run, hoping to find a new life as a couple in the US. Aspillaga offered their services to the CIA as barter.

In what Olson called a sensational revelation, Aspillaga told the CIA that former CIA officer Philip Agee had cooperated with the DGI and had been paid close to $1 million. Agee’s role as a DGI agent was later confirmed by former KGB officer Oleg Kalugin, citing his memoir, Spymaster: My 32 Years in Intelligence and Espionage against the West (Smith Gryphon, 1994) as his source. Kalugin said Agee had walked into the KGB in 1973, had been turned away as a suspected provocation, and then had gone to the Cubans. Agee, a graduate of the University of Notre Dame, joined the CIA in 1957. He served in a series of undercover assignments in Latin America in the 1960s, supposedly becoming more and more disillusioned by what he considered CIA support of right wing dictatorships. While assigned to Mexico City in 1968, Agee resigned from the agency, moved to Europe, and began his new career of neutralizing the CIA. In 1975, he published a book, Inside the Company: CIA Diary, a detailed description of his career and exposé of CIA activities in Latin America. Most damaging of all, he included the names of 250 CIA undercover officers and foreign agents (operatives and informants). thereby disrupting CIA officers’ clandestine careers and subjecting them to considerable personal risk. The foreign agents he identified were exposed to the even worse fate of possible imprisonment or execution. The CIA chief of station in Athens in December 1975, shortly after he was outed by Agee. Agee’s guilt has never been proven conclusively, but few CIA officers believe that the timing of Welch’s killing was a coincidence.

Olson states that Agee’s US passport was revoked in 1979, but he still traveled widely, mostly in Europe, for the next several years using passports provided by the leftist governments of Grenada and Nicaragua. In subsequent books and magazine articles, Agee continued his denunciations of the CIA and the US government and disclosed the identities of an additional one thousand CIA officers and agents. Olson states here that it was clear at that point that he was not operating on his own but was getting help from a foreign intelligence service. Olson does not explain or support this fact with any data. Hopefully, he is not theorizing on a hunch but is rather presenting an inference that he can support. Whenever one theorizes in such a way without fact, one makes a capital mistake. Olson goes on to explain, unfortunately, under US law at the time, the unauthorized disclosure of the names of undercover US personnel was not a crime, so Agee could not be indicted and extradited to the US. Additionally, he remarks that Agee was operating on behalf of the DGI could not be denied after 1989. Then by Olson to state Agee’s involvement with the KGB was a near certainty  because of the close relationship that existed between the DGI and the KGB. To support this, Olson points to a statement by Kalugin in Spymaster that he read reporting from Agee that the DGI passed to the KGB. Olson claims it is inconceivable to me that the KGB would let its client service run a source of this magnitude without inserting itself into the operation.

Yet, despite what Olson inferred, the data may suggest otherwise. By Olson’s own admission, the KGB rejected Agee for recruitment in 1973. Senior executives and managers at Moscow headquarters would need to reverse a decision. They may not have been that flexible. The DGI apparently rejected the KGB’s original evaluation of Agree. That seemed even more interesting to consider. Olson then reveals that in 1989, Agee played a key role in a DGI operation against the CIA. He posed as a CIA official from the inspector general’s office in a fiendishly clever recruitment operation against a young CIA officer stationed in Mexico City. Mexico City was once Agee’s beat for the CIA, at least until 1968. Still, Agree was completely unrecognizable to US Embassy security as well as Mexican authorities. Mexico City was also being watched closely as it had a well-known role as launch pad for Soviet and Eastern Bloc operations against the US, particularly California, Nevada New Mexico, Arizona, and Texas. Reportedly, Agee contacted the CIA officer and told her that he was conducting a sensitive investigation of alleged wrongdoing by the CIA in Mexico City, possibly involving senior management. He asked for her help in carrying out a discreet investigation that would not alert the targets. Agee ordered her on behalf of the inspector general not to discuss his approach with anyone. He managed to elicit significant information from the young officer.

As far as recruiting DGI officers, Olson did not provide any information on such operations being successful. Rather, from another revelation by the DGI walk-in, Aspillaga, it was discovered that all 38 of the Cubans the CIA thought it had recruited over the previous 26 years were double agents, controlled and running  against the US by the DGI. This was a devastating indictment of CIA counterintelligence, one of the worst and most embarrassing compromises we ever had. Olson laments, “The DGI beat us–and beat us soundly.” According to Olson, the CIA’s damage assessment was long and painful. The intelligence that the CIA disseminated from  the bogus agents had to be recalled since it was all DGI-concocted disinformation. The CIA’s tradecraft handling the controlled agents had been completely exposed to the DGI, which later ridiculed the CIA in a TV special for the agency’s alleged amateurishness and sloppiness. The CIA lost all the clandestine equipment it had provided to the Cuban assets, including a then state-of-the-art burst satellite communications system. Olson also considers that the cash that the CIA paid to the Cuban doubles in salaries and bonuses, ended up in the DGI’s coffers.

In a rare expression of analysis in this segment of To Catch a Spy, Olson looks at how the CIA could have walked so far into the DGI’s counterintelligence trap. Olson pointed to the following factors. First, he explains that the CIA was so eager to have sources in Cuba that looked the other way when none of the agents produced any real intelligence of value. Many of the double agents reported that they were “on the verge” of meaningful access, but they never quite got there. The CIA settled for chicken feed. Second, intelligence officers always want their recruitment service to turn out well. They do not want to admit that they have been duped by a double agent. In their desire to succeed against the Cuban target, the CIA’s handling officers rationalised away the questionable reporting, anomalous behaviors, and ambiguous polygraph results of their agents. Third, the quality of counterintelligence at the CIA during much of this period was undermined by the poor leadership of James Jesus Angleton, whose obsessive focus on the KGB and overall paranoia blinded him to other counterintelligence threats. Fourth, the CIA grossly underestimated the skill and sophistication of the DGI.

A few low key remedies may have mitigated or capitalized on the possibility the CIA’s double agents were still working for the other side. Perhaps one might be added to what Olson offered by noting that there should have been an established practice of constantly interviewing agents, even in debriefings to collect intelligence and discuss requirements. It would put extra pressure on those controlling them to try to alleviate what may be concerns of fidelity, and either improve what is being offered to placate or across to board changes in methods of communicating indicating some central control exists for all that are active. The CIA could have suddenly asked that all active agents from DGI  produce information away from the area of an existing expressed interest and measure the timing it took each to deliver the information, the sources they used to gather the information, and interview the agents to discover what background they agents would use to assure the quality of the source and identify similarities that sounded more like a scripted story. It may not  immediately smoke out and identify who were  the double agents and who was true, and none were true in the Cuban case, but it might have gone a long way to encourage the CIA to consider the possibility of deception and that their double agents were fake. 

Perhaps to go a step further, the CIA needed to ensure that those handling agents were not biased pro or con toward the double agents, and were open minded to consider the possibility of deception in a way that would not color interactions with them. (That would recognizably have been less possible in a less socially conscious agency of the past.) In some cases, CIA officers perhaps could have very steadily, yet gradually sought to convince their double agents that they, themselves, might be open to recruitment by DGI. The task then would be to wait and see if there would be an effort by their double agents to manipulate and push them to some DGI operative or officer to size them up for recruitment or whether a DGI officer would simply step up out of nowhere to size them up for recruitment. That surely establishes the double agent’s loyalties, but may lead to the opening of an entirely new door to penetrate the DGI’s operations in the US. Potential must be seen in all directions when sources are limited as in the Cuban case then, and the China case now.

These three chapters are among those in which complaints arose over Olson’s decision not provide enough answers to, and copious insights on, the many “whys” of adversarial foreign intelligence activities, left gaps in understanding the reasoning behind them. For example, there is no discussion of how within not only the respective bureaucratic system, but also under the political systems in which those adversarial intelligence services work, unwavering parameters for operating are set. From that one might better conceptualize how ongoing and future operations of those services could be sorted and categorized from apples to nuts. From that analysis, antecedents in US counterintelligence would be better enabled to understand and effectively fashion operations to defeat in going and future efforts by those adversaries.

However, it must be reminded that Olson, as he reveals in his introductory Acknowledgements, submitted To Catch a Spy to his former employer, the CIA. The Publications Review Board surely stopped anything from going into the text  before it got too close to classified information. That preliminary screening might explain why some reviewers commented that the book reads at points much as a heavily redacted document

In Olson’s case, his former employer’s solemn warning of secrecy was increased with regard to the knowledge he retained as any information that would provide some nuance on how the US detects and catches spies would be of the utmost interest and importance to the foreign intelligence services of adversaries as well as allies. Facts are somewhat easy to judge as they may be classified and one can reasonably determine what their value might be to an adversary. Hypotheses and arguments are a bit more challenging to judge for security reasons as certain facts, even if left out, can be viewed as being confirmed by them, seeing that those facts might alone be the sole solid basis upon which a particular inference could logically be made. Surely those hypotheses and arguments might be helpful to an adversary in developing any Red Team exercise. To that extent, security considerations may be the main reason why Olson avoids drawing too many inferences and presenting too many theories in the text. Olson would hardly be the type to neglect any precaution. However, his former employer likely preferred to be safe, not sorry.

All of that being stated, greatcharlie would to some degree concur that the portraits Olson paints of the Russian, Cuban and Chinese intelligence services are somewhat two dimensional. Drawing a perspective from military science, recall that an opposing force should not be viewed as some inert, non thinking body, waiting to be acted upon. There is an aphorism trained into the minds of mid-level Army officers at the Command and General Staff College that “the enemy has a say.” It falls in line with a teaching of the 19th Century Prussian military thinker, Carl Von Clausewitz, that: one’s opponent (in just about any endeavor, not just war) is “a living force” and military plans must factor in that what is being planned is “the collision of two living forces.” One must have respect for what an opponent thinks to be successful. More specifically, one must objectively gauge what the opponent thinks and what the opponent can do. What greatcharlie would have preferred to read would be an exposition of his presence of mind, inspiring insights, written in a clear and elegant style that would make Marcus Aurelius proud and would fit in beautifully in Meditations or Epictetus’ Discourses. One might have expected that along with an insistence the novice US counterintelligence officers become and remain dedicated to improving themselves. Such will always be a worthy theme and purpose of an offering from the expert veteran to the junior worm.

Olson’s Ten Commandments 

Of interest to greatcharlie was Olson’s discussion of his Ten Commandments of Counterintelligence. Those commandments ostensibly reflect the general sensibilities, perspectives, strategies, and tactics of US counterintelligence services. In his conclusion of this chapter, Olson states: “These are my Ten Commandments of Counterintelligence. Other CI professionals will have their own priorities and exhortations and will disagree with mine. That is as it should be, because as a country and as a counterintelligence community, we need a vigorous debate on the future direction of US CI. Not everyone will agree with the specifics or the priorities. What we should all agree on, is that strong CI must be a national priority. He then proceeds to set out what he views as the Ten Commandments of Counterintelligence. Previously published in 2001 as an article in the CIA’s periodical, Studies in Intelligence, these commandments include such concepts as playing offense rather than defense, owning the street, paying attention to analysis, and not staying in the profession too long.

The 20th century French Algerian philosopher, author, and journalist. Albert Camus, in his Notebooks, 1935-1942 stated: “You cannot create experience. You must undergo it.” Olson is not attempting to promote such through his efforts at this point in To Catch A Spy. Indeed, at this point in the text, Olson presents future and novice counterintelligence officers a leg up by providing a heads up on what they might expect. Understood is his desire to prevail upon the novice to heed certain realities and precepts that would not be included in their initial training. Two issues are in play in Olson’s discussion of his commandments, competence and commitment. Looking at each issue covered by a commandment, he seeks to instruct and counsel in advance, but he wants officers to focus on being competent in their work and understand the commitment that counterintelligence work requires. This is all very handsome of Olson. Clearly, a fair and decent man of honorable intent. His scruple does him great honor.

A concern for greatcharlie however is that at no point in his discussion of his Ten Commandments does Olson offer a thought about innocent citizens caught in a US counterintelligence web. With so many investigations that can get underway when so many foreign intelligence services are working hard in the US, as indicated in Olson’s first three chapters concerning People’s Republic of China, Russian Federation, and Cuban operations, innocent private US citizens can get caught in the mix erroneously with calamitous results for the citizen through no fault of their own. In a Constitutional republic, that is a grave error and greatcharlie believes such matters if utmost importance must be broached with those moving along in the counterintelligence track. Nil magnum nisi bonum. (Nothing is great unless it is good.)

Unpacking everything about Olson’s commandments here would require dedicating too much of this review’s analysis to it and shift its focus. It may be enough to say that greatcharlie found some disconcerting and a few exceedingly problematic. The information provided by Olson in his discussion of them sets off a kind of warning light that flashes “Beware” to free citizens of a Constitutional Republic. His commandments of particular note are: The Tenth Commandment; the Ninth Commandment; and, the Eighth Commandment. By focusing on these three of his ten commandments, the opportunity to understand and taste what creates concern is provided. They are presented in reverse order here to better illustrate the cascading development of Olson’s perspectives within them on some key matters.

Captured FBI turncoat Robert Hanssen (above). Olson states from the outset that it is a profession in which officers will go for months and even years without perceptible progress or accomplishments. Olson explains: “A typical CI [counterintelligence] investigation starts with a kernel, a fragment, or a hunch that is hard to grab onto but that demands attention. He further explains: “There is no statute of limitations on espionage, and we should not create one with our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep.” Still, he calls attention to a misdirected investigation tied to the counterintelligence case against special agent Robert Hanssen that uncovered him as a Soviet spy, He notes that investigation went on longer than it should have because time and energy wasted on chasing an innocent man. Olson does not comment on how much harm and torment, the innocent man suffered as a result of the wrongful investigation of him as a spy. No matter how singular one’s percipience, until one personally suffers an injustice of a wrongful counterintelligence investigation, one cannot really fathom how damaging, even life changing, it can be.

In his “Tenth Commandment,” Olson explains that counterintelligence requires tenacity and persistence, and that is a slow, plodding process that rarely rewards its practitioners with instant gratification. He advises that one chooses to pursue a career in counterintelligence, one should know from the outset that it is a profession in which officers will go for months and even years without perceptible progress or accomplishments. Olson explains: “A typical CI [counterintelligence] investigation starts with a kernel, a fragment, or a hunch that is hard to grab onto but that demands attention. He lists what types of information qualifies as such. He then explains how counterintelligence investigations usually start with little and face an uphill fight.” He further explains: “There is no statute of limitations on espionage, and we should not create one with our own inaction. Traitors should know that they will never be safe and will never have a peaceful night’s sleep.” As for a rationale behind what could very well turn out to be a Quixotic search for evidence that is not there against a target who may very well be innocent, Olson states: “If we keep a CI [counterintelligence] investigation alive and stay on it, the next defector, the next penetration, the next tip, the next piece of CI analysis, the next wiretap, the next surveillance report, the next communications intercept, i.e. the next four will break it for us. If US counterintelligence ever had a mascot, it should be the pit bull.” Readers must be reminded that this would all be done at taxpayers’ expense.

Hypotheses and conclusions should be predicated and driven by hard evidence, not appearances, presumptions, and surmisal, supporting a preconception of guilt. A type hubris ensnares and overwhelms the investigator much as the fisherman in Ernest Hemingway’s The Old Man and the Sea (Charles Scribner’s Sons, 1952). When moving into the realm of conjecture, anything becomes a possibility. In that realm, everyone is entitled to a hypothesis. Each one, within reason, is likely equally correct or incorrect. Less elevated reasons may have a familiar ring to some involved in counterintelligence: “Somethings got to be there because I can tell!”; “I know he is bad because I feel it!” To get an investigation of a subject where a counterintelligence officer wants it to be, the focus can shift from The actual matter at hand to a secondary search through extraneous matters–sifting through dust figuratively–for “good” information that is just not there. That will lead those officers to settle for something close enough to the truth that should never pass muster among somber and astute supervisors, but it could for others.

Preconception is abhorrent to the cold and precise mind. The pure objective truth must be the focus. It may be harder to find, but it is the true pathway to success in an investigation. True evidence must be there. Must be predicated only on a reasonable standard, logic, and the law. A thorough review of superiors, auditors is needed not simply to curtail but to provide another voice, extra eyes on the matter. Sometimes an ally looking into a matter to see and call attention to issue an investigator too close to it may overlook. The situation worsens when bent information, which can always be found or sought, may be used to support very wrong ideas. Intuition and hunches can be colored, or better yet poisoned, by extraneous matters. Before placing the full force of the powers of secret intelligence services upon a citizen to impinge on his or her rights, something more than a hunch or feeling must guide the pursuit. Tools available to US counterintelligence services for surveillance and investigation have become far more powerful and intrusive than the US Congress and even the federal courts could have imagined or conceptualized while promulgating laws on their use. A tragic consequence of a lack of strong supervision is that the punishing weight of government power that can potentially be placed on the subject with those tools, who may actually be innocent, can be harmful, damaging, and destructive. There must be constraint on the use of powerful, highly intrusive government tools to pursue a subject of an investigation. Knowing when to say when, especially since a human life is in the balance, is the mark of a true professional in any field. There must be an inner-voice or one from a supervisor that warns that an investigation could be going down a totally wrong path. In his Discourse on the Method of Rightly Conducting One’s Reason and of Seeking Truth in the Sciences, 17th century French-born philosopher, mathematician, and scientist, Rene Descartes, explained: “The first precept was never to accept a thing as true until I knew it as such without a single doubt.”

Conducting a heavy-handed counterintelligence investigation of an individual not yet found guilty of anything in a court of law can ruin that individual’s life permanently. The damage counterintelligence services can do to a subject’s psyche is well understood to be grave and considerable. Use of surveillance methods of all kinds, invasion of privacy, discussing the subject with family, friends, work colleagues in a manner that skirts defamation or fully crosses the line, using informants among neighbors work colleagues, friends, as well as family, eliminating the possibility of normal human contact, and more, all ensures nothing normal with be left in the subject’s personal life. The soul and the spirit of the subject is typically seared. Reversing the damage, is extraordinarily difficult, if not impossible. The psychological capsule in which strong willed subjects will seek refuge in order to hold on to the remainder of themselves, to survive, is never easy to break open in an effort to find them. However, there seems to be little sensitivity with US counterintelligence services to the harm done to the innocent from wrongful investigations. Olson actually calls attention to a misdirected investigation tied to the FBI’s famed counterintelligence case against Special Agent Robert Hanssen that uncovered him as a Russian [Soviet] spy, He notes that investigation went on longer than it should have and essentially glosses over the fact that time and energy was wasted chasing an innocent man. Nowhere does he mention how much harm, how much torment, the innocent man suffered as a result of the wrongful investigation of him as a Soviet spy. That speaks volumes. No matter how singular one’s percipience, until one personally suffers an injustice of a wrongful counterintelligence investigation, one cannot really fathom how damaging, even life changing, it can be.

Habet aliquid ex iniquo omne magnum exemplum, quod contra singulos, utilitate publica rependitur. (Every great example of punishment has in it some tincture of injustice, but the wrong to individuals is compensated by the promotion of the public good.) The failure to practice what the US Constitution preaches regarding life and liberty and law is reflective of an individual engaged in an investigation going off the rails. However, that individual’s frustration or any other internal conflicts, must not allow for devaluation of the system, and a devolution that can comfortably lead US counterintelligence services to regularly mimic the tactics, techniques, procedures, and methods of an authoritarian security service as stated earlier. The way of life in the US, the country’s values and interests, are not being defended. Indeed, something very different would be happening. The US and liberal democracies must be different. Government actions are founded under laws that amplify morals, Judeo-Christian values of its founders. If all that Olson declares as essential to a counterintelligence investigation is permissible as a practice in a free society, a liberal democracy as US, it stands to reason the possibilities and capabilities make the potential for harsh behavior in search of enemies far worse in China’s authoritarian–arguably totalitarian–regime.

Olson begins the discussion of his Ninth Commandment in his purest tone with the statement: “Counterintelligence is a hazardous profession. There should be warning signs on the walls of CI [counterintelligence] offices around the intelligence community: ‘A steady diet of CI can be dangerous for your health.'” Following some interesting anecdotes about officers and senior executives in CI who seemed to lose themselves in the work, Olson explains: “I do not believe anyone should make an entire, uninterrupted career out of CI. All of us who have worked in counterintelligence have seen the old CI hand who has gone spooky. It is hard to immerse oneself daily in the arcane and twisted world of CI without falling prey to creeping paranoia, distortion, warping, and overzealousness in one’s thinking. It is precisely these traits that led to some of the worst CI disasters in our history.” In addition, Olson notes that following a lunch with a CIA colleague who had worked for a time in counterintelligence said: “Jim, after doing CI for two years I felt the occupational madness closing in on me. I had to move on and do something else before I lost my bearings.”

Olson argues that differences in sensibilities and approaches among CIA case officers, FBI special agents, and military intelligence officers are great/disparate enough that when working together on a case, insular thinking is mitigated. Thereby, he suggests officers from different US counterintelligence services should rotate among their offices to exploit the benefits cooperation can bring. However, despite some differences among the officers in some lines of thinking, they are all from the same national security bureaucracy and their collective thinking would more likely tend to manifest greater commonalities, more similarities, than differences, having been trained and functioning in the same system. That may not be as discernible from the inside. To be frank, but not impolitic, so far, in the case of Chinese intelligence efforts in the US, no marked positive impact has been evinced from the aggregated efforts of the services.

With all of the pearl clutching being done among senior executives in the US counterintelligence service about Chinese intelligence successes in their country, taking the approaches presented in those “Ten Commandments,” out of sort of desperation, overlooking, or turning a blind eye, to aberrant situations, prolonged investigations, “tabs” being kept on former operatives and informers for no logical reason or constructive reason, obsessive surveillance, use of dirty tricks, services ou les activités pour traquer ou nuire à autrui. They can often end up becoming huge expenditures with no constructive results, only destructive ones. Being able to claim that one is on the trail of some questionable former ally might achieve some meretricious effect in a meeting to review cases–the errant officer may want to create the appearance of being a sleuthhound with a never surrender attitude–but such efforts will typically accomplish nothing to protect the US from its adversaries or enhance the country’s national security. The dreadful consequences for those incorrectly targeted, would be, as has been, the recipe for disaster. US counterintelligence, not a foreign adversary, has, and will always be, harming innocent, private US citizens in those cases. 

Supervisors and those managers of US counterintelligence services close enough to the rank and file and their operations in the field must judge the actions of officers against US citizens based on the seriousness and dignity of the claim. If there are strong concerns, there may be other avenues along which the potential problem could be managed. Suffice it to say that an investigation of a private US citizen using tools designed for trained foreign intelligence officers and networks have no good reason to be used on a citizen in a Constitutional republic. That will always be a dangerous and destructive undertaking in terms of the well-being of the US citizen. (One wonders how inspired those US counterintelligence officers who are often anxious to spend so much time, energy, and especially money on chasing tenuous leads and entertaining the slender appearance of a private US citizen’s guilt or complicity, if money was short and was being appropriated from their personal accounts. Perhaps none!)

As for another pitfall reality that taking such a harsh, seemingly ego driven approach to counterintelligence in the present day, it could lead to self-inflicted walk down a garden path and into the hands of US adversaries. Newly minted MSS counterintelligence officers in “on the job training,” which is how they do it, may very well be actually working in the field, using decoys under their trainers direction as a type of net practice for gaining and retaining the attention of foreign counterintelligence services and luring their resources, energies, and time, into endless, fruitless pursuits. The indications and implications of what is provided in Olson’s, albeit well-meaning, “Ten Commandments” are that US counterintelligence services would be susceptible to such a ploy. MSS counterintelligence could surely offer just the right amount of chicken feed here and there to support a misguided belief that the perfect “kernel” of information will be found to make a case. Such an effort could effectively distract, divert, and disrupt elements of US counterintelligence officers from engaging in more worthier pursuits against what may very well be in many cases, potentially vulnerable networks and operations of Chinese intelligence services in the US. (Interestingly, in public announcements by the US Department of Justice of a Chinese intelligence and counterintelligence operation being cracked or disrupted, there is never mention of any apparent plot to lure US intelligence services into a trap. Perchance, since Chinese intelligence services have been so successful in the US, there is no reason, no impetus to play such games. In the eyes of senior executives and managers of the MSS and senior commanders of the PLA, US intelligence and counterintelligence services may no longer be worth the candle.)

Taking draconian steps against a US citizen for allegedly, presumptively, or imaginably being tied to a foreign intelligence service when that is in reality not the case could very well compound an already difficult situation with regard to recruiting adversarial intelligence officers, operatives, and informants. The rationale for making that representation is if a US counterintelligence service accused a US citizen of providing some assistance to a specific foreign intelligence service, and the assertion is false, no group other than that adversarial service would know for a fact that the accusation is false. Even more, observing the US counterintelligence service initiate some severe, intrusive investigation of the citizen, ostensibly to better understand US practices. Surely such behavior, such practices by some US counterintelligence services would create a decidedly negative impression of the US among members of an adversarial foreign intelligence service.

“Once upon a time” there was a near universal notion of the US being “the good guy,” known for its largesse. That reputation has become a bit tarnished over time quite possibly as result of such aggressive actions by a US counterintelligence service against their own innocent citizens. If a foreign intelligence officer, operative, or informant would ever consider what would befall him or her if they left their service and country and turned to the US, the individual would need to ask himself or herself: “If they treat their own people that way, how would they treat an adversary.” Through Olson’s compendium of US activities by adversaries and his case studies, one could infer that since the end of the Cold War, foreign intelligence officers were more likely to turn to the US only if they ran afoul of their own organizations after making some egregious, irreconcilable misstep on a professional or personal level, either by their own volition or through entrapment. Such individuals would prefer to save their skins in any way possible with an intelligence service willing to accept and protect them, rather than face their superiors. One might speculate on how many occasions the choice was made by a foreign intelligence officer to turn to another country’s intelligence service such as the United Kingdom’s Security Service or Secret Intelligence Service rather than walk-in into a US Embassy or Consulate to prostrate himself or herself. Perchance some venturous officer in a US counterintelligence service might want to apply a bit of the preceding logic to the Chinese intelligence conundrum.

Perhaps one should also consider that adversarial foreign intelligence officers may chalk up actions of US counterintelligence officers performed against them, such as monitoring an opponent’s telephone and electronic communications, surveilling their movements, or striking up clandestine conversations, as a matter of them simply doing their jobs. Such thinking would form the basis of a tacit, or even an explicitly agreed upon, modus vivendi. However, it is another thing altogether for US counterintelligence officers to use “dirty tricks” against adversarial foreign intelligence officers or their families and make their circumstances unviable in the US while deployed under official cover. Boiling it all down, there must be hope, even assurance, that there will be an intelligent connection for the one who defects not a bullying connection with a US counterintelligence officer. The one coming over of course wants help in doing so, needs help in betraying his own. Those individuals are the proverbial “bigger fish to fry.”

Infamous former chief of CIA Counterintelligence, James Jesus Angleton (above). Olson initially mentions Angleton in Chapter 3 when he discusses how his obsessive focus on the KGB and overall paranoia blinded him to other counterintelligence threats. In his Ten Commandments, Olson makes note of the counterintelligence failures and abuses of Angleton, the FBI’s J. Edgar Hoover, and their subordinates, reminding of the obsessive harassment of Martin Luther King in the 1950s and 1960s, Olson states “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness. To take the discussion of such problems further, he notes: “Counterintelligence officers must be wary of what I call the ‘self-righteousness trap,’ that is, our objective cannot be so righteous and our motives so pure that we can justify inappropriate and illegal methods.”

In his explanation of his Eighth Commandment, Olson begins by reminding readers of what was mentioned in his “Second Commandment” that “some people in the intelligence business and elsewhere in the US government do not like counterintelligence officers.” He makes note of the counterintelligence failures and abuses of the CIA’s James Jesus Angleton, the FBI’s J. Edgar Hoover, and their subordinates and reminding of the obsessive harassment of Martin Luther King in the 1950s and 1960s, and then states “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness. To take the discussion of such problems further, he notes: “Counterintelligence officers must be wary of what I call the ‘self-righteousness trap,’ that is, our objective cannot be so righteous and our motives so pure that we can justify inappropriate and illegal methods.”

To explain the reaction within the national security bureaucracy and among government contractors to counterintelligence officers, Olson simply states that case officers, special agents, commanders, and other managers have a natural tendency to resist counterintelligence scrutiny. As a rationale for that, Olson asserts that they believe that they are practicing good counterintelligence themselves and do not welcome being second guessed or told how to run their operations by so-called counterintelligence specialists who are not directly involved in the operation and not in the chain of command. He acknowledges that defense contractors and other civilian bureaucrats running sensitive US government programs have too often minimized counterintelligence threats and resisted professional counterintelligence intervention. As a rationale for that perspective, Olson says they view counterintelligence officers as only stirring up problems and overreacting to them. They perceive counterintelligence officers “success” in preventing problems as being invisible and their damage assessments after compromises as usually being overblown.

In the face of such resistance, Olson proffers that counterintelligence officers must act heroically, stating: “A counterintelligence officer worthy of the name must be prepared to speak unpopular truth to power, even at the potential cost of poor performance appraisals or missed promotions. It is not an exaggeration to say that a good CI [counterintelligence] officer must be a nag–and as we all know, imperious managers do not like persistent and vocal dissent.” Intriguingly, In this discussion, Olson leaves the reader with the impression that all counterintelligence investigators are first class individuals, straight as a dart. Across all of the US counterintelligence services, a majority probably are. However, in his Ninth Commandment, he clearly indicates personal problems among them are known to arise as a consequence of the work, to repeat  included:  creeping paranoia, distortion, warping, and overzealousness in one’s thinking.  To reiterate what he writes even in this “Eighth Commandment,” Olson mentions the “self-righteousness trap” and acknowledges: “the practice of counterintelligence–whether in intelligence, law enforcement, the military, or corporate security–is highly susceptible to overzealousness.” When Olson recalls from his experience how senior executives and managers in CIA shied away from acceptance of counterintelligence officers in their divisions and shops, surely he is fully aware that they could only express that choice through tidy, plausible and professional statements such as those. He also had to know that they were very likely aware of the same problems Olson, himself, indicated could exist among some counterintelligence officers. Not presuming or expecting to learn of a connection between stories of aberrant behavior by counterintelligence officers and concerns that raises among managers of departments and units, the issue may escape the impressions of many readers. To that extent, Olson, perhaps unconsciously, does say enough to invite such concerns to be among reader’s impressions either.

Iniqua raro maximis virtutibus fortuna parcit; nemo se tuto diu periculis offerre tam crebris potest; quem saepe transit casus, aliquando invenit. (Unrighteous fortune seldom spares the highest worth; no one with safety can long front so frequent perils. Whom calamity oft passes by she finds at last.) With such problems among counterintelligence officers in mind, as a “good shepherd,” the goal of any attentive and prudent manager would be to keep a potential source of undue trouble from his flock. Letting counterintelligence officers in has really become a high stakes gamble. The slightest suggestion that a manager might refuse to receive a fellow officer due to unsubstantiated concerns that he or she may be potentially psychologically unfit to carry out his or her duties appropriately or concerns that he is she may be of questionable judgment–again, based on Olson’s own statement about problems that can arise among counterintelligence officers, it could always be a possibility–could lead to sanction from the top. Olson surely must have understood was likely a tad sympathetic to such underlying sensibilities among managers within the CIA and the other national security bureaucracies about counterintelligence. If there is so much concern within the federal bureaucracies over US counterintelligence, certainly the unsuspecting, unprotected citizen has far more to fear from it. Gnawing again at the subject of the “potential” abuse of power by US counterintelligence officers, as long as there is the actuation and potential for transgressions of innocent citizens’ rights exists, there may be less to fear about China expropriation of the US role as the dominant power in the world and its usurping of citizens rights, primarily through infiltration of elite circles and election interference, than the prospect of being torn to pieces as a result of the acts, benign or malicious, of a few trusted men and women in the intelligence services and law enforcement.

Very easily the innocent, with no connection to the hideous business of a spy ring, can be caught in the same net as the guilty. It is among the innocent, carrying on by appearance in the same manner as them, that the foreign intelligence officer, operative, and informant conceals himself or herself. Suppositions based on assumptions can result in an officer initiating a case green-lit with all the necessary approvals from the top. Sentimentality to the concept of beginning, middle, and end should not compel the endless pursuit of one who may upon informed consideration may equally be found innocent. Wrongs already done cannot be righted, but an energetic effort should be made to prevent future wrongs of the same kind. Pause for thought! 

Once the track to find an individual is guilty has been taken, no one among the officers in the shop will aim to prove the individual’s innocence. The individual’s innocence becomes by the by. In these matters, perception errantly means more than reality. That imbalance in thought unfortunately has likely served to allow all formulations based on available evidence, easing in tragic results. Surely adversarial foreign intelligence services would prefer US counterintelligence service would become immersed in an investigation of an innocent party than put their time and energy on any actual part of their networks. As discussed in somewhat greater detail in the August 31, 2020 greatcharlie post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2),” it cannot be overemphasized that misidentifying an innocent citizen as an  agent of an adversarial foreign power engaged in espionage or some other act on its behalf by initiating an investigation against the individual, to include securing warrants for the most intrusive and egregious acts contrary to his or her First and Fourth Amendment Rights under the Constitution is a tragedy of unimaginable proportion and can have enormous consequences upon the life of the one mistakenly, even wrongfully targeted. 

In a December 1999 federal indictment, Wen Ho Lee was charged in 59 counts concerning the tampering, altering, concealing, and removing restricted data, the receipt of restricted data, the unlawful gathering of national defense information, and the unlawful retention of national defense information. As the investigation into his alleged espionage began, Lee was fired from his job at Los Alamos by the University of California, Los Angeles (UCLA) on March 8, 1990, under pressure from the US Department of Energy, which oversees the laboratory. The news media was informed of his dismissal by an unknown source and the stories were widely reported. While his alleged espionage was being reported, the FBI had determined that Lee could not plausibly have been the source of information on the W88 passed to China. The normative hope, yet perhaps a bit of an optimistic one given the players involved, would be that once exculpatory information is discovered that could prove one’s innocence, a FBI investigation would have been halted. However, the FBI moved forward with its investigation of Lee. Although the original espionage charge was dropped by the FBI, Lee was still charged with the improper handling of restricted data. In September 2000, Lee pled guilty to one count as a part of a plea bargain arrangement. The other 58 counts were dropped. Later, Lee filed a lawsuit against the US government and five news organizations–the Washington Post, New York Times, Los Angeles Times, ABC NEWS, and the Associated Press–for leaking information that violated his privacy.

Lee and his supporters have argued that he was unfairly singled out for investigation because he was Chinese-American. Wen Ho Lee was not the enemy but has been called a victim of the blind, unfettered power of a few men with authority. That bit of humanity that should exist in each human heart was in such insufficient quantity in the counterintelligence special agents handling his case. In his book Securing the State, David Omand, former United Kingdom intelligence and security coordinator, wrote security intelligence operations—such as counterterrorism and counterintelligence—require cooperation between security officials and civilian populations among whom threats wish to hide. In the case of Chinese intelligence, this includes ethnic Chinese émigré communities, which, at least in the US, are now suspicious of the FBI. The botched investigation of Wen Ho Lee, in Ormand’s view, appeared to be politically (or racially) motivated witch hints rather than the serious security investigations they were. To Chinese-Americans, these suspicions and resulting investigations are the natural result of an unwillingness to analyze Chinese intelligence more rigorously on the basis of evidence.

Intelligence enthusiasts may find it interestingly that in a September 25, 1977 New York Times interview, John le Carré, the renowned espionage novelist of the United Kingdom who served in both MI5 and MI6, just after publishing The Honourable Schoolboy (Alfred L. Knopf, 1977), was asked about a view implied in his earlier works that no society was worth defending by the kind of methods he had set out to expose in his books. In reply, the author stated in part: “What I suppose I would wish to see is the cleaning of our own stable and the proper organization, as I understand it, and the sanitization, of the things that we stand for. I hope by that means and by those examples perhaps to avoid what I regard as so wrong with the Soviet Union.”

Double-Agent Operations and Managing Double-Agent Operations

Olson follows his commandments with a chapter on preventing counterintelligence incursions through the development of better workplace security. Improvement may be achieved, he explains, by following his “Three Principles of Workplace Counterintelligence”—careful hiring, proper supervision, and responsible promotions. Afterward, comes the chapters of To Catch a Spy that greatcharlie appreciated the most were “Chapter Six: Double-Agent Operations” and “Chapter Seven: Managing Double-Agent Operations.” In these two chapters, Olson finally presents a classical series of demonstrations. Indeed, in both chapters, Olson provides nothing less than a mini manual for precisely what the titles indicate. Readers are favored with many of the logical principles that Olson would practice and expound during training while working in CIA counterintelligence. He provides a list of benefits US counterintelligence seeks to gain from a double agent operations: spreading disinformation; determining the other side’s modus operandi; identifying hostile intelligence officers; learning the opposition’s intelligence collection requirements; acquiring positive intelligence; tying up the opposition’s operations; taking the oppositions money; discrediting the opposition; testing other countries; and, pitching the hostile case officer. Nihil est aliud magnum quam multa minuta. (Every great thing is composed of many things that are small.)

The tactics, techniques, procedures, and methods of US counterintelligence are laid out. Some portions are couched in anecdotes illustrating practices used in the past. Each to an extent is a display of the imagination possessed and creative ways in which double-agents were dangled to garner interest from the adversarial intelligence service, the transmission of chicken feed, ostensibly useful yet actually useless information, for the adversary to grab, and management of nuanced communications between the double agent and his handler. Olson does not indicate whether any among the practices discussed was used by him to achieve some crowning glory of his career. Again, for readers such as greatcharlie, what was presented in this chapter was meat and drink. None of the precepts included were beyond the understanding and the abilities of most readers who would be interested in the book. He tells it all in an apposite way.

Case Studies

In “Chapter Eight: Counterintelligence Case Studies,” Olson goes into some greater detail on the principles and methods of counterintelligence. Olson carefully avoids offering what may seem to some as a mere series of tales. However, it seems that Olson’s relaxed writing style, present throughout the text in fact, may distracted some previous reviewers’ attention away from the instructive nature of the discussion. In the 12 case studies he presents, Olson also illustrates the tradecraft of counterintelligence, and where counterintelligence breaks down or succeeds. He presents, to the extent that he could, how US counterintelligence officers became fully engaged on each matter. To some degree, Olson also looks at the other side of things and discusses why people spy against their country.

Each case study is followed by a “lessons learned” section. Lessons learned are the pertinent qualities and deficiencies that Olson ascribes to each case pertinent to the ongoing work of US counterintelligence services. The lessons learned are given greater value for Olson selects only what he deems most pertinent from what he witnessed, experienced, and endured as is not presumed. Again, nothing presented in To Catch a Spy is considered in the abstract. Some might observe that absent again is the severe reasoning from cause to effect that helps to solve the case. Instead, he highlights a few points of interest in each and considerable focus is put into placing color and life into his discussion of them. Two good examples of his case studies are those concerning Ana Montes and Richard Miller.

Scott Carmichael (above) was the senior security and counterintelligence investigator for the Defense Intelligence Agency and the lead agent on the successful spy hunt that led to Ana Montes. Concerning the Montes case, Olson does not deny the fact that the DGI had done the thing very completely. Of the lessons learned, the three most important to Olson appeared to be that the DIA was wrong not to require polygraph of its new employees. He applauded the DIA for having in place a policy that encouraged employees to come forward with any workplace counterintelligence concerns that they had. The report of Montes’ suspicious behavior in 1996 turned out to be inconclusive but still served the purpose of putting her on the counterintelligence radar of DIA investigator Scott Carmichael, who he heaps praise upon. Olson also notes that penetration is the best counterintelligence. Without the FBI source to raise the alarm and put Carmichael back on the scent, Olson says Montes might have stayed in place.

Ana Montes

Concerning the case of Ana Montes, which Olson touched upon in his country report on Cuba in Chapter 3, he leaves no doubt that it was a very complicated and abstruse case. He does not deny the fact that the DGI had done the thing very completely. Olson referred to Ana Montes as a classic spy. Montes worked for Cuban intelligence for sixteen years. She was indeed the embodiment of an ideological belief concerning US policy in Latin America and most of all, a pro-Cuba sentiment, as she carried out her espionage duties for the DGI diligently and effectively. Before the smash of her unmasking, Montes was believed to be a thoroughly trustworthy officer. When colleagues learned of Montes’ betrayal, it was a crushing blow to them.

Olson reports that Montes’ views against the US role in world affairs were hardened while she studied abroad in Spain as a student of the University of Virginia. Nevertheless she would eventually find employment in the US Department of Justice and receive a top secret security clearance required for her position. The espionage problem started outright when Montes, already a federal employee, began attending night courses at the Johns Hopkins School of Advanced International Studies in Washington. Montes, likely spotted by someone working for Cuban intelligence once she was heard voicing her negative views toward US policy in Central America during the administration of US President Ronald Reagan. The Cubans, appreciative of her enthusiasm, Olson believes, Cuban intelligence insisted that she leave her job at the US Department of Justice and move to a national security organization. She secured a job with DIA. Starting as an analyst on El Salvador and Nicaragua, Montes rose to become the senior DIA analyst on Cuba.

As for her espionage work for the Cubans, Montes would memorize contents of documents she saw, summarized it at home, and encrypt the material on diskettes. She received instructions from Havana by shortwave radio broadcasts, which she deciphered on her Toshiba laptop using a special program the Cubans provided her. She would contact her handler by calling from a public phone booth and sending a coded message via her pager. She would have dinner with her handler once or twice a month with her Cuban handler in a Washington restaurant to provide him with the diskettes. Montes was lavished with praise but never accepted payment.

In 1996, an alert DIA employee, practicing good workplace counterintelligence, reported his concerns about Montes to DIA counterintelligence officer Scott Carmichael. The employee noted that Montes appeared sympathetic to the Cuban cause,  and inappropriately aggressive in seeking expanded access to sensitive intelligence on Cuba. Carmichael interviewed Montes and eventually dropped the matter. However, as Olson explained, he filed away his suspicions of her for future action. In 2000, Carmichael became aware that the FBI was looking for a Cuban mole inside the US intelligence community. Only soupçons were known about the identity of the spy, except that he or she was using a Toshiba laptop to communicate with Cuban intelligence. Carmichael immediately thought of Montes, but he had little evidence to support his suspicions against her that he had great difficulty in convincing the FBI to open an investigation.

Carmichael remained persistent in pushing the FBI to open an investigation (never give up), egged on by further aberrant pro-Cuban attitudes displayed by Montes, and his efforts finally succeeded. In May 2001, the FBI threw its notorious full court press at Montes, starting with extensive physical surveillance. It did not take long for the FBI to conclude that she was involved in illegal activity. First, she was obvious and amateurish in her surveillance detection routes, often entering a store by one door and quickly leaving by another. Second, she made a succession of one minute phone calls from public phone booths, even though she owned a car and carried a cellphone. Montes’ behavior was suspicious enough to the FBI that it was able to obtain a warrant for surreptitious entry of her apartment on May 28, 2001. She was away on a weekend trip with her boyfriend. The FBI knew that this entry would be particularly dicey if Montes was a Cuban trained spy, she could have trapped her apartment to determine the intrusion. There was, however, no evidence of trapping and the entry was successful. The FBI found a shortwave radio of the type used by spies to listen to encrypted broadcasts and a telltale Toshiba laptop. On the hard drive, which the FBI drained, were multiple messages from the Cubans to Montes on her intelligence reporting, giving her additional tasking requirements, and coaching her on her tradecraft. Olson says he is certain that the FBI computer experts chuckled when they read the instructions from the Cubans to Montes on how to erase everything incriminating from her hard drive. He further comments that she either did not follow the instructions or they did not work because the FBI recovered a treasure trove of espionage traffic. One message thanked Montes for identifying an undercover US intelligence officer who was being assigned to Cuba. It was later determined that she gave the Cubans the names of other US intelligence personnel in Cuba. She blew their cover and sabotaged their mission.

As the remainder of the story goes, the FBI continued its surveillance of Montes for another four months in hope of identifying her Cuban handler or handlers. That effort was not successful, but the FBI was able to search her purse when she was out of her DIA office to attend a meeting. Inside her purse the FBI found more incriminating material, including the page rhinestone number she used to send short corded messages to the Cubans. Olson said the fear was that if Montes detected the surveillance, she would flee. When Montes was about to gain access to US war planning for Afghanistan in the aftermath of September 11, 2001, the FBI and DIA decided that they could wait no longer. Montes was arrested at DIA Headquarters on September 21, 2001. She pleaded guilty on October 16, 2002  and was sentenced to 25 years in prison. 

Of the lessons learned, the three most important to Olson appeared to be that the DIA was wrong not to require polygraphs of its new employees. He applauded the DIA for having in place a policy that encouraged employees to come forward with any workplace counterintelligence concerns that they had. The report of Montes’ suspicious behavior in 1996 turned out to be inconclusive but still served the purpose of putting her on Carmichael’s counterintelligence radar. Olson also notes that penetration is the best counterintelligence. Without the FBI source to raise the alarm and to put Carmichael back on the scent, Montes might still be in place. DGI’s activities in the US were really a mystery. Olson did well in presenting readers with a sense of the elusive nature of DGI operatives. 

As it turned out, the case did not reach its optimal potential for counterintelligence officers engaged in the investigation were unable to use available information to track down and capture Montes’ handlers or any other elements of the Cuban espionage network of which she was a part. In his investigation, the DIA counterintelligence officer, Carmichael, was able to observe, reflect, and intuit connections based.on facts not conjure a false reality based merely on appearances. Again, it is always a capital mistake to theorize in advance of hard facts. Nevertheless, it is a common errant practice. With hard facts, one is better enabled to grasp the truth.

With regard to Olson’s suggestion that the FBI computer experts likely chuckled over the failure of Montes to eliminate incriminating evidence from her Toshiba laptop, a concern is raised. Perhaps some in US counterintelligence services may feel greatcharlie is making the whole matter seem more urgent and important than it really is, but the proper comportment, displayed and demanded by supervisors and line managers, would instead have been to remain collected and aplomb with noses to the grindstone in the squad, knowing that an unexpected opportunity to exploit a failing on the part of the adversary has shown itself. It may signal that other missteps by the adversary may be present that will allow counterintelligence officers to net an even greater quarry of foreign intelligence prey. Recognizably, stresses can cause attention to shift. (Take charge of your emotions!) However, there is the need to concentrate solely on performing the duty of the moment as best as possible. Once the case is resolved, there would be time then to reflect on its many aspects. The reputation of US counterintelligence services will not suffer shipwreck over this particular matter. Olson surely did not view at all out of order as he freely revealed it in the text.

When Montes’ handlers and the managers of her undiscovered network evaded capture, they took with them all their lessons learned. (Recall her activities were not a small matter in the DGI as the informative walk-in Olson dealt with in Prague, Lombard, was read-in on her fruitful work while he was posted in Vienna.) One could have no doubt that meant it would certainly be decidedly more difficult, after the DGI presumably made necessary corrections, to uncover their activities of officers, operatives, and informants in their networks on later occasions. Surely, they would be back. (Rather than display any good humor about the matter, it should have been handled from start to finish with solemnity, especially given the indications and implications of the case.)

KGB operative Svetlana Ogorodnikov (above). As described by Olson, Richard Miller was a disaster as a counterintelligence officer, and an FBI special agent in general. However, that aspect is key to understanding the lessons the case presents not only to senior executives and managers of US counterintelligence services, but among the rank and file of each organization. Working out of the Los Angeles FBI Office, Miller was tasked to monitor the Russisn émigré community in Los Angeles. In May 1984, a well-known member of the Russisn émigré community called Miller suggesting that they meet. It turned out the caller, Svetlana Ogorodnikov, was a KGB operative dispatched in 1973 to infiltrate the Russian emigre community in Los Angeles. She got her hooks into Miller. Miller, figuratively tied to a tether right in front of the KGB, was exactly the type of FBI Special Sgent that an adversarial foreign intelligence officer would look for.

Richard Miller

As described by Olson, Richard Miller was a disaster as a counterintelligence officer, and an FBI special agent in general. However, that aspect is key to understanding the lessons the case presents not only to senior executives and managers of US counterintelligence services, but among the rank and file of each organization. Miller was a door left open that an adversarial foreign intelligence service, in this instance the KGB, was happy to walk through, and one could expect in similar circumstances that will almost always be the case.

Olson notes that Miller was hired by the FBI in 1964. After having spent time in a number of FBI field offices, Miller landed in the Los Angeles FBI Field Office where he should have found peace. However, as Olson explains, Miller, as a result of his own incompetence did not find a happy home in that office. Olson leaves no doubt that Miller was a disaster as an FBI special agent. He was a laughingstock at the office. His FBI colleagues scratched their heads in disbelief that he had been hired in the first place. In the buttoned down world of the FBI, he was totally out of place. He was poorly dressed and noticeably careless with his grooming. His weight and physical fitness did not meet the FBI’s rigorous standards. At 5’9″ tall and weighing as much as 250 pounds, he never came close to matching the stereotypical profile of the trim and athletic FBI special agent. 

To make matters worse, Miller was hopelessly incompetent. Olson says Miller begged his FBI colleagues to give him assets because he was incapable of developing any on his own. At various times, he lost his FBI credentials, gun, and office keys. His performance reviews were consistently bad, but somehow his career chugged on. In Olson’s own words, Miller was part of the FBI culture that did not turn on its own, even at the cost of carrying dead weight. With eight children, on a special agents salary, Miller was always on the lookout for extra income. Reportedly, he stole money from his uncle in a far fetched invention scam. He pocketed money that was supposed to pay assets. He ran license plates for a private investigator. He sold Amway products out of the trunk of his office FBI vehicle. He even bought an avocado farm to profit from but it went under. Miller would eventually be excommunicated from the Church of Latter Day Saints for adultery and divorced while serving in Los Angeles.

Miller’s initial work in the Los Angeles FBI Field Office was in criminal work but he was unsuccessful at that. He was transferred to goreign counterintelligence where it was ostensibly though he would receive vlossr supervision and mentorship from the Gordian counterintelligence chief. Olson notes that additionally, foreign counterintelligence was considered a dumping ground for under performing employees Counterintelligence was not highly regarded and the best people stayed away.

In foreign counterintelligence, Miller was given the job to monitor the large Russian émigré community in Los Angeles. To do that job he was expected to mingle with the émigrés and develop contacts inside that community who could keep him informed of any indications of Russian espionage. It was not hard to imagine how Miller was perceived by the Russians with whom he came in vintage. There is no indication that Miller did anything significant during that period. His career and personal life was still spiraling downward. He would later tell estimators he sometimes took three hour lunches at a 7-Eleven store reading comic books and eating shoplifter candy bars. Viewing Miller’s behavior was becoming increasingly erratic he was counseled by his supervisor and sent in for a mental health assessment. Although found emotionally unstable, and subsequently suspended for being overweight, Miller was krot pn at foreign counterintelligence. He was allowed to hang on until he reached retirement age of 50.

In May 1984, one of the well-known members of the Russisn émigré community called Miller suggesting that they meet. The caller,, Svetlana Ogorodnikov, immigrated from the Soviet Union in 1973 with her husband Nikolai. She worked as a low level source for the FBI at one point but dropped out. Her husband worked as a meatpacker. It turned out that Svetlana was a KGB operative, dispatched in 1973 to infiltrate the Russisn emigre community in Los Angeles, and if possible, assess and develop US citizens for recruitment. She was known to make trips to the Soviet Consulate in San Francisco which the FBI would later assess were occasions when she met her KGB contact.

Olson assesses due to the timing of Ogorodnikov’s call, she likely was aware from her contact in the community that Miller was in trouble at the FBI and his personal life had become a shambles. Olson also supposes that the KGB green-lit her call after they were satisfied with an assessment of him. After traveling to the Soviet Union, where Olson believes she met with the KGB to discuss Miller, Ogorodnikov returned to the US and continued contact with him in August. She promised him cash for secrets and Miller agreed. He supplied her with secret FBI documents to prove his bona fides. Miller then met with a KGB officer. Olson explained that the KGB was not immediately satisfied with Miller. He gave his FBI credentials to Ogorodnikov who presented them to heathen  contacts in the San Francisco Consulate. The KGB wanted Miller to travel to Vienna with Ogorodnikov to meet with more intelligence officials. However, the FBI never allowed that to happen; other special agents became aware of Miller’s unauthorized relationship with Ogorodnikov. Miller was placed under surveillance by use of wiretaps, bugs, and operatives on the street.

Olson assumes Miller detected the surveillance. On September 27, 1984, he tried to convince the FBI that he was engaged in his own effort to catch Ogorodnikov. However, while being polygraphed he admitted to his malign activities. He gave Ogorodnikov a secret document. He then started keeping several other documents in his home and was prepared to present them to the KGB. Miller and the Ogorodnikovs plead guilty to conspiracy to commit espionage on October 3, 1984.

In his lessons learned, Olson focuses on the decision of Miller’s FBI superiors to keep Miller in place. He does not fault the other special agents in the office for not reporting him because Miller’s situation was well-known in the office. Olson, to some extent in the role of apologist, offers reasons for such behavior among Miller’s colleagues. Misfortune can easily come at the hands of an evil influence such as alcohol. Miller had a weakening nature to which his supervisors should have responded. Perhaps they figured they had to stretch a point in favor of a man who served for so long. However, by keeping Miller on the job, his supervisors and managers, surely inadvertently compounded the problem. They went too far to screen his many disqualifications from their own superiors, presumably to allow him to reach retirement. Miller seemingly marked his zero point when he was approached by the KGB. It stands to reason that an astute counterintelligence officer may often discover weaknesses and blind spots in himself or herself. An effort to correct the deficiency would then be in order. However, Miller was different. By all appearances, he was spent, no longer qualified to serve, but he was kept on.

On reflection, the matter seems almost ridiculous. Miller was exactly the type of FBI special agent that an adversarial foreign intelligence officer would look for. He was not a dangle, nor was he really on the prowl. He was simply a door left open to the achievement of some success by the KGB, figuratively tied to a tether right in front of them. Perhaps at the time their agents presented him as a prospect, in Moscow, they could hardly believe their luck. The opportunity was there, and the KGB operatives among the émigrés supplied the audacity to take advantage of it. 

Through his own insufficient and perhaps sympathetic investigation, he discovered no one and nothing significant among the émigrés. Anyone getting involved with an émigré community as part of a counterintelligence investigation must gird one’s loins, for with some certitude adversarial foreign intelligence services will very.likely be quietly operating among both suspicious and unwitting émigrés. The powers of such officers or operatives may seem far superior to opportunities that may present themselves, but they are deployed among the émigrés nonetheless. The erstwhile KGB and DGI, and current SVR and MSS, each organized special departments for such work. Indeed, an emigre community can very often be a milieu for spies. Perhaps Miller’s FBI superiors thought he would unlikely find trouble in the Russian émigré community, and Miller had effectively been sent to some empty corner of the room. However, they confused the unlikely with the impossible. By their experience and instincts, his supervisors should have been against Miller’s conclusions. Nevertheless, they were satisfied with his totally erroneous conclusions.

Given his history of behavior, it is very likely that during his contacts with the Russian émigré community, Miller betrayed himself with an indiscretion or two. Whatever it may have been, it was clearly significant enough to cause KGB operatives–who he was unable to detect as tasked under his original counterintelligence mission–to seize upon him as their prey. The case highlights the KGB’s–and presumably now the SVR’s–ability to figuratively pick up the scent of blood much as a shark, and recognizing there can be a good soup in an old chicken. Even more relevant to the discussion in proceeding parts of this review, it illustrated the real possibility for errant officers ro exist in plainview within the rank and file of other hardworking, diligent counterintelligence officers. Such license could only lead to some great evil. The KGB Rezident at the time would have been derelict of his duties if he had not recruited Miller, a wayward FBI special agent, who due to that errant choice made by his superiors, was placed in counterintelligence. And, given his deficiencies, it would have been a serious blunder for the KGB not to exploit all possibilities with Miller to the maximum extent.

It is likely that any other KGB comrades, who may have concealed themselves in the same roost among émigrés in which Svetlana and her confederate had set themselves and had perhaps taken to their heels once they learned those two and Miller were captured, is unclear. Further, it is unclear whether any concern was raised that there was any increased concern that other KGB operatives had continued to secrete themselves among Soviet emigre groups throughout the US. For whatever reason, Olson does not go into such details on what would have been legitimate counterintelligence concerns.

No one should imagine that this review, or any other for that matter, fully covers what Olson offers in To Catch a Spy. It presents the essence of the book, but there is so much more to discover. As humbly noted when the review started off, there nothing that greatcharlie appreciates more about such a book than its ability to stir the readers curiosity, inquiry into the author’s judgments, greater consideration of their own views on the matter, and elicits fresh insights based on what is presented. That is exactly the type of book that To Catch a Spy is. One can ascribe these positive aspects to it and many others. What one finds in To Catch a Spy is of the considerable quality. The book remains steady from beginning to end. Readers are also enabled to see the world through the lens of a man with years of experience in the world and a thorough understanding of humanity.

Whenever greatcharlie feels so enthusiastic over a book, the concern is raised that its review may be written off as an oleagic encomium. However, that is not the case, and readers will understand once they sit with the book. Despite concerns about what To Catch a Spy is missing, it would be worth reading to see what appears to lie at the base of such positions and take one’s own deeper look into Olson’s discussion. Having engaged in that process itself, greatcharlie found it thoroughly edifying. It is assured that after the first reading To Catch a Spy in this manner, one would most likely go back to the book and engage in that stimulating process again and again.

With To Catch a Spy, Olson confirmed his reputation as an excellent writer in the genre of intelligence studies. The book will also likely serve for years as an inspiration to future author’s on the subject of counterintelligence. As aforementioned, the book will surely be consulted as a reference for intelligence professionals and prompting new ideas and insights among intelligence professionals, law enforcement officers, other professional investigators, and scholars. The rudiments of counterintelligence tactics, techniques and procedures, and methods offered by Olson, to some degree, may also serve as a source for guidance Indeed, much of what is within can aptly serve as a foundation upon which they will construct new approaches. 

Further, both by what he includes and ironically by what he omits in the text, became the supplier/purveyor of a foundation upon which an honest discussion can be had among people inside and outside of counterintelligence services in free societies–well-known constitutional republics and liberal democracies in particular–can look at themselves and their organization’s work relative to the rights and interests of the citizens of the respective countries they defend. It is a conversation to which greatcharlie believes To Catch a Spy can lend support. It is a conversation in current times, especially within the US, that many citizens greatly desire to have. Without hesitation, greatcharlie recommends To Catch a Spy to its readers.

By  Mark Edmond Clark

Commentary: Mueller’s Investigation Has Angered Putin, Not as It Concerns Trump, But as It Concerns Russia’s Intelligence Community

Special Counsel Robert Mueller (above). US President Donald Trump is not the only national leader greatly concerned over the Special Counsel’ Robert Mueller’s investigation into Russia’s election interference. Russian Federation President Vladimir Putin is concerned, not over the investigation into collusion and obstruction, but for the considerable damage the investigation has done to Russia’s intelligence efforts in the US.

The important matter of interference by Russian Federation intelligence apparatus in the 2016 US Presidential Election and continued interference in the US election system at federal and state levels will continue to have primacy in the minds of all branches of the US government and in the US news media. The investigation of former Federal Bureau of Investigation (FBI) Director Robert Mueller’s Office of Special Counsel into the matter, to the extent that it includes an examination into possible collusion and obstruction by now US President Donald Trump’s presidential campaign and his White House, has been a source aggravation for the national leader. Trump insists that no wrongful activity at all has taken place, and any claims to the contrary are a hoax. However, Trump is not the only national leader greatly concerned over the investigation into Russia’s election interference. Indeed Russian Federation President Vladimir Putin is concerned, less for the investigation into collusion and obstruction, which he certainly would know were valid or not, than for the significant damage the investigation has done to Russia’s intelligence efforts in the US.

Russia’s election interference, confirmed and revealed by the US intelligence community and political leaders on the national level. Perhaps the election gambit, a black operation conducted by Russian Federation intelligence, could be curiously viewed as an predictable move by Putin. The history of Putin’s earliest dabblings in politics indicate that he finds election meddling to be an anathema. It is likely in part for this reason that he saw it as the best weapon to use against the US as its government was being led by then US President Barack Obama, an individual that he unquestionably despised. However, the Kremlin has officially and vehemently denied any interference in the US elections. Officials, such as Russian Federation Foreign Minister Sergei Lavrov and Presidential Press Secretary Dmitri Peskov, have gone as far as to say that the insistence from various US sources that the meddling took place is a manifestation of some mild form of hysteria or paranoia.

The election interference story has been kept in the eye of the US public due to a strong, steady drum beat of reports about it in the US news media. To Trump’s dismay, what has been publicly broadcast, printed, and posted about Trump has primarily sought to prove his alleged collaboration with Russian efforts. Indeed, there have been unprecedented explosions of chaotic hatred and bitterness in the daily discourse on Trump. Some critics and detractors not only allege, but go as far as to insist, that within the tangled mess of Russian interference, evidence exists that supports a prima facie case of collusion and obstruction by Trump. However, investigators have not given any hints that they believe evidence available serves as indicia of a crime committed by the US president.

The machine of unfettered media commentary has sucked anyone close enough into its vortex. Most recently, the ire of those dissatisfied with Trump, has turned on Deputy Attorney General, Rod Rosenstein. Rosenstein, once a darling of Trump critics and detractors, was celebrated for, among other things, his appointment of a Special Counsel to investigate Russian election interference while he served as Acting Attorney General, his steadfast support of the work of the Office of Special Counsel, his refusal to terminate Mueller, and his insistence that he would remain and act impartially regarding the Mueller’s investigation in accord with Federal law. Then, surprisingly, extraordinary anti-Trump statements were attributed to him in the US news media. According to a September 21, 2018 New York Times article, Rosenstein suggested that he should secretly wear a device to record Trump in meetings to expose chaos in the White House. He is alleged to have contemplated asking members of the executive branch, Cabinet members, to be available to help invoke the 25th Amendment of the US Constitution to remove Trump from office.

What is seen and understood by the US public is what is available. Except for reports from the administration itself, much of what is reported in print, on the air, and online is essentially the same. Nevertheless, there can be a resulting sense of separation from the what is happening in Washington, what the administration is doing. Polemic commentaries have found flaw and have thrown suspicion at the smallest efforts to the greatest efforts of the Trump campaign and sully the efforts, and damn the mere existence, of his administration. Positing views, opinions, judgments is not a wrong. Rather, in the US, free thinking is a right. Critics and detractors still get to say what they want to say, and Trump has been pounded harder by them than the German 7th Army and 5th Panzer Army in the Falaise Pocket in France during World War II. However, to use the platform of the news media to promote a singular view of the administration’s foreign policy is wrong. Opinion should never substitute for impartial, balanced reporting of the news, coloring what the the public reads, hears, and sees. It would seem that creating an incomplete impression of what Trump and his administration are doing on behalf of the people speaks to a negative quality of one’s heart.

Mueller was appointed Special Counsel to Investigate Russian Interference with the 2016 Presidential Election and Related Matters on May 17, 2017. For those who rejected Trump, Mueller became an instant hero. He was portrayed as a manly, dashing, and audacious guardian who wore a cloak of good deeds. It has been the hope of Trump’s critics and detractors that investigators and analysts are passionately moving methodically winding through some tortuous route that will land them on Trump’s doorstep. Mueller has a team of 17 lawyers.  In just under a year, his investigation has cost just under $16.7 million. From the start, Mueller was not interested in little pokes at the Trump administration. Every bite has had a lot of venom in it. Concerning Trump, himself, the Office of the Special Counsel had been happily bobbing through everything, looking for something that could potentially make itself available for wider exploitation. It is stuff for the investigators and analysts that compose that office to engage in such work.

Among its accomplishments, Mueller’s office has issued more than 100 criminal counts against 32 people. Those ensnared in the investigation include: Michael Flynn, Trump’s former national security adviser, pleaded guilty to lying to FBI about conversations with a Russian ambassador; Paul Manafort, the former 2016 presidential campaign chairman for Trump, was convicted of financial fraud; Rick Gates, a former Trump campaign adviser, pleaded guilty to financial fraud and lying to the FBI; Alex van der Zwaan pleaded guilty to lying to investigators about conversations with Rick Gates; Sam Patten, a lobbyist linked to Paul Manafort, pleaded guilty to failing to register to work for a foreign entity; George Papadopoulos pleaded guilty to lying to the FBI about conversations with people he believed were working on behalf of Russians; Michael Cohen, Trump’s former attorney, has pleaded guilty to tax evasion and bank fraud; and, Richard Pinedo, who sold bank accounts online, pleaded guilty to identity fraud

There is hardly reason for Trump to apportion blame to himself for the completely independent actions of associates who were supposedly advising Trump and had committed their questionable actions on their own volition, to a greater extent long before joining the Trump campaign. Trump has hired a number of attorneys who have come and gone, each having ample opportunity to get their boots dirty in the mire created by the rather peculiar investigation. Those attorneys currently working with Trump, and those who have moved on, agree that there is nothing that would indicate Trump conspired with any Russian officials or otherwise to interfere with 2016 US Presidential Election and he has done nothing to obstruct the investigation at any point. They uniformly insist that all answers that Mueller might have about collusion or interference can be found in the interviews that his investigators have conducted with witnesses, including senior White House aides and Trump administration officials. They further state that the truth can be found in the more than 1.4 million documents turned over to the Office of Special Counsel by the White House.

On dit, to the satisfaction of the Trump administration, there may now be hope that those investigators and analysts are getting wise to the nature of the misadventure they have undertaken with regard to the “Trump Front.” The final report of the Office of Special Counsel may eventually indicate that  Trump was never enmeshed in the coils of anything wrongful, illegal, unpatriotic. Unfortunately he has had to suffer through the process of disproving a negative, a disgrace manufactured by his adversaries.

True, unless one is deeply involved in the work of the Office of Special Counsel, it is really impossible to know exactly what is genuinely being done within. Even Trump’s chief advisers, way above in the rarified air, have undoubtedly been left in the dark about what is happening. As they do not mix too much with the professionals, they are unlikely privy even to leaks or rumors about the investigation spoken within the rank and file of their organizations. Of the few authentic facts that have been revealed about the work of Mueller’s office is the degree of dissatisfaction that has come from chasing leads specifically concerning Trump that were actually concocted for the purposes of political rivals within the US, with the goal to discredit the Trump presidential campaign. Beyond the impact that the discovery of many new found truths on the attitudes, behavior, and purpose of actions by some in the US intelligence industry upon Mueller’s investigation, there have been terminations, redeployments, and decisions made by senior personnel not to remain in their respective services. A particularly high level of activity of this sort has been observed in the FBI.

Make no mistake, Mueller’s investigation of the Trump campaign and the White House is a big deal, nit only for the administration, but the US and the world. Yet, looking at some additional authentic facts about the work of the Office of Special Counsel made public, it seems that Mueller on the balance, may be less concerned with Trump than his erstwhile adversaries in the Russian Federation’s intelligence apparatus. The Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU; the Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR; and, the Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Russian Federation Federal Security Service) or FSB, represent an unmistakable threat to the US. Much as many observers in the US note that Putin’s decisions and actions are likely influenced by his prior work in the intelligence industry, Mueller, too, may draw from his prior practice of hunting down Russian intelligence operatives in the US. Pardon greatcharlie’s freedom, but Mueller may have the intent to complete unfinished business in defeating their known capabilities to harm the US. All of this runs contrary to what big stories in the US news media contend about Mueller’s singular aim to bring down the US President.

Note that Included on the list of those charged by Mueller’s office are thirteen Russian nationals and three Russia related companies for conspiracy to defraud the US and conspiracy to commit bank fraud and identity theft. Konstantin Kilimnik, a Russian Federation Army trained linguist and associate of Paul Manafort, has been charged with obstruction of justice. Additionally, twelve Russian Federation intelligence officers of the Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU, have been charged with conspiracy to commit an offense against the US, identity theft, conspiracy to launder money.

Mueller, the former FBI Director, knows that by putting focus on a “miracle operation” as the election interference in the US, which amounted to a direct act of provocation, he has placed great pressure on the GRU, SVR, and FSB operatives in the US as well as those acting against US interests inside Russia or in other overseas locations. Many of their bread and butter operations on the ground in the US were likely knocked out or toned down in the attempt to evade the prying eyes of Mueller’s office and any other entities on the prowl. Assuredly, Russian intelligence officers working on any portfolio even remotely connected with operations against the US, the number one target of Russian intelligence, are among the best of the best available. Every time such individuals are identified and neutralized, a devastating blow is leveled against Russia’s intelligence industry. Kleig lights have been figuratively directed at some very shadowy intelligence leaders. They were stripped of their anonymity before the whole world via indictments.

Mueller still has an opportunity to do more damage to Russian intelligence efforts in the US and strike in depth against the Russian intelligence apparatus. He is doing everything possible to exploit the Kremlin’s calamitous lack of moderation. The full reach of Mueller suspicions against Russian intelligence have not been made known. This subject is rarely broached in the news media. Perhaps many reporters have missed or have been unable to synthesise what has been occurring. That is curious, because in relative proportion, Mueller’s efforts against Russian intelligence have been far more devastating than what he truly accomplished against former members of the Trump campaign.

It is not all good news though. To the extent the something positive in defense of the US has been done, Mueller’s efforts can be appreciated in all political and foreign policy circles in Washington. Yet, the damage to the US psyche, the psychological damage to members of the administration, and blemish his effort placed on the Trump presidency has also been substantial.

Not that he considers the mostly freewheeling US news media as a useful overt source of intelligence, but Putin perhaps finds it a bit disconcerting that despite all of the chatter in the US news media about the Trump presidency marked for death as Mueller’s office is hot on his trail, it is his intelligence services are actually under far greater pursuit by the Office of Special Counsel. In news media interviews about the Mueller investigation, Putin has sought to subtly discredit the work of Mueller’s office by characterizing it as both illegal and illegitimate. When asked his opinion of what was going on with the Office of Special Counsel by Chris Wallace of Fox News just one day before the Helsinki Summit, Putin was clearly ready to speak. At first, he slyly expressed disinterest in what he described as an “operation.” However, he then explained that Mueller’s investigation simply amounted to internal political games of “dirty methods and political rivalry” in the US and that a nefarious effort was underway to make the US-Russian relations hostage to it. He then expressed the erroneous belief that the US Congress had appointed Mueller and not then Acting Attorney General Rosenstein. He would further incorrectly state: “It is for Congress that appointed him to do this, to assess his performance.” He then expressed the idea that a US court had declared the Mueller appointment as outside due process and an infringement on legislation. While Putin’s view has no bearing on how Mueller will proceed, he undoubtedly hopes that something might be done to defeat it before more damage is done to Russia’s intelligence operations in the US. Mueller’s efforts come on top of damage being done through the counterintelligence efforts of the FBI, as well as the Central Intelligence Agency (CIA), National Security Agency (NSA), Cyber Command, the Defense Intelligence Agency (DIA), the Department of Homeland Security (DHS) and others. Their work against Russia surely intensified once its election interference was detected.

When assigned the opera Nabucco, Giuseppe Verdi, who was grieving from a set of very grave personal tragedies, felt impelled to compose its music after reading the sorrowful, haunting, and beautiful words of the “Chorus of the Hebrew Slaves”: “Va, pensiero, sull’ali, dorate. (Fly, thought, on golden wings.)” The text expresses a people’s longing to return to a home that they know has been destroyed and pain that thinking of it caused. The longing of critics and detractors, beyond those who do not like Trump for personal, irrational, or other reasons, for a return to the type of presidency that they knew under Obama or a world in which Democratic presidential candidate Hillary Clinton won the 2016 election, consciously or unconsciously, colors their perspectives of Trump and his administration. For the most part, in the US news media, the apparent desire to return to the past or have different president in place, distorts reporting on the Mueller investigation. It has done so to the point that effective, balanced reporting of events has become atypical. Thoughts that blind critics and detractors to reality must be allowed to “fly away on golden wings.” If the case were different, the US public, rather than viewing Mueller’s investigation as an attack on Trump, would recognize that a good portion of the Office of Special Counsel’s efforts have envenomed the soil in which the Russian intelligence might of hoped to plant future operations, or resurrect old ones, in the US. Such work by Mueller’s team could be said to amount to defacto retribution for Russia’s election meddling. As stated earlier, Trump has good reason to be concerned for he would prefer not to have anything depict his administration in a bad light. That concern certainly goes beyond some ostensible vain interest over his legacy. Much more still will be heard from him, his legal team, and administration surrogates. In the end, to the considerable chagrin of many, final judgments on the matter will most likely be found in his favor.

Trump Backtracks on Cyber Unit With Russia: His Proposal Was Flawed, But His Thinking Is on Target

US President Donald Trump (above). Trump has engaged in negotiations for decades. In his face to face bilateral meeting with Russian Federation President Vladimir Putin, Trump was allowed the chance to adjust to circumstances, become more fluid in his thinking, more creative in his approach. His proposal for a joint cyber security unit, while scoffed at, and albeit, not viable under US law, appeared to be a product of his willingness to consider the full range of options. Moreover, as a confidence building measure, it may have had a positive impact on Putin.

According to a July 10, 2017 New York Times article entitled, “Trump Backtracks on Cyber Unit With Russia After Harsh Criticism”, US President Donald Trump, on July 10, 2017, backtracked on his push for a cyber security unit with Russia, tweeting that he did not think it could happen, hours after his proposal was harshly criticized by Republicans who said Moscow could not be trusted. The New York Times article explained the idea was a political non-starter. It was immediately scorned by several of Trump’s fellow Republicans, who questioned why the US would work with Russia after Moscow’s reported meddling in the 2016 US Presidential Election. The episode over the proposal unfolded on July 9, 2017 after his bilateral meeting with Putin in Hamburg, Germany during the G-20 Economic Summit. Trump emphasised that he raised allegations of Russian interference in the 2016 US Presidential Election with Putin. Reuters reported on July 9, 2017 that Trump stated: “I strongly pressed President Putin twice about Russian meddling in our election. He vehemently denied it. I’ve already given my opinion…..” As an immediate response to Putin’s denials on the matter, Trump then proposed forming a cyber security unit. According to Reuters on July 9, 2017, Trump wrote in the actual tweet about the cyber security unit: “Putin & I discussed forming an impenetrable Cyber Security unit so that election hacking, & many other negative things, will be guarded and safe.”

When Trump broached the the issue of the Russia’s hacking of the 2016 Presidential Election and his discussion with Putin apparently became a bit scratchy. Putin’s denial of the facts presented most likely signalled to Trump that he would be engaged in a argument without end on the hacking. Trump had to either move away from the issue or move laterally on it in some way.  Surely, Trump did not want to abandon the matter. The proposal for a joint cyber security unit apparently stemmed from an intense discussion between Trump and Putin on how to remit Russian cyber warfare programs directed at the US and perhaps similar US programs aimed at Russia. It may have been the product of brainstorming by the two leaders. Trump’s proposal was never supposed to serve as a form retribution against Russia for its intrusions into the US democratic process. Surely, it was not created to be a final solution to the threat of hacking US election. Immediately after the bilateral meeting in Germany, it was revealed that forming such a joint cyber security unit with Russia was prohibited under US law. Yet, although creating an actual cyber security unit was out of bounds, the concept of bringing US and Russian cyber experts together in some way to talk about some cyber matters was not. Trump’s likely aim with the proposal was to create a situation in which US and Russian officials were talking about hacking. Ostensibly, those conversations would create goodwill, perhaps stimulate a more open discussion about the issue, and promote more fulsome, honest talks about the issue among senior officials. In that way, the proposal certainly would have served as an effective confidence building measure.

The Oxford English Dictionary (OED) defines an apologist as a person who offers an argument in defense of something controversial. That is not the intent here. The OED defines an analyst as someone who conducts analyses. Foreign policy analysts scrutinize facts and data and interpret them, often in different ways. Given what is publicly known about Trump’s proposal for a joint US-Russian cyber security unit, the analysis here explains that although flawed, it is the sort of unconventional product that can result from intense negotiations aimed at coping with a seemingly intractable issue. The troublesome issue in this case is Russia’s intrusions into the 2016 US Presidential Election with all of its considerable security and political implications. It is also explained here that Trump’s proposal reveals a bit about his negotiating style. Trump clearly becomes target-oriented in his talks, and will make smaller agreements to build his interlocutor’s trust in him. From congruences Trump discerns in his interlocutor’s thinking and his own, he will try to craft a mutually satisfying agreement that, of course, ensures he will get what he wants. At this stage, Trump is still trying to get answers from Russia about the election issue and mollify the anxieties of various constituencies in the US over the negotiations, while hard at work trying to improve relations with Russia. Using his skills and experience, he seems to be swimming in the right direction. Audacibus annue coeptis. (Look with favor upon a bold beginning.)

Over the past decade, Russia has mounted more than a dozen significant cyber attacks against foreign countries, sometimes to help or harm a specific political candidate, sometimes to sow chaos, but always to project Russian power. From June 2015 to November 2016, Russian hackers penetrated Democratic Party computers in the US, and gained access to the personal emails of Democratic Party officials. Russian officials deny engaging in such operations.  Russian officials almost never open up their covert intelligence efforts.

Russian Cyber Attacks during the 2016 US Presidential Election

As it was discussed in the July 6, 2017 greatcharlie post entitled “Trump to Meet with Putin at G-20 Gathering: Trump Seeks an Authentic Relationship with Russia”, over the past decade, Russia has mounted more than a dozen significant cyber attacks against foreign countries, sometimes to help or harm a specific political candidate, sometimes to sow chaos, but always to project Russian power. The Russian strategy is typically to pair cyber attacks with online propaganda. That approach has been refined and expanded by Russian intelligence. From June 2015 to November 2016, Russian hackers penetrated Democratic Party computers in the US, and gained access to the personal emails of Democratic officials, which in turn were distributed to the global media by WikiLeaks. Both the CIA and the FBI report the intrusions were intended to undermine the US election. Cyber gives Russia a usable strategic capability. If benefits from its use appear great enough, Moscow may want to risk additional attacks. Russian officials will normally vehemently deny launching cyber attacks. Russian officials almost never open up their covert intelligence operations. Putin has never publicly discussed them.

The report of the January 16, 2017 US Office of the Director of National Intelligence entitled, “Assessing Russian Activities and Intentions in Recent US Election” presents the best publicized assessment by the US Intelligence Community of the Russian cyber attack during the 2016 US Presidential Election. The Russian operation to influence the 2016 US Presidential Election demonstrated a marked escalation in directness, level of activity, and scope of  Moscow’s longstanding desire and effort to undermine the US-led liberal democratic order. US Intelligence Community assesses that Putin, himself, ordered the influence campaign in 2016 aimed at the US presidential election. Russia’s objectives were: to undermine public faith in the US democratic process; to denigrate former US Secretary of State Hillary Clinton; and, to harm her electability and potential presidency.  The US Intelligence Community further assessed that Putin and the Russian Government developed a clear preference for then President-elect Trump. In following, it also assessed Putin and the Russian Government aspired to aid President-elect Trump’s election chances when possible by discrediting Clinton and publicly contrasting her unfavorably to him. The approach the Russia took to operation reportedly evolved over the course of the campaign given its understanding of the US electoral prospects of the two main candidates. The Intelligence Community concluded that once it appeared to Moscow that Clinton would likely win the election, the Russian operation began to focus more on undermining her future presidency. It was uncovered by Intelligence Community that the influence campaign followed a Russian messaging strategy that blended covert intelligence operations—such as cyber activity—with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or “trolls.”

The Intelligence Community has declared that much as its Soviet predecessor, Russia has a history of conducting covert influence campaigns focused on US presidential elections, using Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR intelligence officers and agents and press placements to disparage candidates perceived as hostile to the Kremlin. Russia’s intelligence services conducted cyber operations against targets associated with the 2016 US were Presidential Election, including targets associated with both major US political parties, were conducted by Russian intelligence services. The Intelligence Community assessed with high confidence that the Glavnoye Razvedyvatel’noye Upravleniye Generalnovo Shtaba (Main Intelligence Directorate of the General Staff-Military Intelligence) or GRU used the Guccifer 2.0 persona and DCLeaks.com to release US victim data collected in cyber operations publicly, in exclusives to media outlets, and transmitted material to WikiLeaks. Russian intelligence obtained and maintained access to elements of multiple US state or local electoral boards. US Department of Homeland Security assessments in the report explain that the types of systems Russian actors targeted or compromised were not involved in vote tallying. The Russia’s state-run propaganda machine Russia Today contributed to the influence campaign by serving as a platform for Kremlin messaging to Russian and international audiences.  The US Intelligence Community concluded that Moscow will apply lessons learned from its “Putin-ordered campaign” directed at the 2016 US Presidential Election to future influence efforts worldwide, including against US allies and their election processes.

Testifying before the US Senate Intelligence Committee on June21, 2017, Jeanette Manfra, the US Department of Homeland Security’s acting deputy Undersecretary of Cyber Security revealed that 21 US state election systems were targeted as part of Russia’s wide-ranging operation to influence the 2016 elections. She explained that a small number state election systems were also breached but there was no evidence any votes were manipulated. Manfra noted that the elections are resilient to hacking in part because they are decentralized and largely operated on the state and local level. Nevertheless, the hacking of state and local election databases in 2016 was more extensive than previously reported. According to Time, there was at least one successful attempt to alter voter information. Reportedly in Illinois, more than 90% of the nearly 90,000 records stolen by Russian state actors contained driver’s’ license numbers, and a quarter contained the last four digits of voters’ Social Security numbers.

According to the US Intelligence Community, 21 US state election systems were targeted as part of Russia’s wide-ranging operation to influence the 2016 elections. A small number state election systems were also breached but there was no evidence any votes were manipulated. However, there was at least one successful attempt to alter voter information.  In Illinois, more than 90% of the nearly 90,000 records stolen by Russian state actors contained driver’s license numbers, and a quarter contained the last four digits of voters’ Social Security numbers.

Reaching Agreements: Easier Said than Done

Before the Trump-Putin bilateral meeting, what had been observed in diplomatic exchanges between the US and Russia is a type of modus vivendi, a way of living, working together, between leaders and chief diplomats. After Putin granted US Secretary of State Rex Tillerson a meeting in Moscow after his talks with Russian Federation Foreign Minister Sergei Lavrov, Trump granted Lavrov a meeting in Washington during a visit to meeting with Tillerson. It also indicated a willingness to establish a balance in negotiations or quid pro quo on issues when possible. US State Department and Russian Foreign Ministry officials are also working together to resolve nagging issues that could serve to harm efforts to foster good relations. Such seemingly small steps helped to build confidence in both Washington and Moscow that the prospect for change was real, and it lead to the arrangement of a meeting between presidents. Those small steps also supported an open line of communication between chief diplomats which is all importance as US and Russian military forces work in close proximity in Syria, fighting continues in Ukraine, and aerial and naval intrusions remain constant in skies and waters in NATO, Canadian and US territory. If all went well, there will certainly be more to follow.

All of that being stated, the successful formulation and execution of such small steps is a daunting in public. When Putin initially took power on January 1, 2000, the West expected him to give it nothing less than his unequivocal cooperation in a manner similar to his predecessor, Russian Federation President Boris Yeltsin. Western capitals also expected Putin to be a bit wobbly taking on so much responsibility at a relatively early age. Yet, Putin knew his shoulders could bear the burden. He had no desire to be just a man of the moment in Russia. Much as Yeltsin, Putin, too, showed patience toward the West for a while, but he did not procrastinate. He took on the mission of breathing fresh breath into a country that was dying. He pushed ahead with plans “to save” Russia from disintegration and frustrate what he sensed were Western efforts to weaken it. Indeed, Putin did not believe congenial relations with the West were authentic given the many years of geopolitical struggle. Putin believed then, and believes now, that the greatest danger to Russia comes from the West. He believes Western governments are driven to create disorder in Russia and make it dependent of Western technologies. Still, Putin has shown that would prefer to outthink his rivals in the West rather than fight them. That notion has influenced his responses in contentious situations. After the period of a term away from the presidency during which he served as his country’s prime minister, Putin was reelected for a third term on March 4, 2012. He clased repeatedly with US President Barack Obama and seemed to act more aggressively. The Russian military move that stood out was the annexation of the Crimea.

The US and EU took Putin to task for that bold military operation. Harsh sanctions were levied and Russia was cast out of the Group of 8 industrialized democracies. Putin has held on to the territory and has continued to do so in the face of even tougher sanctions against Russian interests. He levied his own sanctions against US and EU products and even began heavily supporting separatist movements in Eastern Ukraine. In a March 18, 2014 speech declaring Russia’s annexation of Crimea, Putin vented his anger at the US and EU, enumerating some Western actions that fostered contempt in Moscow. He mentioned: Russia’s economic collapse, which many Russians recall was worsened by destructive advice and false philanthropy of Western business and economic experts that did more to cripple their country; the expansion of NATO to include members of the Soviet Union’s own alliance, the Warsaw Pact; the erroneous Russian decision to agree to the treaty limiting conventional forces in Europe, which he refers to as the “colonial treaty”; the West’s dismissal of Russia’s interests in Serbia and elsewhere; attempts to bring Georgia and Ukraine into NATO and the EU; and, Western efforts to instruct Russia on how to conduct its affairs domestically and internationally. Ulterius ne tende odiis. (Go no further down the road of hatred.)

Given the many years of geopolitical struggle, Putin was unconvinced congenial relations between Russia and the West could exist authentically. He believed the greatest danger to Russia comes from the West. After Putin was reelected for a third term, he clashed repeatedly with US President Barack Obama. Putin became more aggressive; took more military action. After traveling a bumpy road with the Obama administration, Moscow hoped Trump’s approach to Russia in any direction would reflect the desire not just for new deals, but a new US-Russia relationship.

Trump’s Negotiating Style: It’s Similar to the “Harvard Way”

Parva scintilla saepe magnam flamam excitat. (The sparkle often initiates a large flame.) Given Trump’s gift for agile maneuver against opposite parties in negotiations and his ability to mask his approach, if he chooses to do so, his decisions cannot be forecasted with exactitude. Trump, a self-admitted master of the art of the deal.  His negotiating “tactics, techniques, procedures and methods” Trump appears to have used that were likely developed a tad via his graduate business education at the Wharton School of Business at the University of Pennsylvania along with heavy dose of experience gained after nearly five decades of business negotiations. His concepts appear similar to those promoted by Harvard University’s Program on Negotiation. Such concepts ostensibly guided him in his first “business meeting” with Putin. They include the following: promoting creativity by breaking problems into smaller components; by doing so, you can build a multi-issue business negotiation out of what might appear to be a single-issue deal; using multiple issues to make valuable tradeoffs and facilitate a good-faith negotiation; collecting important information by asking lots of questions and listening carefully to the answers; impressing the other side with your flexibility by putting forth several different proposals at the same time; contemplate unconventional deal-structuring arrangements to bridge the gap between what the seller wants and what the buyer can afford; exploring a contingent contract to help overcome differences in beliefs about future events and outcomes; creating even more value in business negotiations by adding conditions to your deal such as “I’ll do X if you do Y”; and, engaging in “mind games” like brainstorming to facilitate creative problem solving and unexpected solutions.

Trump surely had high hopes before and during his meeting with Putin. He likely would argue then, and would argue now, that bold action, when appropriate, would be the very thing to turn situations around. Ideally, if big agreements were reached, they could help modify Russian behavior, and get relations moving forward. Yet, Trump is also pragmatic and recognizes that plans must fit circumstances and circumstances cannot be created or imagined to fit plans. Trump understood that there would likely need to be initial, relatively small steps perhaps to unlock the diplomatic process on big issues. He would also seek to gauge actions and reactions of his interlocutor, Putin. If he discerned a positive way forward, his sense of possibility would broaden and he would open his mind up to more options. When Trump broached the issue of Russian cyber attacks and eventually presented his proposal, his goal was not to mollify Putin, but rather provide an opportunity for all sides to “clear the air” on the issue of Russia’s hacking of 2016 US Presidential Election but he was unable to receive anything other than denials. Trump is not happy about Russia’s interference with the 2016 Presidential Election both as a patriotic citizen and as a candidate in that election. He may not completely agree that Russia’s action greatly impacted his election victory, but he recognizes that the aesthetics of the intrusion over time could diminish his accomplishment in some minds, particularly among his supporters. Trump understood Putin would likely deny Russia had any connection to the election intrusion, but he undoubtedly believed it was worth a try to have him confirm what most in the US believe.

As Trump and Putin did not have a relationship established prior to the meeting, they did not possess the requisite degree of trust that would allow them to relax and explore the territory outside their formal negotiating positions. They could not talk about their assumptions, strategies, and even fears. They had to work in the abstract from reports of others’ observations and analyses about their respective interlocutors.

The ability of Trump in his negotiations with Putin, to restrain the expression of emotion, in this case anger, perhaps even rage, and not to publish to the world by changes of countenance those thoughts and feelings, was critical if relations were to move forward. To exist is to change, to change is to mature, to mature is to recreate oneself endlessly. Admitting errors, missteps, is a sign of maturity and wisdom. One evolves as a result of recognizing ones mistakes. The mature one has moved from the passive voice to the active voice–that is when one stops saying, “It got lost” and begins saying, “I lost it.” The bilateral meeting between Trump and Putin was a promising moment in relations between the US and Russia. In an advanced, mature way of thinking, a presidential way of thinking in 2017, Trump sought some temporary step on the issue of Russia’s intrusion into the 2016 US Presidential Election by taking into consideration the relative strengths of the positions and capabilities of all sides. Trump understands the peace that can be achieved must be the focus. The focus must not be how much each side can destroy the other through cyber warfare but rather how to end cyber as a mutual threat. One cannot solve a problem with the same thinking one used when one created the problem. Mens sibi conscia recti. (A mind conscious of its own rectitude.)

The Flawed Cyber Proposal: A Telling Product of the Negotiation Process

Six building blocks for diplomatic negotiations were superbly outlined by the renowned US statesman, former US Secretary of State James Baker over a decade ago. Baker explained that the building blocks worked well when properly applied through solid preparation and hard work. The building blocks included: 1) Understanding an opponent’s position; 2) Gaining trust through personal relationships; 3) Reciprocal confidence building; 4) Taking a pragmatic approach that does not sacrifice principles; 5) Being aware of timing; and 6) Maintaining a deep respect for the politics of the situation.

As Trump and Putin did not have a relationship established prior to the meeting, they did not possess the requisite degree of trust that would allow them to relax and explore the territory outside their formal negotiating positions. They could not talk about their assumptions, strategies, and even fears. They had to work in the abstract from reports that presented observations and analyses of others about their respective interlocutors. With specific regard to reciprocal confidence building, both leaders demonstrated that they could negotiate. Baker suggested that at the earliest stage, one could arrange a series small negotiations on issues that could be resolved quickly, reasonably, and amicably to assist in developing a dialogue. Baker explained that finding even a minor, common point of agreement, for example on the shape of the negotiating table, can serve to set the tone of the relationship. It also helps develop a dialogue, which is one of the most important aspects of negotiations.

Former US Secretary of State James Baker (above). Six excellent building blocks for diplomatic negotiations were outlined by former US Secretary of State James Baker over a decade ago. Baker explained that they worked well when properly applied through solid preparation and hard work. Included among them were: 1) Understanding an opponent’s position; 2) Gaining trust through personal relationships; 3) Reciprocal confidence building; 4) Taking a pragmatic approach that does not sacrifice principles; 5) Being aware of timing; and 6) Maintaining a deep respect for the politics of the situation.

Confidence Building Measures: In Brief

Perhaps the best definition for confidence building measures was provided by Simon Mason and Siegfried Matthias, in their seminal article, “Confidence Building Measures (CBMS) in Peace Processes” published in Managing Peace Processes: Process Related Questions. A Handbook for AU Practitioners, Volume 1 (African Union and the Center for Humanitarian Dialogue, 2013). They define confidence building measures as series of actions that are negotiated, agreed, and implemented by parties in a dispute in order to build confidence without specifically focusing on the root causes of the dispute.

Confidence building measures are designed to build confidence. Confidence is a psychological state, whereby actors make themselves vulnerable and ready to take risks based on the expectation of goodwill and positive behavior from a counterpart. Confidence building measures can prevent a dispute or larger problem from escalating even if the negotiating process is to be started in the short term. Preventing escalation has value in itself and may also allow the negotiation process to begin again later on. Mason and Matthias intriguingly note that confidence building measures can prevent parties from escalating even when there is a denial of any problems or tensions that could escalate. Successful negotiations require risk taking by the parties. That is why a minimum degree of confidence is needed for negotiations to even start. For negotiating parties, confidence building measures are attractive because they are seen as a low-cost and low-risk activities, since they can be implemented with limited resources and calculated risks. The negotiating parties, themselves, must craft confidence building measures to fit their specific case. If not, what is agreed to will not be owned by the parties, and will not serve to build trust. Confidence building measures must also be reciprocal in nature. One party should not feel that it is going out on a limb without the other also doing so. To assist in ensuring confidence is sustained and agreements are appropriately implemented, confidence building measures concerning communication should be put in place.

In an incremental approach to confidence building measures, a series of agreements are used to slowly tackle the more difficult core issues later on. Under this approach, confidence building measures become stepping stones or a pathway to greater agreements. Indeed, agreements on confidence building measures early on generally build trust and interest in negotiating more complex agreements at a later stage. In this sense, confidence building measures create opportunities for parties to collaborate on something that is not strategically important to them and, in so doing, build the trust needed to subsequently discuss important strategic issues. Confidence building measures pull parties away from the obstacle they are blocked on. Once confidence exists, it is then easier to address the obstacles. Mason and Matthias use the metaphor of steps of a ladder also highlights the incremental nature of building trust which takes time and an accumulation of small steps. That is referred to by some as the confidence building process.

Mason and Matthias caution parties negotiating confidence building measures that wider constituencies may view a negotiation process with suspicion before, during, and after negotiations, and may not be willing to accept deals made. Individuals from those constituencies typically will not be present at the negotiation or understand how agreements were arrived at. Plans for responding to the wider constituencies’ concerns must be considered. A mutual understanding that one party made need to break away from a confidence building measure must exist. An agreement could be negotiated that allows the parties an amount of time in which they could communicate to one another about the need to break away from a confidence building measure. Working together on such a matter in itself could build confidence, create some degree of trust.

US military personnel in Cyber Command (above). There is no doubt with regard to the legal barriers to Trump’s proposal for a joint US-Russian cyber security unit. The 2017 National Defense Authorization Act prohibits the US Department of Defense, which is the parent organization of the US National Security Agency and the US Cyber Command, from using any funds for bilateral military cooperation with Russia. However, the mere fact that Trump offered to work jointly with Russia to sort out a cyber matter, and thought of creating an organization for that, seems to have had a positive impact on Putin.

Even though Trump’s proposal for a joint US-Russian cyber security unit was flawed, the dialogue among US and Russian cyber experts that might have resulted from it could have helped to develop a mutual understanding about the harmful effects of cyber activities and potential consequences, to include proportional asymmetric responses. Experts from the US side in any hypothetical liaison team would have likely been very experienced, highly qualified US personnel from the US National Security Agency and Cyber Command, and perhaps the Department of Homeland Security and the Department of State, the primary US agency most major cyber negotiations. They might have caused Russia to halt its cyber operations against the US by helping to establish a modus vivendi, or way both countries could live together while possessing this significant strategic capability. One could speculate even further that talks may have even resulted in the very near-term suspension of any cyber attacks underway, or a reduction in the intensity or tempo of such attacks that have been sourced to Russia and perhaps some that have not as yet been identified as such. Trump’s proposal, encouraging talks, although flawed legally, ideally could have inspired both countries to move forward toward a greater agreement.

A Bad Reaction

As it was explained earlier, wider constituencies represented by negotiating parties may view the process with suspicion. In that vein, political allies and adversaries alike in the US rejected Trump’s proposal for a joint cyber security unit. There was an immediate rebuff from several Republicans, who questioned why the US would work at all with Russia after Moscow’s alleged meddling in the 2016 U.S. election. US Senator Lindsey Graham of South Carolina, a Republican, stated on the US Sunday morning news program “Meet the Press”: “It’s not the dumbest idea I have ever heard but it’s pretty close.” On Twitter, US Senator Marco Rubio of Florida, a Republican, immediately criticized Trump’s cyber proposal. Rubio wrote: “While reality and pragmatism requires that we engage Vladimir Putin, he will never be ally or reliable constructive partner.” He further stated: “Partnering with Putin on a ‘Cyber Security Unit’ is akin to partnering with [Syrian Arab Republic President Bashar al-] Assad on a “Chemical Weapons Unit.” US Senator John McCain of Arizona, a Republican who chairs the Senate Armed Services Committee, recognized Trump’s desire to move forward with Russia. However , McCain further explained on the US Sunday morning talk show “Face the Nation”: “There has to be a price to pay.” McCain went on to state: “Vladimir Putin … got away with literally trying to change the outcome … of our election.” He also added: “There has been no penalty.” US Representative Adam Schiff, the top Democrat on the House Intelligence Committee, told CNN’s Sunday morning program, “State of the Union”, that Russia could not be a credible partner in a cyber security unit. Schiff stated: “If that’s our best election defense, we might as well just mail our ballot boxes to Moscow,” Schiff added. A former US Secretary of Defense in the administration of US President Barack Obama, Ashton Carter, told CNN: “This is like the guy who robbed your house proposing a working group on burglary.”

There is no doubt with regard to the legal barriers to Trump’s proposal for a joint US-Russian cyber security unit. The 2017 National Defense Authorization Act prohibits the US Department of Defense, which is the parent organization of the US National Security Agency and the US Cyber Command, from using any funds for bilateral military cooperation with Russia. The purpose of the law is avoid providing Moscow with insight into US cyber capabilities. In the US, it has been long-believed that Moscow is averse to revealing any of its cyber capabilities.

Multiple proposals will be presented in the process of improving US-Russian relations. Trump’s cyber proposal was one of many tabled by him during his bilateral meeting with Putin. As Trump tweeted, success was achieved in other areas. For example, Trump and Putin agreed over a ceasefire for southwest Syria that was set to begin on midday, July 9, 2017. US Secretary of State Rex Tillerson said it showed the US and Russia were able to work together in Syria and that they would continue to do so.

Dumping the Cyber Security Unit Proposal

It was only hours after Trump’s proposal for the joint US-Russian cyber security unit was harshly criticized by Republicans who said Moscow could not be trusted that he backtracked on it. He tweeted: “The fact that President Putin and I discussed a Cyber Security unit doesn’t mean I think it can happen. It can’t.”

Even without being implemented, the fact that Trump offered to work jointly with Russia to sort out a cyber matter, and thought of creating an organization to do so, may have had a positive impact on Putin’s thinking. Putin can choose cautious cooperation or subterfuge, which many in foreign policy circles would call his penchant. In his dealings with Trump, it seems to some degree Putin has chosen cooperation. Indeed, it must be noted that Putin discussed Trump’s proposal and was apparently open to some type of interaction between cyber experts of both countries. Recall also that Trump initially tweeted that Putin entertained the proposal. As Putin has the final say on all foreign policy matters in Russia, he established that Russia at the moment has an interest in reaching an understanding on cyber. Trump’s July 7, 2017 cyber proposal is dead. However, as the process of building relations between the US and Russia, there is a real chance that a new, better crafted proposal on cyber, within bounds legally, may surface, perhaps even from Moscow. Only time will tell.

Multiple proposals will be presented in the process of improving US-Russian relations. Trump’s cyber proposal was one of many tabled by him during his bilateral meeting with Putin. As Trump tweeted, success was achieved in other areas  For example, Trump and Putin agreed over a ceasefire for southwest Syria that started on midday, July 9, 2017. Tillerson said it showed the US and Russia were able to work together in Syria and that they would continue to do so. Tillerson announced some key understandings brokered in the meeting amounted to success. He explained: “We had a very lengthy discussion regarding other areas in Syria that we can continue to work together on to de-escalate the areas and the violence, once we defeat ISIS.” Tillerson also said the US and Russia would “work together towards a political process that will secure the future of the Syrian people.”

The Way Forward

In William Shakespeare’s play, The Third Part of King Henry the Sixth, while King Henry away from the throne, the Duke of York, urged by Warwick, sat on it. Just then, Henry arrives with followers. Henry tells York to step away, but York announces an alleged claim to the crown against the King’s hereditary possession. Henry convinces York to wait to be crowned after he dies. Henry’s nobles are astonished that he disinherited his own son. Queen Margaret arrives and is struck by the news. York, at home, is convinced by Richard’s sons Edward and Richard, and his follower Montague to take the throne right away. A war for succession ensues. After several horrific battles, the opposing sides massed for a final engagement. In Act V, Scene iv of the play, Margaret leading Henry’s supporters gives a final stirring speech, summoning courage and the fighting spirit. On the plains near Teaksbury she states: “Great lords, wise men ne’er sit and wail their loss, but cheerly seek how to redress their harms. What though the mast be now blown overboard, the cable broke, the holding-anchor lost and half our sailors swallow’d in the flood? Yet lives our pilot still. Is’t meet that he should leave the helm and like a fearful lad with tearful eyes add water to the sea and give more strength to that which hath too much, whiles, in his moan, the ship splits on the rock, which industry and courage might have saved? Ah, what a shame! Ah, what a fault were this!” As Trump engages in efforts to improve relations with Putin and Russia, his opponents and a few fellow Republicans seem to feel the US is staring into a dangerous, dark abyss. They place little faith in Trump, and no trust or hope in Putin. Conversely, Trump, in thinking about the potential for improving relations, likely conjures panoramic views of endless vistas. While Trump’s critics would associate the disturbing sound of a dissonant flute with Trump’s effort to rebuild relations with Russia, Trump seeks to create a harmony between the US and Russia that even Johann Sebastian Bach would find sublime. The entire matter seems to enthral him. He remains optimistic and is pushing ahead in the face of considerable obstacles, the majority of which are actually unrelated to his efforts with Putin.

Trump has engaged in negotiations for decades. In his face to face bilateral meeting with Putin, Trump was allowed the chance to adjust to circumstances, become more fluid in his thinking, and more creative in his approach. Trump’s sense of possibilities was broadened. His proposal for a joint cyber security unit, while scoffed at, and, albeit, not viable under US law, undoubtedly resulted from his willingness to consider the full range of options. As a confidence building measure, it may very well have had a positive impact on Putin’s thinking without even being implemented.  Reports about the actual Trump-Putin meeting indicate both leaders had a good sense of one another’s positions but they also sought find out more about one another’s approaches. By doing so, both provided themselves with a better chance of reaching a successful conclusion. Both were attentive to how the other perceived issues, no matter alien that view may have been to their own. They noticed patterns of behavior, some perhaps influenced by history and culture, and recognized political constraints the other faced. Both Trump and Putin tried to crawl into one another’s shoes. As time moves on, that effort may very well assist the two leaders in building a relations that will facilitate the building of ties between the US and Russia. Durate, et vosmet rebus servate secundis. (Endure, and keep yourselves for days of happiness.)

Book Review: Robert Lindsey, The Falcon and the Snowman: A True Story of Friendship and Espionage (Open Road Media, 2016)

With deep regret, greatcharlie has removed its book review of Robert Lindsay’s The Falcon and the Snowman: A True Story of Friendship and Espionage (Open Road Media, 2016). The review will remain off our blog for an indefinite period. An extremely reliable source made greatcharlie aware some time ago that the review was being used by dishonorable individuals to support grossly false claims that greatcharlie was an instrument of the Russian and Iranian governments and support the further incredulous claim that there was a pro-Russia and pro-Iranian bent to greatcharlie’s essays. Without any furtive or negative intent and oblivious to any intentions to make wrongful use of our efforts, greatcharlie produced its review of The Falcon and the Snowman after receiving an email request from Greta Shull, the Marketing Coordinator at Open Road Media to write a review of its eBook of The Falcon and the Snowman. According to Shull’s email, the decision to contact me was “Based on my review of The Good Spy by Kai Bird, . . . . ” While it is noted in greatcharlie’s “Book Reviews” page that our blog welcomes solicitations for reviews, to date it has only received one, and that was from Open Road Media. On October 26, 2016, greatcharlie posted its review of The Falcon and the Snowman. It was from that particular moment onwards, the posted review has been misused. Removing the review was the only option available to attempt to halt all false claims and the continued misuse of our content. (Amazingly, even with this message placed on the post, the essay is still being used as evidence of a pro-Russian bent to our work. Either there is absolutely no oversight by management in the organization in which the dishonorable individuals tragically serve, or their managers condone their wrongful and offensive behavior.)

In the spirit of full disclosure, greatcharlie must inforn its readers that a very reliable source has also repeatedly indicated to us that the wrongful use of our blog is actually part of a larger, very unusual effort in violation of the rights of the blog’s founder, Mark Edmond Clark since 2013. Note, however, that hostile acts against Clark by certain dishonorable and unscrupulous individuals actually began at least two years beforehand. The wrongful use of essays and book reviews from greatcharlie to fallaciously establish Clark’s ties to the Russian and Iranian governments and falsely prove a supposed pro-Russian and pro-Iranian bent to Clark’s writing was conducted with the intent to support even greater false claims made by dishonorable individuals that he was a threat to US national security. (In addition to the information provided by “very reliable sources”, the New York City Police Department (“NYPD”) identified the dishonorable individuals engaged in illegal actions against Clark as federal officials and contractors working at their behest. A NYPD sergeant quoted one of the federal officials stating to him incredulously in 2014 that they were “interested in an international matter concerning Clark outside the scope of the NYPD’s mission.”) Two additional absolutely false claims that the dishonorable individuals are still propogating are that “Clark was a government analyst,” flattering themselves, connecting Clark to any government work in which they are engaged, making such and “Clark trained foreign troops overseas,” which is shear fantasy. When these outright lies are told, no information is ever provided as to the specific government organizations that Clark supposedly worked for when he allegedly carried out these activities. The most basic research into Clark’s background would easily and completely disprove these ridiculous claims made by the dishonorable individuals. A third false claim, rather odd and remote yet tacked on the others, is the insistence that “Clark is afraid of dogs.” That is an utter lie, conjured up undoubtedly with the same vacuity and enthusuasm as all of the dishonorable individuals’ other lies. Most recently, to Clark’s utter shock, it was revealed to him the greatest false claim of all has been made by the dishonorable individuals. They have made the incredulous claim that Clark is has been long engaged in espionage against the US. This claim is so absolutely false, that it may serve as an indication of some considerable psychological problems amongst the dishonorable individuals. It is impossible to believe that anyone of sound mind would state something completely false to a great number of people without having any ability whatsoever to support it with truth. Nevertheless, the false claim has been made. At the start of 2020, Clark was informed that the dishonorable individuals for years had claimed he once served in the US Navy. Clark never served in the US Navy or US Marine Corps for that matter. These fact can also be easily verified. How foolish it would be for anyone who actually knows Clark to believe any of the dishonorable individuals false claims. Any one who might investigate this matter should know that these problems were in fact initiated by a rogue FBI Special Agent, John Consoli, who held an irrational dislike of Clark and promised him some time ago that he would hurt him by making certain that Joint Terrorism Task Force in New York acted against him. In Consoli’s words: “Once they are in you, they will never let you go!” At that time, Consoli was apparently a member of what was called the “Iran Unit” of the FBI’s New York Office. Clearly, Consoli set forth on that hostile, wrongful path as he vowed with the help of other FBI Special Agents. Along the way, other federal agencies saw fit to jump in on the unwarranted effort to destroy Clark’s life and the lives of his elderly mother and young daughter. Doubtlessly following the inception of the attack against Clark, no further manipulation by Consoli was required to encourage the other federal agencies to seek a piece of action in a well-budgeted cooperative effort against him. (Note: FBI Special Agent John Consoli once attempted to draw a pistol on Clark in the quondom Three Star Diner in New York and was stopped with force by a fellow FBI Special Agent, Mark Kellert who was present, essentially saving Clark’s life. Further, this particular John Consoli is very well known to, and once sought by, Italian authorities.)

According to another very reliable source, in addition to their misuse of essays and reviews on greatcharlie, the same dishonorable federal officials and contractors, with promise of significant remuneration, encouraged Clark’s ex-wife, who is unnamed here, to write numerous damaging false statements, with the purpose of supporting their false claims about Clark as being a threat to society and a threat to US national security. That in turn enabled them to secure authority to engage in a very costly, wide-ranging, and needless surveillance operation against him, as well as conduct a very destructive, very apparent “dirty tricks” campaign against him of which a record has been kept by Clark. Clark had battled his ex-wife in an extremely contentious divorce in which the custody of his daughter was at the forefront. Thus, his ex-wife, had a pre-existing animus toward Clark and had indicated more than once that she had a personal aim of severely harming him. In numerous trenchant false statements she provided against Clark, nearly all concerned completely imaginary activities that he purportedly engaged in with foreign governments. Again, based on very reliable sources, she continues to provide similar absolutely false statements to date, even though Clark has had no contact or communication of any kind with her for nearly three years. Reportedly, his ex-wife was introduced to the dishonorable individuals who encouraged and paid her to write the false statenents by a parent named Sylvia Kovac at his daughter’s school. In 2013, Kovac had been directed by the same dishonorable individuals to establish clandestine contacts with Clark. After contact with the same dishonorable individuals, Clark’s daughter’s school, itself, eventually became involved in the matter. Vigilante actions by parents at the school, mostly surveiling Clark and engaging him in leading conversations, directed by members of the school’s security office, specifically Lou Uliano and Joseph Pignataro, both formerly of the NYPD. Those wrongful, destructive activities were approved by the head of the school, then Joan Lonergan and the then head of the lower school, Frank Patti. Those activities intensified when Clark’s daughter entered the Middle School and the school was placed under the new leadership of Tara Christie Kinsey. Note that the school and parents were paid quite well by the dishonorable individuals for engaging in such activity. This had a devastating psychological impact on Clark’s young daughter. Clark’s inquiries with school officials into what was transpiring were met with terse denials. Once Clark’s daughter entered the Upper School, and few parents would pick up their daughters when classes ended at 3:00PM, any time Clark came within the vicinity of the school to drop his daughter off by taxi or meet her in the street, the school’s security director Joseph Pignataro, with assistance of the dishonorable individuals as spotters, would have Middle School parents along with their daughters, aggressively surveil Clark. This had a further devastating psychological impact on Clark’s daughter. Far more sinister steps were undertaken by school security officials, surely to the satisfaction of the dishonorable individuals, to eviscerate Clark’s reputation among school faculty, staff, and especially school families. (Clark maintains a list of those individuals, too long to enumerate here, and the dates and times in which they engaged in such activity which he can make available to investigators.) The effect of the hostile activities of school security and other school officials has been to constructively eject Clark from the school community and destroying any chance that Clark could ever have an authentically positive relationship with his daughter’s school. (Note, as Clark observed, that the dishonorable individuals and their operatives had absolutely no compunction about engaging in their wrongful, nefarious, vacuous, activities in a school, hospital, or house of worship.) Away from the school, itself, but in its vicinity, there were also efforts by operatives organic to the organization in which the dishonorable individuals worked to establish clandestine conversations with Clark. In 2013, the initial effort was made by a writer named Nunyo Demasio. His apparent goal was to encourage Clark to make negative statements about the US government and incriminating statements about himself. Many others have attempted to engage Clark in clandestine conversations. Parents from the martial arts school that his daughter attended while in 2nd and 3rd Grades would absurdly don sunglasses and come down to her high school during pick-up time to track Clark and his daughter as they walked home. Another effort included having individuals familiar with Clark contact him with emails, all essentially with the same message, insisting that he contact them immediately and answer some frightfully meaningless questions. Those who engaged in such behavior can be readily identified by Clark by name. They can also be identified via their emails, text messages, photos, and through Clark’s telephone logs. An authentic patriot and Founding Father of the US, James Madison, in describing the mob mentality of such individuals organized as vigilantes by the dishonorable individuals and their operatives for such a sinister purposes, perfectly stated that they were, “united and actuated by some common impulse of passion, or of interest, adverse to the rights of other citizens, or to the permanent and aggregate interests of the community.”

The unjustified surveillance and an apparent fraudulent investigation of Clark supported by the use of false statements also included the use of the harsh, technique of “raking”. Through that technique, the effort was made by the aforementioned dishonorable and unscrupulous individuals to influence anything and anyone associated with Clark or anyone with whom Clark came in contact. Organizations, businesses, lawyers, doctors, his daughter’s pediatrician, tax preparers, bank staff, school officials, literally any individuals with whom Clark spoke and any employees in any establishment in which he shopped, were intercepted and told the most odious things possible about him. The dishonorable individuals have sought to assure Clark would not be able to enjoy the warmth of authentic human contact. They insisted upin getting between Clark and his contacts with anyone. The overwhelming majority of those who heard such statements from the dishonorable federal officials and contractors, who presumably mistakenly believed that they were receiving information from a credible source, and after being offered remuneration, and perhaps becoming excited over the idea of spying against an “officially” declared “enemy”, were quickly convinced that Clark was a threat to society and a threat to US national security. They ostensibly relieved themselves of doubt or guilt by accepting that they were acting against him upon the direction of their government. As a clerk working in a neighborhood Duane Reade pharmacy told Clark, “We just follow orders!” For Clark, creating new relationships or acquaintances of any kind, business or personal, eventually became impossible due to the immediate interference of the dishonorable federal officials and their contractors between him and anyone else. (Remember, this extreme situation has existed for Clark for over eight years! The actual surveillance has been underway for over a decade.) It would seem that not much could have been worse than to have federal officials and their contractors propagate ideas that would bring the loyalty of a patriotic citizen as Clark into question. Such false claims tragically tend to stick even after the truth has been revealed. The dishonorable individuals, however, have commumicated things that were far worse! The dishonorable individuals are apparently so lacking in self-confidence, that they have felt the need to compensate for that deficit via the development of an egotistical mindset that has led them to brag about their power and capabilities to their “operatives” and amazingly, in Clark’s case, go as far as to spread rumors of their plans to injure and even kill him and members of his family. That particular behavior was especially prevalent in the Fall and Winter of 2015 during which Clark was repeatedly warned by some long time acquaintances (whose names Clark can reveal to an investigator), who, to their great surprise, were contacted by the dishonorable individuals.

When examined, elements of the aggressive surveillance have left little doubt that the dishonorable individuals have also clumsily engaged in a far less thoughtful simulacrum of the East German Stasi (State Security) technique of psychological harassment of perceived enemies known as Zersetzung, a term borrowed from chemistry which literally means “decomposition”, but involved the disruption of the victim’s private or family life. Zersetzung was designed to side-track and “switch off” perceived enemies so that they would lose the will to continue any “inappropriate” activities. The disinformation and “dirty tricks” aspects of the dishonorable individuals campaign against Clark and his family appear to be part of their imitative Zersetzung program. In the case of Clark, however, neither he nor his mother and daughter have ever engaged in any inappropriate activities that have needed to be halted. On far more occasions than not, those taking direction from the dishonorable federal officials and contractors displayed extraordinarily hostile attitudes toward Clark and committed aggressive, even violent acts against him while engaging in their untrained, unskilled surveillance.  It has all been vigilantism in a particularly odious form. Clark’s elderly mother, now 89, and young daughter have also faced the same or worse attitudes and behavior from quickly recruited, ad hoc “operatives”–some hired astonishingly right off the street–as they engaged in their amateur surveillance activities against them. Reportedly, those taking such overzealous actions have been showered with praise and support, and payments, from the dishonorable federal officials and contractors. They further manipulate their amateur operatives by telling them that by engaging in such aggressive action they prove themselves to be “true patriots!” A plethora of evidence available indicates the wrongful actions outlined here as well as many others, all of which violate their First Amendment rights of Clark and his family under the US Constitution are unfortunately still being conducted against them as of this writing, particularly inside the apartment building in which they live. Main offenders engaged in this activity over the past four years in the apartment building in which Clark resides on East End Avenue in New York City include tenants: Seth Balsam; Leonardo Celestino; Joel Weisberg, Dana Rolf, Joseph Cohen; Jim Cronin; Elaine Ann Cronin; John David Griesedieck; Abby Reeves Griesedieck; Ira A. Altman; Susan Levkoff; Sebastian Teslic; Jay Desai; Dorothy Chan; Joanne Chan; John Lysohir; Pamela Lysohir; Robert Terry; Barbara Ainslie; Austin Hayden; Nesrin Salkin; Melissa Iorio; Erin Yurkewecz; Laura Nardelli; Christina Zugor; Maureen Linehan; Jennifer Marian Lee; Christopher Gonzålez-Ribot; Allegra Lugo; Christopher P. Cau; and, Barbara Frankfurt. The names of many other tenants engaged in hostile behavior toward Clark’s family are also known. The unrelenting, attrocious behavior of Joel Weisberg, Laura Nardelli, Barbara Frankfurt, Leonardo Celestino, and Christopher Gonzålez-Ribot, in particular, has far surpassed that of all others. In addition to making threatening comments and obscene gestures to Clark, which were reported to the NYPD, Celestino, who lives in the apartment above him, regularly creates disturbances by literally hammering on the floor throughout his apartment at all hours–at times the hammering sound was deafening, moving chairs across the floor in the early morning hours, and is constantly accessing and pulling on the wiring in the walls. When Celestino’s behavior was reported to the Superintendent, nothing was done concerning it. Instead, Clark received an email from the landlord insisting, with the threat of eviction, that he not disturb the other tenants. One morning in late May 2020, Frankfurt stood with her dog in the hall of Clark’s apartment floor, and for reasons unknown waited six feet from his apartment door. When Clark’s young daughter arrived on the floor by elevator and walked casually toward her own home, Frankfurt, standing only a few feet away with her dog, declared to her “If you come near me I will call the police!” Clark’s daughter did absolutely nothing to provoke Frankfurt. (Frankfurt is a former employee of the landlord of Clark’s apartment building.) Untrained for surveillance, or such “active measures”, each would undoubtedly confess to their activities when questioned by an experienced investigator. (An especially revolting aspect of the actions of those recruited to engage in surveillance against Clark and his family is a decision by those “untutored operatives” to include their own children in their activities. They will hold them as shields as they try to get closer to Clark; bring them to locations where Clark and his daughter may be seated and move their children as close to them as possible; or, have the children block a means of egress for Clark, literally placing them in his path. Tenants in Clark’s apartment building regularly engage in this abhorrent action. It is horrible to watch. It is hard to imagine how those individuals live with themselves. One individual who was recruited by the dishonorable individuals to spy on Clark and his family and formerly engaged in this practice of using his own children when surveilling them, admitted to Clark that the dishonorable individuals strongly suggested surveillance recruits who were parents, include their children in their activities. Reportedly, the dishonorable individuals assured their operatives that Clark would never be aware of how the children were being used as “props.” One might presume that the remuneration for the surveillance work is increased when parents include their children. Children were reportedly presented with little gifts from the dishonorable individuals. It is unsettling to regularly observe how the natural sensibilities of parents to protect their children from trouble or a slight possibility of harm can be so easily overcome by the lure of easy money. [Note: Since the time this information was included, the use of children in the dishonorable individuals wrongful surveillance activities against Clark and his family, particularly in restaurants and cafes, has increased twice as many times in new, more disturbing forms.])

It has been repeatedly called to Clark’s attention by his apartment building landlord that there have shockingly been numerous complaints filed with the NYPD about his alleged “hostile and threatening behavior” against other tenants in his apartment building. From all that Clark has been told, a bundle of complaints from tenants were all filed contemporaneously in 2018. It is odd in itself that so many complaints about individual negative contacts with Clark would reported at the same time. However, more importantly, Clark has the great benefit of being able to provide proof of his whereabouts at all times and of knowing he has not initiated any contact with any tenants since he arrived in the apartment building. The contacts he has had unfortunately have been those occasions in which other hostile tenants have approached him suddenly and levelled threats at him, as well as those occasions during which aggressive tenants have engaged in dreadful behavior toward his family and him. Without a shadow of doubt, the complaints made to the NYPD against Clark are all false complaints. It is extremely possible that the mass reporting of complaints against Clark by tenants was a tactic encouraged and organized by the dishonorable individuals. Many of those who made complaints against Clark had likely never been in contact with the police before. Again, with the benefit of knowing he did not engage in any of the behavior reportedly alleged in the complaints, Clark is also well aware that not one complaint made against him can be substantiated. Further note that not one complaint was made under oath. In fact, the type of complaints that were reportedly made, can made by anyone, against anybody, for literally any reason

While it may have appeared to be a foolproof, no risk action to take against Clark, and it may very well be that the dishonorable individuals may have convinced tenants in Clark’s apartment building that such was the case, in reality, making false complaints to the NYPD is a violation of the law. Under New York  Consolidated Laws, Penal Law – PEN § 240.50, Falsely reporting an incident in the third degree, a person is guilty of falsely reporting an incident in the third degree when, knowing the information reported, conveyed or circulated to be false or baseless, he or she gratuitously reports to a law enforcement officer or agency (a) the alleged occurrence of an offense or incident which did not in fact occur;  or (b) an allegedly impending occurrence of an offense or incident which in fact is not about to occur;  or (c) false information relating to an actual offense or incident or to the alleged implication of some person therein. The penalty for engaging in such a violation of law could be as much as imprisonment for one year. If a tenant, who made one of the complaints among the bundle of the complaints supposedly filed against Clark to the NYPD, would be willing to discuss why they made them in an interview with any investigators, it would almost certainly be revealed that they were prompted by the dishonorable individuals to engage in such behavior. Along with providing remuneration to tenants in Clark’s apartment building in return for their assist in violating Clark’s First and Fourth Amendment rights under the Constitution, and securing numerous false statements about Clark from his ex-wife, unnamed here, and Sylvia Kovac which were reportedly used wrongfully to secure FISA Court warrants, the request that tenants violate the law by making false complaints to the NYPD evinces a pattern by the dishonorable individuals of encouraging and supporting unlawful actions by all of their “operatives” against Clark and his family.

Certain parties associated with Clark’s apartment building management have made written threats to use NYPD police complaints from tenants that he possesses, all of which are absolutely false, in court proceedings to harm Clark and remove him from his apartment. Under § 210.35 of Article 210 of New York Penal Law, Part 3, Title L, a person is guilty of making an apparently sworn false statement in the second degree when he subscribes a written instrument knowing that it contains a statement which is false and does not believe to be true. Making a sworn false statement in the second degree is a Class A misdemeanor. Again, as aforementioned, Clark has the benefit of knowing he did not engage in any of the behavior reportedly alleged in the complaints. Clark is also well aware that not one alleged complaint made against him can be substantiated. Clark can substantiate his own claims of his whereabouts at all times. At no time was he aggressive toward other building tenants, engage in threatening behavior, or initiate any negative verbal exchanges with any tenants. Clark has gone out of his way to avoid engaging other tenants.

According to Clark’s daughter, a building back elevator operator who works predominantly as a doorman, George Semeniouk, regularly makes unspeakable misogynistic comments toward her grandmother and her on mornings when they are on their way to her school. He has on more than one occasion threatened to harm Clark. Doorman Lech Stepien had sought to engage in clandestine conversations with Clark on behalf of the dishonorable individuals during 2017, 2018, and better part of 2019. (While he would consistently ask Clark specific and intrusive questions about his work, Stepien’s purpose for the dishonorable individuals was to authentically engage Clark to support their wrongful claims of statements, all of which were untrue, that Clark supposedly made to him.) Having failed to entrap Clark, Stepien took a hostile posture toward him from that moment on. When at the concierge desk, he turns his back or walks away from it whenever Clark enters or leaves the building. When other building employees are present with Stepien when Clark is entering or exiting the building, according to what a couple of those employees have told Clark, he makes ugly statements in Polish referring to Clark as something less than human. As the supervisor/scheduler of the building’s doormen due to his seniority, surely not capabilities, Stepien insists that other doormen cooperate with fully with the dishonorable individuals despite the reluctance of some to do so. The behavior of both Semeniouk and Stepien has been encouraged ultimately by the apartment building superintendent, Marek Kurkarewicz. Kurkarewicz has also encouraged contractors working the building, doing renovations or repairs and relatively transient, to engage in hostile behavior toward Clark and his family, to include making outrageous lewd comments toward his young daughter. Kurkarewicz has done much on behalf of the dishonorable individuals to spread the lie among old tenants and all new tenants, that Clark Is an “enemy spy.” Further, he has encouraged them to become fully involved in the wrongful surveillance of Clark and his family. Finally, to respond directly to an absolutely false claim concerning Clark’s status in the apartment building, he is not simply a visitor or resident but his full name is on the executed apartment lease and he has a hard copy of that document to prove that. Efforts have been made for nearly 5 years to spread false information that Clark was not on the apartment lease. (For all those concerned, be advised that a lease is a contract between a landlord and a tenant, containing the terms and conditions of the rental. It cannot be changed while it is in effect unless BOTH parties agree.) Presumably, the dishonorable individuals want to claim that they did not violate Clark’s First and Fourth Amendment Rights in his apartment building by using deception to falsely establish, and convince anyone involved or interested, that Clark is not a full-fledged tenant there. Clark is due all of his Constitutional Rights as tenant signed on to the apartment lease, and his rights have been violated for countless months by the dishonorable individuals and their operatives, apartment building tenants and employees. Further, Kurkarewicz would provide the apartment building landlord with false, disconcerting reports about Clark to include lies about him openly threatening building tenants and employees, prompting the landlord to send Clark emails, the last one as recent as February 2020, threatening to evict his family from the building if the behavior reported by Kurkarewicz continued. The threats have been made despite the fact that the landlord could not substantiate any of the fictitious claims concocted by Kurkarewicz. Any possibility for a positive relationship between Clark and the landlord was successfully destroyed by Kurkarewicz. An apartment building employee who acted essentially as Superintendent Kurkarewicz’s executive officer or sidekick in all matters concerning the wrongful treatment of Clark and his family is Arthur Passamonik. By his own admission to Clark indirectly, subtly, yet undoubtedly, Passamonik has had access to a curious set audio and video surveillance tools directed at Clark’s apartment. This access has existed uninterrupted for 4 years. Passamonik finds the fact that he has been presented access to the surveillance tools by the dishonorable individuals responsible for the overall illegal, intrusive, and wrongful surveillance if Clark and his daughter and mother as quite humorous. While Clark made requests for repairs in his apartment, Kurkarewicz ignored his requests and problems in the apartment have been left unrepaired for almost 5 years. It is unclear whether the apartment building landlord is fully aware of the extent of the audio and video surveillance of Clark in the apartment building. (It has been made apparent to Clark that other tenants in the apartment building hostile to Clark, given comments and behavior, such as Leonardo Celestino, have also been provided access to feeds from the audio and video surveillance tools directed at Clark apartment by the dishonorable individuals.)

Lastly, in one of the saddest parts of the whole matter of apartment building staff behavior is that concerning Chris Warsawa, a doorman. Warsawa, as with other members of the apartment building staff became involved with the surveillance of Clark and his family inside the apartment building shortly after their arrival. He was a porter then. Soon after being promoted to doorman by Kurkarewicz, he was fully involved with all aspects of surveillance and harassment activity at the behest of the dishonorable individuals, to include: facilitating the wrongful surveillance actions of tenants; refusing to provide Clark with names of tenants who were rude and discourteous to him as well as his mother and daughter; denying the wrongful behavior of tenants and staff when asked; call Clark ostensibly to discuss his deliveries and mail; and, providing and doing anything else the dishonorable individuals asked him to do against Clark. When he actually witnessed or was made aware of occasions when tenants misbehaved toward Clark he would do nothing but presumably report it to the dishonorable individuals as part his responsibilities to them. On occasion when Clark asked Warsawa the name of another tenants, Warsawa would only say the tenant’s name was “Joel.” Suddenly, everyone was named Joel. Soon enough, Warsawa’s conversations with Clark, although they concerned apartment building business, were being used by the dishonorable individuals to claim Warsawa had established clandestine contact with Clark, an important goal for them. Clark is well-aware that any contacts Warsawa has with him now are transmitted as captured clandestine conversations to the dishonorable individuals much as Lech Stepien had done before Clark began to avoid him completely. As Warsswa is the youngest member of the apartment building staff and seemed initially to be of good nature, Clark tried to convince him to move away from the dishonorable individuals. For months, Clark has sought to explain to Warsawa why the surveillance and all other harassing activity was not only wrong but illegal. All of Clark’s efforts came to no avail. Unbeknownst perhaps to Warsawa, the dishonorable individuals, using surveillance operatives other than apartment building tenants and staff, would let Clark know that they were fully aware of his conversations with Warsawa, having their operatives repeat things Clark said and by taking action on things he said, particularly regarding surveillance activity. The hope of the dishonorable individuals in doing those things was most likely to get Clark to turn against young Warsawa. Of course, destroying positive interactions between people is their forte. Clark understands that for Warsawa, as a young man, gaining approval from so-called experienced men in important and he believes he is doing something important, something special, by committing wrongful acts on behalf of the dishonorable individuals. However, he is only violating Clark’s rights and violating the law by helping the dishonorable individuals. Left with no options, Clark has finally decided to reveal what Warsawa has been doing. Rursus prosperum ac felix scelus virtus vocatur; sontibus parent boni, ius est in armis, opprimit leges timor. (Once again prosperous and successful crime goes by the name of virtue; good men obey the bad, might is right and fear oppresses law.)

Through their abuse of power, the dishonorable federal officials and contractors have successfully torn Clark’s family away from peace and a happy life in what is a democratic society based on a Constitution. It is impossible to believe by any stretch of the imagination that any part of what the dishonorable individuals have done to Clark and his family could be called “professional conduct.” Under the law, the rights of its citizens must be protected. One might hypothesize that for those dishonorable individuals acting against Clark and his family, one is guilty when they say one is guilty. One is not presumed innocent unless proven guilty in a court of law. Be assured that none of what has been presented here is intended to serve as some banal amusement. The situation is real and the facts presented are true and accurate.

If the removal of our essays and reviews has inconvenienced anyone among our loyal readers,greatcharlie offers its sincerest apologies.

Russia Is Top US National Security Threat Says General Dunford; That Should Make It the Top Priority for US Diplomacy

Pictured are Russian Federation President Vladimir Putin (2nd right), Minister of Defense Sergei Shoigu (left), Black Sea Fleet Commander Vice Admiral Aleksander Vitko (2nd left), and the Director of Russia’s Federal Security Service (FSB) Alexander Bortnikov.  Putin, rejects any criticism over Russia’s actions in Ukraine or anything else. He says Russia was targeted by the West with sanctions and he had to respond with retaliatory, protective measures.

According to a July 9, 2015 Reuters article entitled, “Russia Is Top US National Security Threat: Gen. Dunford,” US Marine Corps Commandant General Joseph Dunford says Russia is at the top of the list of security concerns for the US. Dunford was speaking at his US Senate confirmation hearing to become the next US Chairman of the Joint Chiefs of Staff. Reuters quoted Dunford as saying, “If you want to talk about a nation that could pose an existential threat to the United States, I’d have to point to Russia. And if you look at their behavior, it is nothing short of alarming.” Relations between Russia and the West have taken a sharp turn downward since Russia’s intervention in Ukraine. Political leaders among the NATO Allies are uncertain of what Putin is trying to achieve with his actions in Ukraine, his moves in the Baltic States, positioning of Russian rocket forces near Poland, or his considerable military build-up. The Supreme Allied Commander, Europe (the military commander of NATO), US Air Force General Philip Breedlove, told a US Congressional Committee in April 2015, “We cannot fully grasp Putin’s intent.” Breedlove further stated, “What we can do is learn from his actions, and what we see suggests growing Russian capabilities, significant military modernization and an ambitious strategic intent.” NATO conducted several exercises to show Putin its intent to respond to aggression.

Sanctions from the US and Europeans have put relations between Russia and the West, built largely on economic cooperation, at considerable risk and pose a serious economic threat to Russia despite any heroic claims otherwise by Putin. Repetitive threats of further sanctions from the US and EU could prompt Putin to consider means to shift the power equation. He may eventually feel his back is against the wall and do more than put his forces on parade or use his forces covertly despite his denials of doing so. The escalating war of words between US and Russian officials is also problematic. Words of anger, mockery, hate, and aggression, do damage that can be difficult to repair. The world has witnessed the vicissitudes faced by the Obama administration in foreign policy. The administration often fails to acknowledge how dire problems really are. It tends to settle upon bromides, with a seductive kind of superficiality, to very challenging situations, which later prove to be shallow entrapments. Some resolution must be found to current problems in relations with Russia. In order to respond diplomatically to Putin, the genuine motivation for his actions must be uncovered. Formal diplomatic talks could be established between the US and EU with Russia not in an attempt to mollify him, but provide opportunities for all sides to “clear the air” on those issues and others and work together to mutually satisfy interests. Negotiations can be based on the relative strengths of the positions and capabilities of all sides. The peace that can be achieved must be the focus not how much each side can destroy through warfare. In the US and in the EU, all other elements of foreign and defense policy must serve to effectively support that diplomacy. Good use must be made of time available before situations change. The door to opportunity might remain open for a brief period. O si sic omnia! (Oh would that all had been done or said thus!)

Whenever Putin now hears NATO threaten to use force against Russia, albeit defensively, he responds with an enigmatic face. Even though NATO took steps such as maneuvers or force redeployments were taken in response to Crimea or ostensibly a perceived Russian threat to Eastern Ukraine, the Baltic States, and Poland, Putin likely expected NATO Allies to continue making steep military cuts and fail to meet their military commitments.

Putin’s Response to the West

Putin and his advisers have heard explanations from the US and EU that sanctions were a means to halt its annexation of Crimea, its activities in Ukraine, a response to the downing of Malaysian Airline Flight MH117, and as a means to push all parties to the negotiating table. Putin, however, rejects any criticism of Russia’s actions over Ukraine or anything else. He explains that the deterioration of relations with the West was “not our choice.” He has proffered. “It was not we who introduced restrictions on trade and economic activities. Rather we were the target and we had to respond with retaliatory, protective measures.”

Having been a P5+1 partner with China as well as the main Western powers that levied sanctions against it, the US, United Kingdom, France, and Germany during the nuclear negotiations with Iran, Putin and his advisers have undoubtedly learned how to more effectively handle the West on issues as Ukraine. Observing the decision making of Western powers up close on Iran, Putin can likely better predict Western responses in certain situations. Beyond what Russia gleaned from the Iran talks, Putin has looked deeply at the US and Europe, discerning many flaws, weaknesses in the transatlantic defense. He has watched it decay due to Western political leaders’ lack the will to maintain it. After the Soviet Union’s collapse, NATO members became weary of investing financial resources in a deterrent force that faced no threat. Putin tested NATO, acting unabashedly in the face of the alliance by moving against countries that are part of Russia’s “near abroad.” In 2008, Putin forced Armenia to break off its agreements with the EU, and Moldova was placed under similar pressure. That same year, Putin invaded Georgia. Russian troops still occupy the Abkhazia and South Ossetia regions. Whenever NATO threatens to use force against Russia now, albeit defensively, Putin responds with an enigmatic face. Even though maneuvers and force redeployments were made and sanctions were imposed in response to Russian moves as in Crimea or a perceived threat to Eastern Ukraine, the Baltic States, and Poland, Putin expected Allies to continue making steep military cuts and fail to meet their NATO military commitments.

Tanquam ex ungue leonem! (From the claw we may judge a lion.) Since 2011, uniformed military manpower has declined in every Western nation, but Russian military manpower has increased by 25 percent to 850,000 between 2011 and mid-2014. Russia supposedly has about 2.5 million active reservists out of a total population of 143 million. It ranks second, behind the US, on the list of countries with conventional warfighting capabilities. Expenditures on defense, and the related category of national security and law enforcement, accounts for 34 percent of Russia’s budget which is more than twice in comparison with 2010. The US only spent 18 percent, or $615 billion of its budget in 2014 on defense and international security. Explaining his concept for achieving this growth, Putin told senior military commanders and defense industry executives at a meeting in Sochi on May 12, 2015, “We can and must do for the defense industry what we did for Sochi.” Putin was referring to the $50 billion spent in to host the 2014 Winter Olympics there. He went on to state, “All questions relating to adequate resource allocation have been resolved.” Putin has a penchant to display power. Most recently it has been lurid. With its conventional forces rejuvenated, Russia is on the march again, seizing territory in albeit a piecemeal fashion. Putin has likely assessed war with Russia is the last thing US and EU political leaders want. He has seemingly gauged his moves sensing just how far he can go with them. He may believe he can later legitimize acquisitions via talks with the West.

Putin emerged from the Communist system of the Soviet Union. Not to be impolitic, but those emerging from that system often hold a view, infiltrated by pessimism, that the world is filled with dangers and potential enemies. To Putin, only naiveté could cause one to believe relations with the West would always be congenial given the previous years of geopolitical struggle. Aspects surrounding his career in the Soviet Union’s KGB certainly reinforced that perspective.

Confabulating on Putin

Since the fall of the Soviet Union, Putin has been the authentic face of the Russian government. Putin restored order in his country after the internal chaos of the 1990s, reestablishing the power of the state. Putin emerged from the Communist system of the Soviet Union. Not to be impolitic, but those emerging from that system often hold a view, infiltrated by pessimism, that the world is filled with dangers and potential enemies.  To Putin,  only naiveté could cause one to believe relations with the West would always be congenial given the previous years of geopolitical struggle. Given its approach to Putin, there is every indication that many in the West believed positive relations with Russia would endure despite pushing Western demands its leaders. Putin style of management was undoubtedly shaped by his initial career as an officer from 1975 to 1991 in the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) known better as the KGB—the agency responsible for intelligence, counterintelligence, and internal security. He reached the rank of lieutenant colonel before retiring. However, his style was not shaped in terms of his use of KGB tradecraft. It was shaped as a result of his continued close association with a small group of men who served alongside him during his KGB career, particularly a few who served in the German Democratic Republic (East Germany) with him. They are called siloviki (power men). Finding siloviki, particularly retirees of the KGB, and the present day security service, Federal’naya sluzhba bezopasnosti Rossiyskoy Federatsi (Federal Security Service) or FSB, in high places in Russia is not unusual. At the pinnacle are men among them who came from Putin’s hometown of St. Petersburg. These men come from a community of families whose “roots” go back to the beginnings of the Communist Party and its first political police known as the Cheka. Putin’s Cheka heritage includes both a father and grandfather who served in the security service. He was raised in the Chekisty (Chekist) community, attending schools and a university Chekists’ progeny typically attended. That left an imprint on him. Putin got his start in politics at the local level in his hometown of St. Petersburg. As head of the St. Petersburg Committee for Foreign Liaison, a post he received through KGB patronage, Putin began working with a tight knit circle of Chekists.  Putin rose to deputy-mayor, but his work in St. Petersburg was halted after six years when his boss lost his bid for reelection. Yet, in two years, he rose from being an out-of-work deputy mayor to head of the FSB. A year later, Putin was the prime minister. Six months later, he was Russian Federation President.

Chekists share a view that the greatest danger to Russia comes from the West. They believe Western governments are driven to weaken Russia, create disorder, and make their country dependent of Western technologies. They feel that under former President Boris Yeltsin, the Russian leadership made the mistake of believing Russia no longer had any enemies. As heard in Putin’s public statements, Chekists consider the collapse of the Soviet Union, under Western pressure, as the worst geopolitical catastrophe of the 20th Century. Putin says that he is determined to save Russia from disintegration, and frustrate those he perceives as enemies that might weaken it. He also wants to bring the independent states of the former Soviet Union back under Moscow’s political, economic, and military (security) influence. Putin does not hesitate to let the leaders of those states know his intentions either. Although Putin managed to restore order from turmoil in Russia, many would note that he accomplished this with little regard for human and political rights. There is a significant opposition movement to Putin in Russia, lead by individuals such as the slain statesman and politician, Boris Nemtsov. Yet, Putin’s words have also resonated with many Russians. Convinced Russia is in a struggle with the US, the Economist states 81 percent of Russians see the US as a threat. The EU is also viewed as such.

When Putin began his third term as Russian Federation President, the Obama administration responded to him as if he were the neophyte, not a seasoned leader. Old ills that were part of US-Russian relations resurfaced and news ones arose. A series of deliberate public rebuffs to Putin sullied ties further. Putin’s anger metastasized. Soon enough, regular intrusions by Russian military aircraft in NATO airspace and Russian warships in NATO waters began.

The Downturn in Relations Began Well Before Ukraine

Dimitry Medvedev was Russian Federation President when Obama came to office. Obama seemed to measure all possibilities on relations with Russia on his interactions with him. So comfortable was Obama with Medvedev that he went as far as to declare a new era between the two former Cold War adversaries existed. Senior Russia analysts in the US government could have confirmed that Putin, who at the time was serving as Russia’s Prime Minister, was the real power in Moscow. Yet, that truth was given little consideration. Instead, Putin was treated by Obama as the “odd man out”. Little was done to build a relationship with him. When Putin began his third term as Russia’s president on May 7, 2012, the Obama administration responded to him as if he were a neophyte and not a seasoned national leader. Old ills that were part of US-Russian relations resurfaced, and new ones arose, to include: Putin’s decision to allow US National Security Agency whistleblower Edward Snowden to reside in Russia; ongoing espionage efforts between Russia and the US, including the activities of Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR officer Anna Chapman and other Russian “illegals” captured by the Federal Bureau of Investigation in 2010, and the allegations of US spying on Russia revealed by Snowden and Wikileaks; and the US admonishment of Russia on human rights issues. Putin was still fuming over Operation Unified Protector, during which in 2011, multinational forces including the US, were placed under NATO command and imposed a no-fly zone and destroyed government forces loyal to then-Libyan President Muammar Gaddafi. Putin felt NATO-led forces went beyond UN Security Council Resolution 1973’s mandate by helping local forces overthrow Gaddafi. Gaddafi had been a friend of the Soviet Union and Russia. The world recognized how poor the relationship between Obama and Putin was after observing their body language during a June 17, 2013 meeting in Northern Ireland. A spate of public rebuffs to Putin sullied ties further.

Positive signals from Obama’s discussions on nuclear arms reductions with Medvedev likely gave administration officials the idea that Putin would also consider proposals on it. Putin firmly expressed disinterest, but administration officials smugly insisted that Putin agree to reductions in both nations’ nuclear arsenals. Putin then out rightly rejected their proposals. Obama administration officials were unprepared to receive Putin’s final rejection of the proposals and reacted poorly. Putin’s decision was viewed within the Obama administration as ending the president’s “signature effort to transform Russian-American relations and potentially dooming his aspirations for further nuclear arms cuts before leaving office.”   With the apparent goal of retaliating against Putin over his decision on its nuclear proposals, on August 7, 2013, the White House cancelled a September summit meeting in Moscow for Obama and Putin. It was a trite, and amateurish response. Administration’s officials explained their decision to cancel behind lightweight rhetoric regarding the effective use of the president’s time. An August 8, 2013 New York Times article quoted US Deputy National Security Adviser Benjamin J. Rhodes as stating, “We weren’t going to have a summit for the sake of appearance, and there wasn’t an agenda that was ripe.” Commenting on his rejection of the proposal, Putin was likened to l’enfant terrible. An unidentified source told for the same August 8th article stated, “We just didn’t get traction with the Russians. They were not prepared to engage seriously or immediately on what we thought was the very important agenda before us.” That source went on to state, “this decision was rooted in a much broader assessment and deeper disappointment.” Putin and his advisers were further convinced that the US and EU did not respect Russia as a power, even militarily. Aching to be taking seriously in the US public, among other reasons, Putin soon after wrote a September 11, 2013, op-ed in the New York Times entitled, “A Plea for Caution”. He challenged popular views on foreign policy and national-identity held in the US.

There were other public affronts. The next year, during preparation for the 2014 Winter Olympic Games in Sochi, there was a constant drum beat of doubt expressed by US security experts on the capability of the Russian security services to protect Sochi from terrorism. US officials were highly critical of security measures taken by the Russians for the Games and the level of cooperation officials from Russian security service officials showed toward counterparts from US security organizations. There were endless dalliances into clairvoyance evinced by predictions of terrorist attacks. It smacked more of fear mongering than anything else. Obama administration and other US officials knew the Winter Olympics would have been a proud occasion for Putin and the Russian people. Sochi provided Putin the chance to present his resurgent Russia in the best light possible. The Russian people would have the opportunity to tap into the power of Russia’s renewed greatness. Putin displayed great patience in the face of mordant criticisms leveled against the Games’ organization and even personal rebuffs to him. Putin achieved his objective, and Sochi was safe and secure. However, what occurred was not forgotten. Empta dolore experientia docet! (Experience teaches when bought with pain!)

By 2014, Putin’s anger toward the US as well as the Europeans metastasized. In his March 18, 2014 speech declaring Russia’s annexation of Crimea, Putin enumerated some Western actions that fostered contempt in Moscow. He mentioned: Russia’s economic collapse, which many Russians recall was worsened by destructive advice and false philanthropy of Western business and economic experts that did more to cripple their country; the expansion of NATO to include members of the Soviet Union’s own alliance, the Warsaw Pact; the erroneous Russian decision to agree to the treaty limiting conventional forces in Europe, which he refers to as the “colonial treaty”; the West’s dismissal of Russia’s interests in Serbia and elsewhere; attempts to bring Georgia and Ukraine into NATO and the EU; and, Western efforts to instruct Russia on how to conduct its affairs domestically and internationally. Soon, there were regular incursions of Russian bombers and fighters in NATO airspace and Russian warships in NATO waters.

No Immediate Military Solution

At the NATO Defense Ministers Meetings on June 24, 2015, participants decided on air, maritime, and special forces components of an enhanced 40,000 strong NATO Response Force (NRF). Ministers took measures to speed up political and military decision-making, including authority for NATO’s Supreme Allied Commander, Europe to prepare troops for action as soon as a political decision is made. Ministers approved a new concept of advance planning. They also finalized details on the six small headquarters being set up in Bulgaria, Estonia, Latvia, Lithuania, Poland, and Romania. NATO Secretary General Jens Stoltenberg said, “They will each consist of around 40 people, and will play a key role in planning, exercises, and assisting potential reinforcement.” Ministers additionally decided to establish a new Joint Logistics Headquarters, to facilitate the rapid movement of forces when necessary.  Directly on Russia, Stoltenberg stated, “We are carefully assessing the implications of what Russia is doing, including its nuclear activities.” He added that NATO is working on how to deal with hybrid threats, including through close cooperation with the European Union. To avoid misperceptions of NATO’s actions, Stoltenberg explained, “We do not seek confrontation, and we do not want a new arms race.” He stressed, “we want to keep our countries safe… this is our job.”

However, despite promises, Allies must have the requisite political will to give meaning to those words and any plans. The reality is that US outlays on security are three times that of the other 27 partners combined, even though the US gross domestic product (GDP) is smaller than their total GDP. The disparity in burden threatens NATO’s integrity, cohesion and capability—and ultimately, both European and transatlantic security. Since Washington has decided to cut 40,000 troops from the US Army’s ranks by 2017, the US will not be able to cover any gaps in NATO’s strength without earmarking a sizeable portion of its forces primarily for that task. Although the NRF is now 40,000 strong, the political will of NATO Allies to use it to block or engage Russian forces must exist. While a Baltic state or Ukraine may face the eminent threat of a Russian attack, the NRF may only be poised for “sitzkrieg”, taking no aggressive action and making no effort to even deter potential Russian action. If instead of a hybrid attack, Putin ordered a Russian force, overwhelming in size and power to the NRF, to attack a target, it might be futile for the NRF to try to halt it, even with the maximum amount of pre-positioned weapon systems and ordinance available. The NRF might try to survive against the Russian leviathan until more NATO forces arrived to reinforce it and ideally expel Russia from the country under attack. However, Russia would not make reaching the NRF easy. A Normandy style landing to reinforce the NRF would hardly be possible. NATO air power might be able to stave off the Russian force, but air, land, and sea elements could mass from bases in Russia and use powerful conventional weapons to destroy forces engaged and reinforcements.

The path to the repair of US-Russian relations perhaps can be created by Kerry and Lavrov. Both men have the confidence of their respective presidents. Both have a strong interest in improving ties. Indications are that they have an ongoing dialogue on a variety of issues and have formed a good relationship. The US and the EU must continue work to directly with Russia, not shun it, to forge better ties and tackle hard issues.

The Way Forward

This is not greatcharlie’s first descant on Putin. Unlike other handschuhschneeballwerfer who have scrutinized Putin from a safe distance, the intent here is not to abuse. The goal has been to objectively examine thinking behind Putin’s actions to construct ways to engage with him. If what Putin says is true, and his continued aggressive moves have been spurred by Western responses, there may be room for the resolution of this dispute. Negotiating with Putin certainly would not be an indication of timidity, fear, or duplicity. Indeed, when speaking to Putin, the US and EU must demand respect for their positions and the rights of sovereign states. However, the views and rights of Russia must also be equally acknowledged and respected. Equity and some degree of equanimity among all sides to any talks must be promoted. There must be the will to act fairly and justly toward each other, to include an immediate cessation of hostile acts. That would mean halting Russian intrusions into NATO airspace, flyovers and buzzing by military jets, interceptions at sea and other harassing actions in NATO waters. Further deployments of NATO land forces must be paused. Negotiating requires setting aside anger over what has transpired, but does not obviate the need to discern one another’s actions to avoid deceit or trickery.

Some European leaders have made contact with Putin and tried to resolve some issues with him, but they have had little success. There have been intermittent congenial contacts between Obama and Putin. For example, on July 4, 2015, Putin called Obama to mark Independence Day and express his confidence in US-Russia relations. On June 25, 2015, Putin called Obama reportedly to discuss the P5+1 nuclear negotiations with Iran, but Obama also voiced concern over Russia’s support for separatists operating in eastern Ukraine. On February 10, 2015, Obama called Putin to urge him to accept a diplomatic peace plan for Ukraine presented by France and Germany in Belarus. Nevertheless, a more substantial contact between the US and Russia occurred on May 12, 2015 when US Secretary of State John Kerry held four hours of talks with Putin in addition to four hours talks with Russian Foreign Minister Sergei Lavrov at the Black Sea resort of Sochi.  In what Kerry characterized as a “frank meeting” with Putin, the Russian president gave detailed explanations of Russia’s positions. Their talks covered Iran, Syria, Libya, and Yemen. The eight hours of talks were a welcome development. It was Kerry’s first visit to Russia since the Ukraine crisis began in early 2014. Kerry stated on Twitter, “it was important to keep the lines of communication open between the US and Russia as we address important global issues such as Syria and Iran.” Lavrov said the talks helped Russia and the US improve mutual understanding.  Perhaps a path to repairing relations can be created by Kerry and Lavrov. There is no intrinsic guarantee diplomacy will work. However, both men have the confidence of their respective presidents. Both have a strong interest in improving US-Russia relations, and Russia’s overall relationship with the West. Indications are that they have an ongoing dialogue on a variety of issues and have also formed a good relationship. The US and the EU must continue work to directly with Russia, not shun it, to forge better ties and tackle hard issues.

Book Review: Donald P. Gregg, Pot Shards: Fragments of a Life Lived in CIA, the White House, and the Two Koreas (Vellum, 2014)

Pot Shards presents the life and times of Ambassador Donald P. Gregg (above), an individual who contributed greatly to US foreign and national security policy. Readers are taken on a journey through Northeast and Southeast Asia and halls of power in Washington, DC. Readers will discover how much Gregg valued others and his value to humanity.

The Association for Diplomatic Studies and Training (ADST) is an independent, non-profit organization that advances the understanding of diplomacy and supports the training of foreign affairs personnel through a variety of programs and activities. As part of its Foreign Affairs Oral History Project, it has prepared thousands of transcripts of interviews recorded with US Foreign Service veterans.  These excellent oral histories present the realities of diplomacy to include thought provoking, sometimes absurd, and often horrifying stories from which valuable lessons can be drawn.  In April 2014, ADST graciously authorized greatcharlie.com to present the oral history of Ambassador Donald P. Gregg, an authentic intelligence professional and consummate diplomat.  In July 2014, Gregg published his extraordinary, must read memoirs entitled, Pot Shards: Fragments of a Life Lived in CIA, the White House, and the Two Koreas (Vellum, 2014).  It is part of ADST-DACOR’s Diplomats and Diplomacy Series. (DACOR is an organization of foreign affairs professionals.)

Donald Gregg was an employee of the US government for forty-three years, working in the fields of intelligence and diplomacy.  Gregg served in the Central Intelligence Agency (CIA) for thirty-one years from 1951 to 1982.  Paramilitary trained and airborne trained, he spent most of his career in assignments overseas and advising the most senior leaders of the CIA.  He was assigned to Japan, Burma, Vietnam, and Korea.  He was special assistant to the Ambassador of Korea from 1973 to 1975.  Gregg also served as a member of the White House National Security Council staff from 1979 to 1982. Upon retirement from CIA, Gregg became National Security Adviser to US Vice President George H.W. Bush from 1982 to 1989, and US Ambassador to the Republic of Korea from 1989 to 1993.  Outside of government, Gregg served as a senior consultant to Goldman Sachs, the chairman and president of The Korea Society in New York, and he currently serves as the chairman of the Pacific Century Institute in Los Angeles.  Gregg was born in New York. He enlisted in the US Army upon graduation from high school in 1945.  He received training as a cryptanalyst and reached the rank of sergeant.  He went on to attend Williams College from 1947 to 1951, majoring in Philosophy.  Gregg has received numerous awards from CIA, the US Department of Defense and the South Korean government and five honorary degrees from American and foreign colleges.  Gregg has visited the North Korea several times and advocates for the normalization of relations between that country and the US.

On its face, Pot Shards is a significant contribution to the record of the US experience in the Far East written by a major player, an intelligence icon.  Pot Shards covers some weighty matters regarding intelligence, diplomacy, and defense policy.  Some of the issues and events discussed by Gregg have never been revealed in other texts. Gregg could have limited the book to the audience of policy scholars, analysts, historians, intelligence professionals and veterans and all those familiar with the subject matter.  However, he presents Pot Shards in a way that everyone can understand and enjoy at some level.  There is much in Pot Shards that would especially thrill those beguiled by spy novels and films and spy craft enthusiasts.  Yet, what makes Pot Shards most exciting is the story of the man: Donald Gregg.  With good humor, he recounts many satisfying exploits, but also reveals vicissitudes and trials he faced.

Individuals that Gregg mentions in Pot Shards are those with whom he had continuous contact as managers, mentors, and friends. Some of are well known, “foreign policy celebrities,” such as Robert McNamara, Henry Kissinger, Creighton Abrams, Richard Helms, William Colby,  Harold Brown, Zbigniew Brzezinski, Richard Holbrooke, and Richard Allen. Others may be remembered only by a few.  Gregg sheds light on their impact and exactly how their ideas ignited events from the inside. Moreover, Gregg indicates those individuals helped him develop a greater understanding of the world and other ways of thinking, allowing him to become something that he perhaps would not have been without them.

In Cloud of Witnesses, George Rutler examines sixty-six individuals, who have influenced his life, based on what Aristotle would refer to as their ethos (an honest use of talent), logos (an honest use of mind), and pathos (an honest involvement in the suffering of the world).  That would be the best way to examine Gregg’s presentation of his life and career.  At Williams College, Gregg was influenced by the thinking of Professor John William Miller, the head of the Philosophy Department, who taught him the simple definition of morality, “Never treat another human being as an object.”  Gregg explained that he has tried to live by that definition.  Gregg was also influenced by Miller’s interest in people taking action and being defined by, and held responsible for, the actions they took.  Miller taught him that “Man does not have a nature, he has a history,” Gregg recalled Miller urged his students to act upon what they believed in and to “cut behind appearance toward reality.”

It was clear from many anecdotes in Pot Shards that Gregg has had a genuine interest in people.  He has looked beyond differences, avoiding being caught up with race, ethnicity, or other things which had been used particularly in the 1940s, 1950s, and 1960s to determine how one should relate with another.  For example, when he first came to Washington, he would enjoy going to jazz clubs which catered to African-American patrons.  That was notable because Washington, DC at the time was a segregated city. Serving in the military at a young age, he learned about different men and different behaviors, and witnessed racial and ethnic prejudice which repulsed him.  In Kai Bird’s excellent work, The Good Spy: The Life and Death of Robert Ames, it was indicated that racial and ethnic prejudice was apparent at CIA.  It was manifested in the casual and official discussions of some, and even worse, in decision making.  That was certainly not Gregg’s way.  His type of clearheaded, solid judgments resulting from giving situations and individuals a deeper look, was always needed.  Virtue shines in the presence of vice.

Having served as a cryptanalyst in the US Army, Gregg was sought by the National Security Agency in the middle of his senior year at Williams.  However, the recruiter rather than take Gregg suggested he join CIA.  Gregg knew little of the CIA and what it did.  However, the recruiter, with what Gregg now thinks was a bit of cynicism said, “Oh, they jump out of airplanes and are going to save the world!” That attracted Gregg, and initiated his thirty-one year career with the Agency.  Gregg has provided an incredibly intriguing discussion of his paramilitary training at CIA and the others he met during it. Gregg makes it clear in that discussion though, that so-called “good old days” in CIA were not always so good.  There were crazy events. Some people were not best serving the needs of CIA or their country. Managers who were very most often former OSS officers tried to recreate approaches taken by their former organization in German and Japanese held territory in Europe and Asia.   Often proposals for covert operations were based on questionable judgment and scant research.  Real possibilities for success were not fully considered by decision makers.  They were praised and approved by management as displaying a “Gung-Ho”, “Go Get ’em”, motivated attitude.  Yet, those operations more often resembled suicide missions.  Gregg found himself on such an assignment.

In March 1952, Gregg was assigned to fly to Bangkok, Thailand, where he would pick up a group of North Vietnamese whom he would train in sabotage and small unit tactics at a secret base. Following the completion of the training, Gregg and his team would be parachuted into North Vietnam.  Gregg spoke neither Vietnam nor French, and knew nothing of Vietnam or its history, and he was far from a veteran saboteur or guerilla leader. Gregg discovered an attractive post-debutante in her mid-thirties was the Vietnam plans officer and he had heard her say that her “Vietnam plan” had been accepted.  A cocktail party was given to celebrate the occasion, but Gregg was not invited.  When Gregg met his team, they turned out to be totally untrained Vietnamese with whom he had no way of communicating.  Gregg said they looked childlike.  Later he further learned that they were ethnic-Vietnamese from Thailand and had never set foot in Vietnam.  The potential for disaster was enormous. Gregg had no intention of backing out, but the truth behind the operation eventually revealed, and things worked out for the best. The operation was exposed as a fraud.  It turned out that a corrupt principal agent had hoodwinked CIA officers in Bangkok and had “taken the money and run.”  The mission was cancelled.

However, Pot Shards does not serve as some expression of some longstanding of primal doubt.  Gregg never moved about stating “Something is rotten in the Agency.”  Readers discover that through coping with those problems he learned not only what to do, but more importantly, “how not to do it.”  Gregg could recognize what was good, as good.  Gregg also worked with many in CIA who were true professionals.  He modeled his own management and decision making style in part from theirs. Gregg’s loyalty to his country and conviction toward duty was surpassed by no other.  He is proud of his years in CIA. So much of that experience was central to his personal life.  Through CIA, he met some life-long friends.  Through CIA, he met his wife.

Gregg makes it clear that his wife Margaret (“Meg”) has been central to his life.  A fortuitous encounter while hailing a taxi at Washington, DC’s Union Station set off of chain of interesting events that led to their life-long partnership.  Unbeknownst to Gregg, Meg, fluent in Russian, was actually Gregg’s superior in the Operations branch at CIA when they met.  However, as Gregg makes clear he was irresistibly taken by her combination of beauty, intellect, and charm, which made her something supreme to him.  Whether accompanying him in Japan, Korea, or Burma or remaining back in the US with their three children while Gregg served in Vietnam, she was the rock on which Gregg was able to build a career while raising a family. Relating the course of their marriage, Gregg leaves no doubt that meeting Meg was the best luck he ever had.

As Gregg rose through the ranks at CIA, he saw more clearly how many policies that drove CIA activities were not carefully considered and constructed. Gregg saw how euphonious policy speeches by political officials would often be based on captivating assessments of positive outcomes and capabilities of foreign partners not based in reality. He could see that near desperation on wanting a situation to be certain way led many, even the well-intentioned, to project their thinking on that of senior foreign counterpart, or worse, an adversary.  Only a negative outcome would reveal the error of a flawed approach for some.  In the early years of the US involvement in Vietnam Gregg witnessed this.  Gregg recalled accompanying US Secretary of Defense Robert McNamara to Vietnam in 1963. McNamara was told by General Paul Harkins, who commanded the US Military Assistance Command in Vietnam (MACV) that “We will be out of here with a military victory in six months.”  McNamara was disturbed by the unrealistic reporting, and told US President Lyndon Johnson that things were really not as good as Harkins’ people seemed to think they were.  Gregg also recalled a war game in 1964 on the use of airpower in the North Vietnam.  He participated with: General Maxwell Taylor, US Chairman of the Joint Chiefs of Staff; General Earl Wheeler, US Army Chief of Staff; General Curtis LeMay, US Air Force Chief of Staff; John McCone, CIA Director; and, in the presence of McGeorge Bundy, the National Security Adviser.  Gregg, as the CIA representative of the Blue Team, gave CIA’s analysis of the plan to bomb North Vietnam.  Gregg described the rationale of the plan and then proceeded to explain why it would fail.  The rest of that story will not be spoiled here.  One will have to read Pot Shards to discover what the response to Gregg was from the many powerful men in the room.  Gregg’s description of it all makes the moment palpable.

Writing about his second tour in Vietnam, Gregg provides good lessons on how to function effectively as a manager or leader under extremely adverse circumstances.  His lessons hold true for professions beyond intelligence for they primarily concern human nature and the wonders and realities of human interaction.  There were many difficult experiences that were a part of that period.  One evening Gregg received a frantic call from a member of his crew who he described as a gifted and committed paramilitary officer, with several tough tours under his belt.  The officer had married a Vietnamese war widow with children and lived in her Bien Hoa apartment.  He had just returned from a mission to find one of his children “desperately ill.”  Gregg rushed to the officer’s apartment with medical assistance in tow.  Yet, by the time he arrived, he found the tragic scene of a beautiful young girl, eight years old, lying silent and still, with her frightened siblings and anguished mother, who was being comforted by the officer.  The girl was confirmed dead and the officer asked Gregg to take her away.  Gregg picked up the child and walked out.  Doing so reminded him of carrying his own small daughters Lucy and Alison to bed after they had fallen asleep. He searched for an answer on how to handle the situation.  This was a CIA matter and had to be kept confidential.  Gregg eventually decided to bring the child to the emergency room of the US Army hospital at Long Binh, where US Army Military Police told him where to go to have the body cared for.

In this segment of Pot Shards, there are also fascinating stories of Gregg’s exploits in combat.  He was in the thick of things as CIA Regional Officer in Military Region 3 (War Zone D).  There are accounts of Gregg managing paramilitary operations and interrogations of his crew.  He flew with forward controllers, directing fire support for US and allied troops.  He described radio communications from battles, the descriptions of which bring the reader right to the scene.  Gregg’s efforts were appreciated by US and allied commanders he worked with such as: General James Hollingsworth (US);  General John McGiffert (US); General Nguyen Van Minh (South Vietnam); General Jangnai Sohn (Korea); and General Roh Tae-woo (Korea); Colonel Nguyen Cong Vinh (South Vietnam); and, Colonel Bach Van Hien (South Vietnam).

On his second tour, Gregg could still see how different ideas, among policy and decision makers, about what was truly happening in there impacted the decisions being made and the lessons the US military as well as other security organizations as CIA, were learning from the experience.  At the very end of his tour in Vietnam, General Creighton Abrams hosted a lunch for Gregg at his MACV Headquarters in Saigon, a place where he had been excoriated in the past.  At lunch, Gregg sat next to Abrams and six or eight of his subordinates.  He felt Abrams was the best of the three commanders the US sent to Vietnam.  Knowing Abrams had been in Vietnam for some time, Gregg asked him how long it had actually been.  Abrams proudly responded, “Six years.”  Gregg then asked him how he kept going, and Abrams stated, “Well, I keep learning things.”  Gregg then politely asked him what he had learned so far, and Abrams replied that just finished reading Bernard Fall’s Hell in a Very Small Place, an account of the French defeat at Dien Bien Phu. Abrams said that he “now” understood Fall’s reasoning as to why the French had failed to reestablish their colonial rule in Vietnam.  When Gregg asked “How did Fall explain it,” Abrams explained, “Fall said that the French lost because they failed to politically organize the terrain.  I think I understand that now, but I would not have understood that a year ago.”  Gregg had no response to that, but explained that when he later saw pictures of heavy US battle tanks, named after Abrams, crashing around Iraq and Afghanistan, he thought of Abrams’ answer.

Through his achievements in Vietnam, Gregg developed a reputation in CIA as a very wise and capable officer.  He knew how to present ideas and concepts to develop agreement or consensus on issues. Bringing his thoughts to precise declarations took skill.  This was one of the many skills that Gregg honed through interactions with a number of accomplished professionals.  One who helped Gregg elevate his capabilities while he served in his next overseas assignment as CIA Station Chief in Seoul, was US Ambassador Philip Habib.  Habib was gruff and outspoken.  However, by Gregg’s account, he understood people well and was an excellent diplomat for whom he developed tremendous respect.  Gregg indicates that it was Habib’s maneuvering that help to save the life of liberal South Korean politician, Kim Dae-jung, after he had been kidnapped from his Tokyo hotel room by the Korean Central Intelligence Agency (KCIA).  Habib never accused the Korean President Park Chung-hee of ordering the kidnapping but sent a message to him explaining that the US was aware of the action and hoped he could do everything to keep Kim alive.  This allowed Park a chance to avoid direct embarrassment and contrive a story in which he accused rogue elements of the Korean government had alone committed the act, and in which he took credit for saving Kim.  Gregg said Habib’s astute handling of the situation kept Kim alive and allowed Park to save face.  Gregg explained saving face was always a major concern in Asia.  Habib’s actions allowed Washington’s relations with Seoul to improve.

Gregg completed his career at CIA on a high note at the US National Security Council.  He had achieved success maintaining an ethic of his own, a moral code.  There was goodness living inside a good man.  He saw the greater good that would result from his actions against Communism.  Gregg was invited to join the administration of US President Ronald Reagan as the National Security Adviser to then Vice President George H.W. Bush.  His job made use of all of his skills and experience from CIA.  During those six years with Bush, Gregg traveled to 65 countries.  Along with those visits came his attendance at endless formal events.  Gregg recounts some of rather unusual happenings at such gatherings, providing readers with a gift bag of humorous stories.  Yet, while in the Reagan administration, his self-image was put to the test.  Gregg dedicates a chapter to a painful period of that service: IranContra, which was the purported attempt by the administration to sell surplus arms to Iran in exchange for it to ensure the release of US hostages being held in Lebanon.  Claims that Gregg was involved with that matter were invalidated.  Gregg’s account of it all is captivating.

As Ambassador to South Korea in the administration of President George H.W. Bush, Gregg successfully made use of his experience at CIA as well as the White House.  However, Gregg did not tap into his training as an intelligence officer to manipulate Korean officials or simulate closeness with Koreans he met.  There was no deception at all. Gregg was genuine, natural, in his interactions and that is what helped him gain their respect and confidence.  There was a type of communion between Gregg and many of his senior Korean counterparts.  One of the issues Gregg was determined to confront as ambassador was the continuing negative note in US-South Korean relations over the alleged US involvement in the Kwanju Uprising of 1980.  Then Korean President Chun Doo-hwan had brutally cracked down on protests in Kwanju in the wake of the arrest of Kim Dae-jung on charges of treason. At least two hundred Koreans were killed in the streets.  Chun claimed that the US had fully supported his actions.  That was not true, but by the time Gregg arrived in Korea as ambassador, hostility toward the US was still strong in the city.  The US Cultural Center in Kwangju was often attacked with fire bombs by rioters trying to drive the US out.  Gregg after consulting with others, including Kim Dae-jung, went to Kwangju in January 1990.  While there, Gregg met with six leaders of anti-US groups for over three hours.  Gregg explained that he came to Kwangju to lessen the hostility that the people in the city seemed to hold for the US.  Gregg explained to them that the US was not connected at all to the incident, and many of the actions by the US at that time, such as moving an aircraft carrier to Pusan were not a show of support for Chun. That particular move was meant to signal to North Korea not to intervene.  The anti-US protesters believed the US was close to Chun administration, but Gregg let it be known that there was general distaste for it.  In that vein, Gregg explained, that at the time, the Reagan administration had agreed to receive Chun at the White House if Chun agreed to lift the death sentence imposed on Kim Dae-jung, and to release him from prison.  Most important in the conversation was Gregg’s apology over the fact the US had remained silent for so long on the Kwangju issue.  Gregg diffused the hostility toward the US and attacks on the Cultural Center in Kwangju stopped.  Gregg explained his first visit to Kwangju was deeply valuable in showing him how Koreans can hold feelings of han (deep-seated resentment) when they are dealing with events caused by others and which they feel are unjustified, immoral, and unfair.  When Gregg made his first visit to Pyongyang in April 2002, he explains that he encountered the same feelings of han that he had encountered in Kwangju twelve years before.  However, he notes that lessons learned in Kwangju were helpful as he tried to establish a dialogue and some degree of trust between his North Korean hosts and himself.  Ambassador Philip Habib certainly would have been proud of Gregg’s performance.

There is much more in Pot Shards to enjoy!  It is a book one will want to read again and again.

Quam bene vivas referre, non quam diu!  (It is how well you live that matters, not how long!)  There have been a few stories written about Gregg in books, articles, in anecdotal form.  Many were written in the troubled time of the Iran-Contra Affair.  Pot Shards presents the true life and times of Gregg, an individual who contributed greatly to US foreign and national security policy. Readers are taken on a journey through Northeast and Southeast Asia and halls of power in Washington, DC.  Readers will also discover how much Gregg valued others and his value to humanity.  Gregg continues to make a valuable contribution to US foreign and defense policy efforts as a private citizen.  Pot Shards is an absolute pleasure to read.  Without reservation, greatcharlie.com highly recommends Pot Shards to everyone.

By Mark Edmond Clark

“A Plea for Caution” One Year Later; The New York Times Op-Ed That Revealed Much about Putin

In his September 2013 New York Times op-ed, Russian President Vladimir Putin did not suggest any real steps to create opportunities for international cooperation or greater peace and security. He seemingly wanted to stir mistrust worldwide toward US efforts in foreign affairs. It would be disingenuous for US President Barack Obama’s administration to deny its behavior toward Putin likely influenced his decision to write it.

In a September 11, 2013 New York Times op-ed, Russian President Vladimir Putin provided a commentary on US-Russian relations that appeared to be a rebuttal to US President Barack Obama’s August 10, 2013 speech on the possible US military response to the chemical use by the President Bashar al-Assad’s regime in Syria. Putin’s objective with the op-ed was to reach the US public through the back channel of the news media. That was made clear when he stated, “Recent events surrounding Syria have prompted me to speak directly to the American people and their political leaders. It is important to do so at a time of insufficient communication between our societies.” Yet, Putin failed to realize that while he sought to promote Russia’s positions and arguments in the media, attempting to cope with policy analysts and popular pundits, hostile to his statements, on their “home court”, would be a mistake. Global media is still dominated by the West. Moreover, among those people interested in foreign and defense policy in the West and worldwide, very few would ever take the position that Russia was equal imilitarily, economically, or politically to the US and its Western partners. Far more people worldwide might accept negative perspectives of Russia given its human rights and civil rights history, and the authoritarian nature of the Soviet Union from which it had emerged. Changing such perceptions of Russia would be difficult to accomplish with one op-ed.

What made the op-ed even less likely to receive approval was the manner in which Putin presented his facts and arguments. He does not present a discussion based on Russia’s genuine concerns about the impact of military action. Putin displayed more tack than tact in his commentary. There was no romantic fuzziness in his words. There is no soft spot. It is not some lush, soupy appeal.  The op-ed lacks the moral eloquence of Obama’s speeches. Manifested in the text, however, was the fact that Putin is tough and has no time to be a sentimentalist. Putin was well-aware that he was communicating with citizens of an, albeit, adversarial government. Despite his best intentions, his recognition of the fact that he is not the best friend of the US public–and he likely does not care to be–managed to infiltrate his statements.

Putin accomplished very little with the op-ed. Since the time it was published, the atmosphere in international affairs has not improved, mutual trust has not been strengthened, and US-Russian relations have worsened. Putin has made major moves in Ukraine contrary to US wishes, and he has warned the West that Russia still has nuclear arms. If anything, his op-ed serves as a marker, indicating a genuine downturn in US-Russian relations had occurred. A look at events surrounding his decision to publish the commentary sheds light on how US-Russia relations fell to current levels, but also  seems to provide hope that a constructive dialogue between Obama and Putin could still develop.

Background: Putin and the US

Since the fall of the Soviet Union, the authentic face of the Russian government has been Russian President Vladimir Putin. Putin restored order in Russia after the internal chaos of the 1990s, reestablishing the power of the state. Many would note the record shows he accomplished this with little regard for human and political rights. Putin is conscientious about his work, and has become quite experienced in governance and wielding national power. His style of management is undoubtedly shaped by his initial career as an officer in the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) known better as the KGB—the agency responsible for intelligence, counterintelligence, and internal security. He reached the rank of lieutenant colonel before retiring. Putin has been advised and assisted by a small group of men who served alongside him during his KGB career. These men are known as siloviki (power men). Finding siloviki, particularly retirees of the KGB, and the present day security service, Federal’naya Sluzhba Bezopasnosti Rossiyskoy Federatsi (Federal Security Service) or FSB, in high places in Russia is not unusual. A quarter of Russia’s senior bureaucrats, particularly in the armed forces and the security services, are siloviki. At the pinnacle are men who came from Putin’s hometown of St. Petersburg. The “roots” of the families those men come from go back to the beginnings of the Communist Party and its first political police known as the Cheka. Putin’s Cheka heritage includes both a father and grandfather who served in the security service. Putin attended the schools and auniversity Chekisty (Chekist) progeny typically attended.

The Chekists share a view that the greatest danger to Russia comes from the West. They believe Western governments are driven to weaken their homeland, create disorder, and make it dependent of Western technologies. They feel that under former President Boris Yeltsin, the Russian leadership made the mistake of believing Russia no longer had any enemies. The Chekists are resentful of the West’s success over the Soviet Union in the Cold War. As Putin himself has publicly expressed, the Chekist consider the collapse of the Soviet Union, under Western pressure, as the worst geopolitical catastrophe of the 20th Century. That loss did not mean a loss of dignity or the will to act. Anti-Western sentiment became so strong that it has created a siege mentality among the Chekists. In his March 18, 2014 speech declaring Russia’s annexation of Crimea, Putin spoke not only as the voice of Russia, but the voice of the Chekists. He enumerated some of the actions taken by the West that have fostered contempt in Moscow. He mentioned: Russia’s economic collapse, which many Russians recall was worsened by destructive advice from Western business and economic experts that did more to cripple their country; the expansion of NATO to include members of the Soviet Union’s own alliance, the Warsaw Pact; the erroneous Russian decision to agree to the treaty limiting conventional forces in Europe, which he refers to as the “colonial treaty”; the West’s dismissal of Russia’s interests in Serbia and elsewhere; attempts to bring Georgia and Ukraine into NATO and the EU; and, Western efforts to instruct Russia on how to conduct its affairs domestically and internationally. Putin is determined to save Russia from disintegration, and frustrate those he perceives as enemies that might weaken it. He will not be satisfied until Russia’s global power and influence are restored and the independent states of the former Soviet Union are brought back under Moscow’s political, economic, and military (security) influence.

Even prior to the op-ed’s publishing, the downward spiral of Russia’s relations with the Obama administration was evinced  by: Putin’s decision to allow National Security Agency whistleblower Edward Snowden to reside in Russia; ongoing espionage efforts between Russia and the US, including the activities of Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR officer Anna Chapman and other Russian “illegals” captured by the Federal Bureau of Investigation in 2010; counter allegations of US spying on Russia revealed by Snowden and Wikileaks; and the US admonishment of Russia on human rights issues. Despite these and other negative connections, the White House sent Putin proposals on a variety of issues, some in which he had already expressed disinterest. They insisted that he agree to reductions that would be made in both nations’ nuclear arsenals.

Putin rejected the nuclear arms proposals due mainly to his concerns over the efficacy of taking such an audacious step. To him, the proposals called for staggering reductions. He views nuclear weapons as a means to assure Russia’s survival. It is unlikely that a Chekist would ever reduce Russia’s nuclear arsenal to a level demanded by the White House. Perhaps positive signals from Obama’s discussions on nuclear arms reductions with the erstwhile Russian President Dmitry Medvedev gave administration officials and advisers the idea that Putin would follow-up by accepting proposals on it. Obama felt he had a strong relationship with Medvedev. Obama seemed to measure all possibilities on relations with Russia on his interactions with him. So comfortable was Obama with Medvedev that he went as far as to declare a new era between the two former Cold War adversaries existed. There were more than enough senior Russia analysts in the US government who could have confirmed Putin, who at the time was serving as Russia’s Prime Minister, was the real power in Moscow. However, Obama administration officials and advisers did not appear to give any deep consideration to this matter. Since Medvedev was Russia’s president, Obama saw him as the authority with whom he needed to be concerned. He treated Putin as “the other guy.” Obama did little to build a positive relationship with him. When he returned to the Russian presidency for a third term, what Obama knew about him was mostly in the abstract.

Summit Cancellation 2013: The Catalyst

Obama administration officials and advisers were clearly unprepared to hear or accept Putin’s final rejection of their nuclear arms reduction proposals and reacted poorly to it. They seemed driven to achieve objectives for their president without consideration of the efficacy of their approach. Whether they even thought Putin’s concerns over nuclear arms reduction proposals were genuine is not clear. However, Putin’s decision was viewed within the Obama administration as ending their president’s “signature effort to transform Russian-American relations and potentially dooming his aspirations for further nuclear arms cuts before leaving office.”   With the apparent goal of retaliating against Putin over his refusal to accept its nuclear proposals, on August 7, 2013, Obama cancelled a Moscow summit meeting with Putin set for September. It was an amateurish and dangerous response by the administration to Putin. Yet, the decision meant much more than blocking the meeting. For Putin, the summit with the US president would be an important part of his effort to show that under his leadership, Russia has returned to the world stage as a global power. As an outcome of the actual talks with Obama, Putin likely hoped to demonstrate that he is a strong leader who is able to respond effectively to the US on security issues. During the event in Moscow, Putin would also receive the chance to present his resurgent Russia in the best light possible. Obama administration officials and advisers knew the summit meeting would have been a proud occasion for Putin and the Russian people. However, they were out to prove that it was in control of the situation. They sought to bring to light what they believed was the reliance of Russian leaders on US standing and capabilities to elevate a country that was practically an economic basket case and a shadow of its former self as a military power. Boiled down, they felt Russia needed the US, but the US did not need Russia. So, they scrapped the summit. Publicly, Obama administration’s officials and advisers made things worse by publicly explaining that the meeting was cancelled because was not seen as an effective use of the president’s time. An August 8, 2013 New York Times article quoted US Deputy National Security Adviser Benjamin Rhodes as stating, “We weren’t going to have a summit for the sake of appearance, and there wasn’t an agenda that was ripe.” Officials and advisers tossed in comments about Putin’s rejection of the proposal. An unidentified source for the same August 8th article stated, “We just didn’t get traction with the Russians. They were not prepared to engage seriously or immediately on what we thought was the very important agenda before us.” That source went on to state, “this decision was rooted in a much broader assessment and deeper disappointment.” Yet, despite these thinly veiled excuses, it was generally understood that the cancellation appeared was a consequence of Putin’s refusal to consider the proposals for extreme nuclear reductions. From it, came seasons of disappointment. Memores acti prudentes future! (Mindful of what has been done, aware of what must be!)

The Op-Ed

By cancelling the summit, Obama administration officials and advisers played into the worst anti-Western strain of Chekist thought. Putin saw the US decision as a form of rejection, a personal affront, and an effort to humiliate him. In Moscow, the anger, bitterness, and hostility that grew in Putin over the cancellation, along with a lot of other things, was likely palpable. Putin had his own set of options. As Obama’s approval ratings on foreign policy had dropped precipitously during the year to a bit less than 39.8 percent by the end of August, Putin may have perceived that he had a shot of reaching a disappointed US public with a special message.  The Russian Federation government had a contract with the Ketchum public relations firm that included placing favorable news items about Russia in US newsmedia outlets. Putin used the firm to place his op-ed in the New York Times. In writing his editorial, Putin, in part, seemed to be utilizing a bit of old KGB tradecraft in writing the piece. (Tradecraft refers generally to skills used in clandestine service to include efforts to manipulate opponents.) Much of what he proffered was a distorted view of circumstances.

Putin began by offering a discussion of certain truths about the US-Russian relations as allies during World War II and adversaries during the Cold War. He recounts that the veto power given the Permanent Five Members of the UN Security Council was established to create consensus on issues of peace and war. He explained that if states were to bypass the UN Security Council and take military action without authorization, as the Obama administration indicated it was prepared to do in August 2013, that UN’s relevance would be placed in jeopardy. As a result the UN would suffer the fate of the League of Nations. However, in further discussion of the UN, Putin engages in something akin to introjection, claiming qualities typically identified with, and exemplified by, the US. Having been successful in constructing a peaceful solution on Syria’s chemical weapons issue, Putin portrays Russia as a beacon of light in international affairs, and promoter of transnationalism, multilateral solutions, and the maintenance of international peace and security. Putin explained, “From the outset, Russia has advocated peaceful dialogue enabling Syrians to develop a compromise plan for their own future. We are not protecting the Syrian government, but international law. We need to use the United Nations Security Council and believe that preserving law and order in today’s complex and turbulent world is one of the few ways to keep international relations from sliding into chaos.” While he should be commended for expressing these sentiments, it has actually been the US, particularly the Obama administration, which, for the most part, has shown great reverence for international law. Obama, himself, would undoubtedly prefer to solve problems at the diplomatic table using reason and logic, due process, and rule of law. Putin, on the other hand, has what former US Secretary of Defense Robert Gates called “a zero-sum worldview.” Contrary to Obama’s belief in the importance of win-win relationships among nations, Putin sees all transactions as win-lose; if one party benefits, the other must lose. Gaining and retaining power is Putin’s goal.

Putin goes on to explain, “The law is still the law, and we must follow it whether we like it or not. Under current international law, force is permitted only in self-defense or by the decision of the Security Council. Anything else is unacceptable under the United Nations Charter and would constitute an act of aggression.” Here, Putin provides a veiled reference to the Operation Unified Protector, when multinational forces under NATO command imposed a no-fly zone and destroyed government forces loyal to then-Libyan President Muammar Gaddafi under UN Security Council Resolution 1973. (The military operation to enforce the UN Security Council Resolution was initially led by the US under Operation Odyssey Dawn.) In Putin’s view, Western-led forces went beyond their mandate to aid anti-Gaddafi forces, and their actions led to his overthrow. Gaddafi had been a friend of the Soviet Union and Russia. Despite the fact that the action against him was taken under a UN Security Council resolution, to Putin, it represented one more instance of the West trampling on Russia’s interests. However, looking at Russia’s actions, Putin was not in a position to admonish anyone about international law and the use of force. In 2008, Putin invaded Georgia, and Russian troops still occupy the Abkhazia and South Ossetia regions. He forced Armenia to break off its agreements with the EU, and Moldova is under similar pressure. In November 2013, using economic influence and political power, he drove then-Ukrainian President Viktor Yanukovych to abort an agreement Ukraine had with the EU that would have pulled it toward the West. Once the Ukrainian Parliament removed Yanukovych, Putin grabbed Crimea.

In appraising the use of force by the US, Putin engages in a type of projection, imputing some of the dominant traits of his own handling of foreign policy on the Obama administration. He goes as far as to blame the US for efforts by some nations to acquire nuclear weapons. Putin explains: “It is alarming that military intervention in internal conflicts in foreign countries has become commonplace for the United States. Is it in America’s long-term interest? I doubt it. Millions around the world increasingly see America not as a model of democracy but as relying solely on brute force, cobbling coalitions together under the slogan “you’re either with us or against us.” The truth is that Obama has been averse to taking military action, contrary to former US President George W. Bush who was perceived as having the US take pre-emptive military action at the slightest whiff of aggression. Obama’s policy of restraint matches the public mood. Developing proposals for military action has been very difficult for administration officials and advisers.  In situations where the use of force is almost absolutely necessary, officials and advisers have presented options for action that are lightweight, very small in scale and calibrated precisely. Putin’s discussion of Obama as being interventionist is shear fantasy.   While obama has been involved in situations worldwide as a leader on the internation stage, its ill-advised action in Libya was its only authentic intervention. Note that it is Putin who now appears poised to move further into Ukraine.

Even if a US audience was not receptive to his message, Putin likely assumed the hyperbole in his commentary would serve to impress many people in other countries who are ill-disposed toward the US and its policies. appreciative of his efforts to admonish it. Undoutedly, his words were likely captivating and satisfying enough for those who choose not to look deeply and those who choose simple answers. Many realities are erased and the past is written off. He then writes on the past a new story, a substitute for reality. The op-ed seemed to be “sabotaged” by his comments concerning “American exceptionalism” that was rejected and much derided within all circles in the US; and, by his discouraging words concerning US operations in Iraq and Afghanistan. If someone claiming to be a Chekist were ever to offer encouraging words about the spirit of US public or US operations in Iraq and Afghanistan, he would most likely be an imposter! Creating even more discord, Putin explained that US action could place multilateral efforts on Iran and Israel-Palestine at risk.

The one part of Putin’s op-ed deserving real consideration was his discussion of the danger posed to international peace and security by Islamic militant groups in Syria. Putin succinctly analyzes the emerging threat. He reported, “There are few champions of democracy in Syria. But there are more than enough Qaeda fighters and extremists of all stripes battling the government. The United States State Department has designated Al Nusra Front and the Islamic State of Iraq and the Levant, fighting with the opposition, as terrorist organizations. This internal conflict, fueled by foreign weapons supplied to the opposition, is one of the bloodiest in the world. Mercenaries from Arab countries fighting there, and hundreds of militants from Western countries and even Russia, are an issue of our deep concern. Might they not return to our countries with experience acquired in Syria? After all, after fighting in Libya, extremists moved on to Mali. This threatens us all.” Putin again seemed to be using skills acquired during his KGB days to develop a strong report on the emerging threat of Islamic militant groups such as Islamic State of Iraq and Greater Syria (ISIS). Still, he also seemed to be providing a glimpse of what was being discussed in the Kremlin on developments in Syria, as well as Iraq. His prognostication about the growth of the Islamic militant groups has been on the mark to the extent that the ISIS threat has not reached the shore of the US or Europe. Yet, few in the US focused on Putin’s important comments on Islamic militant groups. His questionable discussion of other issues distracted US readers from anything constructive he had to state.

The Way Forward

In his op-ed, Putin does not suggest any real steps that would help create possibilities for international cooperation or greater peace and security.   Indeed, it was not constructed to improve things. Putin essay better served to stir mistrust worldwide toward US efforts in foreign affairs. It would be disingenuous for the Obama administration to deny that its approach to Putin, prior to the op-ed, played a likely role in his decision to write it. Put basely, the Obama administration officials and advisers treated Putin as if he was “their ball to play with.” They lashed out at Putin in a very public way on many occasions, and Putin saw the op-ed as a means to respond to those incidents “publicly.” Unfortunately, rather than use the op-ed to discuss his dissatisfaction and concerns about US actions, he prevaricated and made a number of remarks the US public would only find offensive. Once those points were highlighted in the US newsmedia by political pundits and policy analysts, few in the US public would read it or give it thought after “hearing” what was in it. Putin will unlikely write an op-ed again in a US newspaper given his experience with the first. However, it is likely, given the current course of US-Russian relations, Putin’s future communications with the US public will be far less “congenial.”