Meditations and Ruminations on Chinese Intelligence: Revisiting a Lesson on Developing Insights from Four Decades Ago

A most apparent sign of the presence of Chinese intelligence services in Hong Kong is this plaque outside the People’s Republic of China National Security Office there (above). This essay is as a companion piece to greatcharlie’s proceeding essays on Chinese intelligence services. For the scholar who is a regular reader of greatcharlie, the essay will hopefully be an interesting discussion on the function of intelligence services in China with respect to functions of services in the United Kingdom and the US. However, this essay has the additional purpose of serving as a vehicle to assist students. For students, this essay aims to ignite an inner-conversation of issues reviewed, in this case concerning intelligence, to promote their recognition of additional parallels and the development of further insights. Hopefully, students will evoke thoughts from their respective sources and lessons, but also from personal experience, and worldviews, and produce strong insights.

For a one man shop as greatcharlie, reviewing a voluminous quantity of sources in the preparation of the July 31, 2020 and August 31, 2020 posts entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 1 and 2 respectively), was, to a degree, an exercise in large data processing. Yet, while engaging in that consuming, yet satisfying process, the thoughts of greatcharlie’s founder and editor hearken back to an assignment received as an undergraduate at Columbia College, Columbia University in a course “The Politics of Policymaking.” The course instructor, Roger Hilsman (1919-2014), who was also the student advisor and mentor of greatcharlie’s editor, asked students to construct an essay or, as he dubbed it, a “thinkpiece,” in which they were required to present their “observations, meditations, ruminations, assumptions, and hypotheses” that billowed up after reading a primary or secondary source directly related to a foreign and national security policy topic covered in his class. (The source greatcharlie’s editor used, at the suggestion of Hilsman, was Glenn Paige’s The Korea Decision (June 24-30, 1950) (Macmillan, 1968).) However, Hilsman’s goal with the assignment was to encourage students to move away from simply regurgitating what was studied and writing the derivative college essay. Instead, he wanted students to evoke thoughts from their respective sources and lessons but also from personal experience, and their albeit youthful worldview, and draw from them their best insights on the topics they chose. For Hilsman, a phenomenal educator, the assignment was not founded upon some understanding of the requirements of analytical work in international affairs developed in the abstract, but rather, developed upon substantial experience preparing his own analyses and supervising and mentoring subordinates and colleagues in their analytical work in the US military, intelligence, and diplomatic arenas; real world! More specifically, Hilsman’s background included: studying at US Military Academy; service in Merrill’s Marauders and command of an Office of Strategic Services guerilla warfare battalion in Burma in World War II (Hilsman’s valorous service is superbly related in his memoir, American Guerilla: My War Behind Japanese Lines (Brassey’s, 1990)); his work as a military planner for NATO and the Supreme Headquarters Allied Powers Europe; service in the administration of US President John Kennedy as Director of the Bureau of Intelligence and Research for the US Department of State; and, service as Assistant Secretary of State for Far Eastern Affairs in the administration of US President Lyndon Johnson.

Hilsman would not only transmit his sagacity through his “The Politics of Policymaking” course, but through discussions on policymaking and analysis that he had with students during seminars held at his residence were marked not only by the inspiration and encouragement he would give to students in their research and career plans, but also by a frankness and realism that would give them a leg up in future endeavors. The reminiscences Hilsman would share directly with greatcharlie’s founder and editor during office hours were from those periods of his life that are perhaps the most intriguing in his biography. During lectures, he would always provide a riveting anecdote from his experiences during the 1962 Cuban Missile Crisis to accompany his “pearls of wisdom.” The student-teacher relationship between Hilsman and greatcharlie’s founder and editor was mentioned in a March 8, 2016 greatcharlie post entitled, “An Look at Stephen Marrin’s ‘Improving Intelligence Studies as an Academic Discipline’ and Remembering a Professor and Friend, Roger Hilsman.”

For student readers, this essay, divided into three segments, aims to ignite an inner-conversation of issues reviewed, in this case concerning intelligence, to promote their recognition of additional parallels, and to stimulate the development of further insights. Hopefully, by focusing on the topics discussed, students will evoke thoughts from their respective sources and lessons, but also from personal experience, and worldviews, and produce strong insights. The essay also aims to foster conscious critical reading of scholarly works by student readers. Some emphasis is placed on the sources themselves. Hopefully, reading about spies and spying makes this unsolicited bit of mentoring all the more interesting. For scholars who are regular readers of greatcharlie, the aim of the essay is to provide an edifying discussion on the function of intelligence in China relative to intelligence functions in the United Kingdom and the US. This essay also stands as a companion piece to greatcharlie’s preceding essays on Chinese intelligence services. While as a thinkpiece this essay may be limited in scope, greatcharlie surely has not touched bottom of its well of ideas on the subject of Chinese intelligence services. For greatcharlie, this “multipurpose” essay is only a part of its process of worming out the story of Chinese foreign intelligence and counterintelligence. Rapiamus, amici, occasionem de die. (Friends, let us seize the opportunity from (of) the day.)

MPS officer finger-wags a warning to photographer in Beijing (above). Except for experienced hands on China policy and the Chinese intelligence services and national security via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either. MPS is an organization under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, is responsible for foreign intelligence, counterintelligence, and internal security as well.

I. MPS and MSS: Keystones of Chinese Intelligence

Two relatively quiet but absolutely key elements of the Chinese government that impact its foreign and national security policies: the Ministry of Public Security (MPS) and the Ministry of State Security (MSS). Except for experienced hands on Chinese foreign and national security policy and Chinese intelligence services via diplomatic, intelligence, defense, military, or law enforcement work, most in the West have likely never heard of either. MPS is an organization under the State Council in charge of the country’s internal and political security and domestic intelligence. MSS, also under the State Council, responsible for foreign intelligence, counterintelligence, and internal security as well. Their impact stems firstly through providing consumers in Beijing of analyzed information to include the Communist Party of China leadership, the Party’s key organs responsible for foreign and national security policy, government ministers, senior executives of relevant ministries and organizations of the State Council, as the Ministry of Foreign Affairs, with data that may shape their decisions. They additionally share what is collected and analyzed with the People’s Liberation Army (PLA). At times, that information is also collected and analyzed with the help of the military. The impact of the MPS and MSS is also demonstrated through contacts their officers and operatives respectively have daily with officials and staff of foreign governments as well as personnel at all levels of Chinese and foreign businesses engaged in international trade, high-tech-firms, defense contractors, financial institutions, academia, and organizations from all fields in China and worldwide.

The true foundations for MPS and MSS were laid during the revolutionary period in which the Communist Party of China sought to establish its rule. In the early 1930s, two intelligence services existed. One was centered in Shanghai and the Communist Party, the other was based in the Chinese Communist government that existed in Shaanxi where Mao Zedong established his base after the Long March. The later intelligence service proved to be the stronger of the two. By the late 1930s, it was replaced by a newly created Social Affairs Department (SAD) within the Communist Party. Within the years of struggle against Imperial Japanese forces in China, there was the Yan’an Rectification, from 1942 to 1944, in which Mao consolidated his paramount role in the Communist Party of China. Yan’an was also the part of the ten year period in which: Mao established his premier role in the Party; the Party’s Constitution, endorsing Marxist-Leninism and Mao Zedong thought as its guiding ideologies, was adopted (Mao’s formal  deviation from the Soviet line and his determination to adapt Communism to Chinese conditions); and, the postwar Civil war between the Communists and the Kuomintang. Prior to 1949, the Communust Party of China’s main intelligence institution was the Central Department of Socialism Affairs (CDSA). CDSA was placed under the control of Kang Sheng, a longtime political associate of Mao with a linkage from the past to Mao’s wife, Jiang Qing. With the Communist Party’s victory over Chang Kai-shek’s nationalist forces in 1949, a full array of government intelligence organizations were created to supplement Party-based intelligence services such as SAD. CDSA would draw information from foreign news agencies and open sources.

The Zhōnghuá Rénmín Gònghéguó Gōng’ānbù (Ministry of Public Security of the People’s Republic of China) or MPS was established as China’s principal intelligence service at the founding of the People’s Republic of China in 1949. It, too, was placed under the leadership of Kang Sheng. CDSA fell into the hands of Li Kenong, a Deputy Chief of Staff to People’s Liberation Army (PLA) Chief of Staff Chou Enlai and a vice minister for foreign affairs. The main role of the MPS, as with all previous Chinese intelligence services, was to serve the interests of the Communist Party of China. According to Xuezhi Guo in China’s Security State: Philosophy, Evolution, and Politics (Cambridge University Press, 2012), it took on the role of a security service in a manner based on Soviet and Eastern Bloc models. It eventually received responsibility for all aspects of security, from regular police work to intelligence, counterintelligence, and the suppression of anti-Communist political and social groups. That led to receiving  official jurisdiction over counter subversion, counterintelligence, and the conduct of espionage in Macau, Hong Kong, and Taiwan. Overseas during the 1950s, most Chinese diplomatic missions accommodated the MPS with an Investigation and Research Office for intelligence collection staffed by CDSA personnel, with analysis performed by the Eighth Bureau, publicly known in 1978 as the China Institutes of Contemporary International Relations. In 1953, CDSA became the Central Investigation Department (CID). In China, the MPS presence was nearly ubiquitous, as it kept a watchful eye on China’s population. It was energetically engaged in monitoring Chinese who returned from abroad. To cope with what it determined to be errant citizens, MPS ran labor reform camps. MPS personnel were known for behaving harshly among its own citizens. 

MPS made its way through the turbulent 1960s with the Cultural Revolution and dynamic changes in politics in the 1970s with the loss of Mao and the coming of Chairman Deng Xiaoping. By 1983, there was considerable frustration within the Communist Party of China with the high volume of secret information being leaked to the West. This was particularly true with regard to information about debates occurring within the Communist Party and reports of poor economic and social conditions within China. In reaction, counterespionage responsibilities were transferred from the MPS to a new organization known as the Zhōnghuá Rénmín Gònghéguó Guójiā Ānquán Bù (Ministry for State Security of the People’s Republic of China) or the MSS. The Communist Party of China’s first big mission for MSS was to place focus on students in both China and abroad. Students had left no doubt that there was reason for the Chinese leaders to hold such concern after the Tiananmen Square protests. Chinese leaders struggled to deal with fallout from it. The sense of danger that students posed to the country was promoted with the announcement by Chinese authorities that some 200 Chinese had been accused of spying for the Soviet Union. When the reorganization of MPS was completed in 1983, it was temporarily left with only traditional police functions. Nevertheless, the change turned out to be quite positive as both organizations were allowed a new beginning so to speak.

In the West, certainly the most significant, largest, and most powerful intelligence services reside in the US. However, the foundational intelligence services that was the model upon which the main US intelligence services have been based–as well as the services of many other countries–are those of the United Kingdom, namely the Security Service, known popularly as MI5, and the Secret Intelligence Service, known popularly as MI6. To provide a common point of reference regarding the type of intelligence services and activities performed by MPS and MSS, greatcharlie, perhaps going out on shaky ground, points to parallels between their roles in China and the roles of the Security Service and Special Intelligence Service MI6 for the United Kingdom. Before going forward with discussion here, it seems appropriate to at least broach some of more apparent distinctions between the services of the two countries. Two prominent works, central to the discussion here, are Christopher Andrew, Defend the Realm (Knopf, 2009) and Stephen Dorril, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service (Free Press, 2000). Both scholars undertook Herculean tasks respectively and managed to fulfill them marvelously and masterfully. Both texts respectively hold richly textured accounts of intelligence activities at home and around the world, the British Empire as it still was for a time in the 20th Century. Both are major contributions to the scholarship on intelligence in the United Kingdom.

A clear-cut comparison of MI5 and MI6 side-by-side with MPS and MSS is admittedly not possible. Plainly, there is no moral equivalence between MI5 and MI6 and their opposites, MPS and MSS. What the United Kingdom and Chinese intelligence services would call successful operations based on the respective goals of political authorities are quite disparate. Officers of the respective countries’ intelligence services are certainly not birds of a feather. Additionally, and importantly, MI5 and MI6 are the opponents of MPS and MSS, and visa-versa. Enlarging on the point of the political authorities they obey, the respective societies and political authorities, that the intelligence services of the United Kingdom and China serve, are considerably divergent, and founded on disparate philosophies. The United Kingdom is a parliamentary democracy under a constitutional monarchy. Despite having the structure, the veneer, of being a multiparty system at the national level, for all intents and purposes, it is a single party, Communist, police state. 

Quaeritur belli exitus, non causa. (Of war men ask the outcome, not the cause.) At a basic level with regard to intelligence services, moral principle and philosophy, in this case whether recognized as being based on Judeo-Christian values, Liberalism, Capitalism, Communism, Socialism, Maoism, or otherwise, is not method. Method is method. Philosophy is philosophy. Moreover, in the intelligence industry, results are what matter most. To that extent, at the basic level, the work of the two services are going to have sufficient likenesses to suggest parallels and comparisons. It is on such a basic level that the parallels and comparisons have been made in the discussion here. With this in mind, hopefully scholars will be open to considerations presented.

Two MPS officers operating high-tech optical equipment in Beijing (above). To provide a common point of reference regarding the type of intelligence services and activities performed by MPS and MSS, greatcharlie, perhaps going out on shaky ground, points to parallels between their roles in China and the roles of the Security Service and Special Intelligence Service MI6 for the United Kingdom. Before going forward with discussion here, it seems appropriate to at least broach some of more apparent distinctions between the services of the two countries. A clear-cut comparison of MI5 and MI6 side-by-side with MPS and MSS is admittedly not possible. at the basic level, the work of the two services are going to have enough likenesses to suggest parallels and comparisons. It is on such a basic level that the parallels and comparisons have been made in the discussion here.

Using MI5 as a Yardstick to Gauge MPS and Its Activities

The Security Service, known informally and hereinafter referred to in this essay as MI5, is the United Kingdom’s government agency assigned with managing the country’s internal security. It is authorized to investigate any person or movement that might threaten the country’s security. Although MI5 is responsible for domestic counterespionage, it has no powers of arrest. MI5’s motto is: Regnum Defende (Defend the Realm). The Secret Intelligence Service, known informally and hereinafter referred to in this essay as MI6, is the United Kingdom’s government agency responsible for the collection, analysis, and appropriate dissemination of foreign intelligence. MI5 has only a few thousand employees. It is headquartered in London, at Thames House. MI5 is a component of a vast intelligence apparatus in the United Kingdom. Reportedly, command and control is directed via no less than four entities: the Central Intelligence Machinery, the Ministerial Committee on the Intelligence Services, the Permanent Secretaries’ Committee on the Intelligence Services, and the Joint Intelligence Committee. Communications intelligence is the responsibility of the Government Communications Headquarters (GCHQ), which works closely with the Communications Electronics Security Group, while a number of agencies manage military intelligence under the aegis of the Ministry of Defense. Even London’s Metropolitan Police, or Scotland Yard, has its own Special Branch concerned with intelligence.

While MI5 is the agency responsible for the internal security of the United Kingdom, it primarily provides security services and intelligence operations within England and Wales. Its current role was best expressed by the Crown Minister in 1945, with regard to its postwar raison d’être: “The purpose of the Security Service is defense of the Realm and nothing else.” MI5 reports to the Home Secretary of the Home Office. It may be confused as being a domestic law enforcement organization, but it is far from that. To perform the internal security function, MI5’s activities include: domestic counterintelligence; counterespionage; counterterrorism, counterproliferation, and cyber work within the country and protective details for many top government officials. Its officers do not have authority to arrest citizens. When needed, MI5 will work in close cooperation with London’s Metropolitan Police Service (headquartered at New Scotland Yard) and other local police agencies within England and Wales. This is especially when it concerns their efforts to fight domestic terrorism. MI5 may also interface with MI6 when foreign intelligence and domestic intelligence activities intersect.

It cannot be overemphasized that MI5 is a secretive organization. Well back in 1931, the firm instruction to a new employee was: “No one, not even our own families, should be told where we worked or for whom.”  The existence of MI5 was not acknowledged officially until 1979, when Mrs Thatcher unmasked Sir Anthony Blunt as the Fourth Man in a statement to the House of Commons. Its head was publicly named for the first time in 1991. It was also at that time when some previously classified information about MI5, such as the number of its employees and its organizational structure, was made public. During the past three decades, MI5 worked its way through a number of scandals–to include incessant hunts for apparently nonexistent moles–that further tarnished its reputation in many circles. Reflective of British culture, members of the intelligence services, from top to bottom, were unwilling to display any disappointment or hurt and never looked to cry on anyone’s shoulder. They remained reticent about attitudes toward them and placid, straightforward, as they performed their work. Somewhere along the line, a solution was found. The decision was made to release their stories, not to drain themselves out, but let little bit find its ways into the public marketplace to unmask appearances public relations-wise. Through the use of surrogate voices, a sudden fracture in the marble reveals the interior. The inner life. Studies were commissioned to tell their stories, to the extent possible.

Most relevant in Andrew’s Defend the Realm to the examination of MI5 in this essay, are anecdotes loaded with insights on events that were in their time of the utmost importance. Those cases chronicalized, carefully selected from MI5’s storied past, and detailed the complex nature of MI5’s modern day work is revealed. Additionally, from Andrew’s work, one receives a picture of MI5 as a tightly-knit institution, in which many officers keep body and soul together, and others actually thrive, in its atmosphere of secrecy. Based on what has been made public, in an investigation of a threat to the United Kingdom, MI5 officers will usually seek to gather covert intelligence directly. Often, they operate openly and declare themselves as representatives of foreign intelligence services to their host country. The methods used by MI5 officers vary widely, and are often limited only by their ingenuity. Armed with a suite of the latest high-tech tools for surveillance, they will use it to eavesdrop, tap telephone calls and communicate secretly. Normally, MI5 officers will recruit spies to obtain intelligence on their behalf. 

More formally, a spy working for MI5 is known as a “covert human intelligence source,” but in the United Kingdom, spies are more commonly referred to as agents (Interestingly, in the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA), a covert human intelligence source is called an “informant” rather than an “agent.” Such agents have been consistently referred to as operatives by greatcharlie.) MI5 agents will do far more than just inform about people and events. Agents secretly provide private information to which few or no others might have access, as well as classified information to an officer. An agent will probably not be a professional “spy” but an MI5 intelligence officer will usually provide them with some basic instruction in tradecraft, espionage methods. The human relationship between intelligence officers and their agents remains a key element of espionage.

MI5’s earliest precursor was a secret service formed in 1569 by Sir Francis Walsingham, who later became secretary of state to Elizabeth I. What came to be called MI5 was formed in 1909 under the leadership of Vernon Kell, then a captain in the British army, to identify and counteract German spies then working in the United Kingdom. It performed that task with great effect. MI5 originally stood for “Military Intelligence [Department] 5.” (In fact, there were a number of departments within the Directorate of Military Intelligence–MI1 through MI19–which dealt with a range of issues. MI1, for instance, was responsible for code-breaking, and MI2 handled Russian and Scandinavian intelligence. The responsibilities of these departments were either discontinued or absorbed into The War Office, MI5 and MI6 and, later, the Government Communications Headquarters.) After World War I, MI5 remained in place as part of the United Kingdom’s effort to centralize control of intelligence functions. In 1931, MI5 was renamed the Security Service, but was still commonly known as MI5 then as it is today. About the time it was renamed, MI5 was paired with MI6, under the Defence Ministry and functioned with a “combined staff” of only two men. Kell, MI5 founder, remained in charge of the agency until 1940. During World War II, with far more staff, MI5 enjoyed a considerable number of successes. One was the Double-Cross System, which fed disinformation to Nazi Germany. For the most part, however, it is recognizably difficult to measure MI5’s success, since it can only be judged by things which do not happen, such as the prevention of sabotage. 

There was initial period of confusion at the start of World War II as a MI5 was inundated with work and had too few staff at all levels to handle it. Missteps led to “life-saving” reforms with the coming of Sir David Petrie in April 1941. MI5 is better known in the war as having achieved great success in uncovering Nazi agents in the United Kingdom. Captured Nazi records studied after 1945 indicated almost all of the Nazi agents working against the United Kingdom were captured. The exception was ine the committed suicide. MI5 managed to recruit a number of the enemy agents to become counterespionage agents for the service and fed false information to the enemy concerning military strategy during the war. MI5 executed the famous “Double Cross” system which was a deception that supported the success of the D-Day Invasion at Normandy in 1944. A proud episode for MI5 was its defense of Gibraltar from enemy agents and saboteurs throughout the war.

MI5 engaged in a hard fought struggle with Soviet, Eastern Bloc and Chinese espionage efforts in the United Kingdom. The situation was made more difficult was the rise in IRA terrorism during the Troubles. One MI5 renowned victories was its uncovering of Soviet Union’s most valuable agents was exposed. However, MI5’s record during the Cold War, actually was mixed. There were a number of widely publicized blunders during that period. The Soviet Union was found to have deeply penetrated MI5, as well as MI6 which reportedly undermined the public’s confidence in the organization.

Low morale reportedly plagued MI5 after the end of the Cold War and the Good Friday agreement of 1998, which led to massive cutbacks. The agency’s focus would eventually shift after the Cold War from counter-espionage and counter-subversion to counterterrorism. That shift was given greater emphasis following the September 11, 2001 terrorist attacks in the US, and counterterrorism became a role of the utmost importance following the July 7, 2005 and July 11, 2005 terrorist bombings in the United Kingdom. MI5’s ranks were filled out rapidly, and within it was a renewed sense of purpose. Today, counterterrorism operations still account for much of MI5’s activities. 

Not all of the anecdotes that Andrew offers spotlight the valor of its officers. There are some of the rather lurid intrigues. They include a cast of cheats, schemers, supplanters, unsavory allegiances, and unimaginable acquaintances. One dare not imagine the sensibilities of the errant individuals behind them. In the discussion of the work done within the analytical shops of MI5, the finer shades of analysis and deduction are spotlighted. Information was looked upon pathologically as the source of motives, clues, indications, and implications. With that analyzed information, MI5 leaders would speak truth other power, whatever it came upon, no matter how offensive, it was told straight.

Zhao Kezhi, State Councilor of the People’s Republic of China and the Minister and Party Committee Secretary of the Ministry of Public Security, with the top police officer rank of Police Commissioner General (above). MPS senior executives are influential members of the Communist Party of China senior ranks, What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. That is the type of relation that Chinese intelligence services have with the Communist Party from their very beginning.

Intelligence Work of MPS

If one placed the history of Chinese intelligence alongside that of the United Kingdom, one would find that the craft of intelligence was studied in China long before the idea of formally organizing intelligence activity was manifested in 16th century England. The most illustrious expressions of intelligence concepts and methods in China was in Chapter 13 of The Art of War, a treatise dating from the 5th century by the Chinese military strategist Sun Tzu. Chapter 13 focused on the importance of developing good information sources, and identified five specific types of intelligence sources along with ways to best manage each. However, the lineage of modern Chinese intelligence services,  as noted earlier, have more recent beginnings in the era of Mao. Similarities between MPS and MI5 exist insomuch that it is the Chinese intelligence service charged with internal security and domestic counterintelligence activities of China. It investigates and acts against any person or movement that might threaten China’s security, but unlike MI5, its officers have the power to arrest. In addition to its performing those standard domestic functions as an intelligence service, MPS is very much tied to the Communist Party of China to maintain control of the population and maintain the Communist order. To that extent, it has remained obedient to the ever shifting requests and requirements the Party issues to it. To be more specific concerning the responsibilities of MPS, they include: preventing, stopping and investigating criminal activities; fighting against terrorist activities; maintaining stability and order; administering to transport, fire fighting and dangerous objects; administering to household registration, identification cards, nationality as well as entry, status and exit of Chinese and foreign nationals; maintaining border security; protecting persons, venues and facilities as designated by the state; managing gatherings, parades and demonstrations; supervising public information networks; supervising security concerning state organizations, social organizations, enterprises, institutions, and large construction sites; and, guiding community security commissions.

The Communist Party of China has hardly proven to be pristine in practicing what it preaches. What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. Normally, finding the truth is sine qua non among intelligence and counterintelligence services, and law enforcement. To fail to find the truth, well-aware that one holds a paucity of facts, information and data, is to fail oneself. Naturally, being aware of the existence of information that contradicts one’s initial hypothesis and doing nothing to dig deeper is counterintuitive.  Having stated that, in the intelligence industry, the slightest deviation from the course ordered on an investigation to satisfy the requirements of the powers that be throw the rules out of the window. However, when tasked directly by the Communist Party of China, the truth lies in what the Party says the truth is. If MPS officers were to present findings from an investigation that held information contradicting the truth as declared by the Communist Party of China, they would unlikely garner understanding from their respective national provincial, or municipal senior executives and managers. In the best case scenario, the ironic admonition might come from on high to stick with the primary problem instead of rooting around at “extraneous matters.” That is the type of relationship that Chinese intelligence services have with the Communist Party from their very beginning. They are charged with the responsibility for ensuring the tranquility of order. From outside of China, one can freely call the well-experienced intelligence officers who fill the ranks of MPS as tragedians, specializing in a very tragic role for their country.

Manifestations of Political Pushes from Behind in MI5’s Past

In examining MPS, it cannot be stressed enough that it is a political creature of the Communist Party of China. MI5’s circumstances are not remotely similar. MI5 is not an organization designed intrinsically to service the political interests of political authorities. However, there have been occasions when political authorities have misused the vital security arm by using pressure to influence its actions, for purposes that were questionable. Shockingly, the MI5 carried out secret surveillance of the colonial delegations which came to London to discuss terms for independence in the 1950s and 1960s. Andrew gives a disturbing account of the stealthy gathering of intelligence on the delegates attending conferences which negotiated the independence of Cyprus and Kenya. The Home Secretary, Rab Butler, cynically condoned these operations on the grounds that “obviously the product was of great importance and of great value to the government negotiators”.

In most of the British Empire, claims Andrew, MI5 contributed to a smooth transfer of power through the work of its liaison officers. However in Guyana, where United Kingdom Prime Minister Sir Winston Churchill wanted to “break the Communist teeth,” a shameful exception was witnessed. MI5 obediently provided support for the United Kingdom and US covert action to oust the democratically-elected Cheddi Jagan from power. Andrew claims that the dominant intelligence agency in the years leading up to Guyana’s independence in 1966 was the Central Intelligence Agency (CIA). However,  MI5, and thereby the government of the United Kingdom, nevertheless had a hand in the affair. 

In the present day, such outcomes are certainly not intended in MI5, an organization tasked and trusted to protect and serve the United Kingdom. To ensure that remains so, the Ministerial Committee on the Intelligence Services exercises regular ongoing oversight of intelligence activities. Through this committee, the Prime Minister, with the assistance of the Secretary of the Cabinet, exercises authority over the daily operations of the British intelligence and security communities as a whole. The Home Secretary oversees MI5, as well as the National Criminal Intelligence Service and Scotland Yard. To the extent that there is always the need for such a degree of oversight from above, one must never overlook the shadowy side of the business. It is at the core of intelligence work. There is a reality that by doing the dirty work, the people of the United Kingdom are allowed to sleep peacefully at night. When the situation is dire and urgent enough, use has been made of agent provocateurs who may take direct action to maintain their bona fides within their groups for the organization’s purposes.

Today, officers join and serve MI5 with the belief that its work has much to do with the wider good. As the targets of MI5 efforts are the terrorists or the war criminals or the nuclear proliferators. There is an understanding how the need to approach a matter of the utmost importance with the most effective method available can subordinate all else. Whether or not exigent circumstances permit, there at least exists the earnest aim among them to defend the values of the United Kingdom’s liberal democracy. Unlike its counterpart in the Chinese intelligence services, MPS, causing harm to the free people of their own country, who are living within the law, is never the intended purpose of MI5. Indeed, while also ostensibly tasked and trusted to protect and serve the people of their country. MPS keeps a boot not only to the neck of criminals and true threats within China, but of groups of innocent citizens labeled as undesirable by the Communist Party of China, and doing that appalling work at the Party’s behest, to be frank, could be ascribed as an essential part of their raison d’etre.

Other Ugly Truths

As long as humans are involved in an organization and its plans and activities, rarely will outcomes be perfect. It could be expected to be imperfect shaped by mistakes, misjudgments, biases, and emotions. To that extent, there is no purpose here to establish MI5 as a paragon of moral behavior. In its history, mistakes were made. Pointing to them means admitting to the truth. (Interestingly, the historical record indicates the nearly contemporary national intelligence service has suffered from its share of mistakes.) What can be greatly appreciated in Defend the Realm is that Andrew tells the MI5 story straight. The ugly truth as told, creates some disappointment, yet from it, lessons were certainly made available that would allow for the organization’s improvement. According to Andrew, recruitment within MI5 was perhaps the most outward expression of inward thinking in the organization. It was surely not acceptable by today’s standards intellectually, morally, ethically, and professionally. Indeed, within the organization itself, MI5, a public service, did not advertise openly for recruits before 1997. Up to that point, recruitment was based on personal recommendation. This was a narrow social group, many of whom had served in India or elsewhere in the Empire. To that extent, the organization was sure to recruit “from good Anglo-Saxon stock.” Reportedly, male officers listed their recreations as cricket and hunting, while female officers were graduates of elite schools and universities

Right up to the mid-1970s, the post-war Security Service refused to recruit Jews on the grounds that a dual loyalty to both Israel and the United Kingdom might create a conflict of interest. This was “inexcusable,” Andrew rightly observes. There was also a very disturbing attitude taken toward Blacks interested in joining the Security Service. In 1949, then Deputy Director General Guy Liddell told the Joint Intelligence Committee: “It was true that niggers coming here often went to the C[ommunist] P[arty].” That fact that he held such appalling racist views were reinforced when he explained there was no doubt in his mind that “West African natives are wholly unfitted for self-rule.” There was a sour spirit to it all. Yet, that was the spirit of the moment. A sort of “pigs in clover” self-satisfaction influenced and distorted thinking in the world of that past era.

While MI5 was busy keeping some citizens out of its intelligence service, its rank and file was surprised to discover who they had let in. In 1951, as the result of the decrypted telegram of the Soviet Union’s Komitet Gosudarstvennoy Bezopasnosti (the Committee for State Security) or KGB, that any of the Cambridge Five–then current or former all MI5 or MI6 employees, who were recruited as spies by the Soviets in the 1930s when they were young misguided Communists at Cambridge University–were identified. The bombshell revelation sent shock waves through the halls of MI5. In response, MI5 initiated an investigation that lasted 30 years in order to get to the bottom of the matter.

Among other unfortunate episodes for MI5 was the “Wilson plot” of the 1970s in which United Kingdom Prime Minister Harold Wilson was accused of being a Soviet agent–the information came from the CIA’s Counterintelligence Division, James Jesus Angleton based on claims of questionable source. MI5 investigated the claims and found them to be false. There was also the “Death on the Rock” case in 1988 in which MI5 with Spanish authorities were alarmed about three members of the Provisional Irish Republican Army (IRA) Belfast Brigade who travelled to Spain. It was presumed that they planned an attack against British troops in Gibraltar. MI5 intended to capture the IRA members with the assistance of the British Army’s Special Air Service Regiment cooperation of Spanish Authorities, but all three were killed in the process.

Zhao Kezhi, State Councilor of the People’s Republic of China and the Minister and Party Committee Secretary of the Ministry of Public Security, with the top police officer rank of Police Commissioner General (above). MPS senior executives are influential members of the Communist Party of China senior ranks, What often compels the Communist Party of China to select requirements and direction for Chinese Intelligence is not necessarily based on Maoist thought as much as political expedience, necessity, and personal interests. As a consequence, finding the truth is not always the main goal of MPS in its intelligence, counterintelligence, or law enforcement pursuits. That is the type of relation that Chinese intelligence services have with the Communist Party from their very beginning.

The Communist Party of China’s Political Manipulation of the MPS Today

It would appear that the leadership of the Communist Party of China is usually distressed exceedingly when even the mere suggestion is made that some underlying evil is present in the decisions and actions of the Chinese government towards its own people. There is the insistence by the Communist Party of China that it acts only in their best interests and the thinking behind each choice is gifted by what their Western counterparts would call scruple. Thus, when any reports, photos, or videos of the actual treatment of ethnic and religious minorities in China are secreted out of the country and headlined in the West or anywhere else in the world, it is nothing less than an absolute disaster. The belief among Communist Party of China’s leadership and members that China’s Communust society is near perfect and would be best for the world is a belief in a false reality. The prospect of any citizen or any foreigner, unmasking the appearance created by Beijing of China being an advanced industrialized society and superior culture truly seems to terrify the Communist Party of China. Burned rotten by somewhat regular investigative reports and exposé documentaries, written and produced in the West, they, without fail, will attempt to cover their traces rather than spill it out. Government and Party spokespeople will roar about China’s innocence and the false and bizarre nature of what is reported. Trying to figuratively get the toothpaste back into the tube has never worked though. Focusing on what it can control, the Communist Party of China engages continuously in an effort to grease the wheels of citizens thinking to ensure that it always slides in its favor and toward appreciation of the Communist Revolution. To stanch the thickening of misgivings among the Chinese people toward its actions, ever present are warnings to citizens to guard themselves against foreign agents, look upon foreigners with some suspicion, and be cognizant of the possibility of unwittingly giving cause for foreign agents to trace them and spot them as potential recruits as spies and informants through seemingly innocuous contact.

The Communist Party of China has long acknowledged that there is always a threat that could arise from the “unsuccessful” education of Chinese citizens. A symptom of that would be the attraction to materialistic symbols of success for the former bourgeoisie class apparatus of success: business success, homes, cars, things constructed around people. It was what identified them as being above the proletariat, the working class. In China, given its relative prosperity, there exists the fear among leaders of the Communist Party and government bureaucracies that the bourgeoisie existence of the West would insinuate itself in the thinking of Chinese citizens and become a preference in their minds. Any aspiration created for what the West has to offer not under controlled circumstances could figuratively spread among the people much as a virus, infecting the proletariat, potentially creating some mass disaffection toward the system. Perhaps such sensibilities reveal a secret doubt that Chinese citizens could see that so-called ideals of Maoist Thought and Marxist-Leninism had been betrayed or perhaps were simply Utopian, and that they would desire great changes. Communist Party of China leaders determined long ago that the response to this threat needed to be strong enough to match “the severity of the disease.” 

As part of its efforts at population control, the Chinese government insists that the people keep a watchful eye over threats to the new system. It was understood that the reactionary, the counterrevolutionary, most often “hiding in the shadows,” posed the greatest threat and was viewed as anathema. It was in the performance of the mission to discourage, punish and obliterate that threat that the MPS earned a reputation for being the horrifically oppressive cats paw of the authoritarian regime. The MPS has interfered in interactions and relationships between citizens, ordered citizens to spy on their fellow citizens, demanded that they betray one another, regularly performed intrusive and demeaning searches of citizens’ person, homes, and workplaces. There have been arrests of many innocent citizens, accompanied by abusive and endless interrogations. The shadow of sudden death hangs over the head of any individual in MPS custody.

As of late, what should be of greatest concern is the approach the MPS has been taking toward foreign visitors. (The matter is elaborated upon later in this essay.) As a practice, foreigners, especially, Westerners, are closely observed and often investigated by provincial offices and local MPS stations. Under such circumstances, there is always a real possibility that one might be arrested or “briefly” detained for questioning, would be created. Foreign visitors who have faced such treatment have almost immediately become the center of a frightful international incidents, which is actually the goal of Chinese authorities. Regardless of one’s status in the US, it can happen in China. Reportedly, the attempt has been made with some foreigners to persuade with the pressure of interviews, interrogation, and detainment or use certain manipulations to convince them to let themselves go and reveal “the truth.” Telling the truth would mean copping to preconceived ideas held by their interrogators about their alleged wicked missions against the People’s Republic of China. The treatment of Chinese citizens detained by the MPS for even lesser “offenses,” is always decidedly worse.

Multi cives aut ea pericula quae imminent non vident aut ea quae vident neglegunt. (Many citizens either do not see those dangers which are threatening or they ignore those that they see.) Spin concerning the maltreatment of ethnic and religious groups is propagated through narratives in the state-run news media of how much the Communist Party of China is doing to protect China from enemies, domestic and foreign, at the hands of which the Chinese people have suffered for so long. Nevertheless, a good number of Chinese people are aware that one cannot know with certainty what is real from what one hears from the government. However, holding a secret doubt about the system in China can lead to a solitary despair. The secret doubt becomes dissatisfaction with one’s work and one’s situation which can become a full-blown loathing of the system. Soon after may come the rejection of authorities. In response to conditions forced upon them, being subjected to humiliations, Chinese citizens of some ethnic and religious minorities have acted in protest, releasing a sense of frustration. Becoming vocal may relieve his sense of frustration for the moment will only open the door to far greater problems. To Chinese government authorities, it represents nothing less than a social dissembling within those groups.

Loyal Communist Party members can hardly understand that any other citizen’s disillusionment or disappointment in government efforts to respond to their needs could be based in logic. Thereby, the attitudes of those citizens are irrational and reactionary. Surely, those approached by MPS display intense emotions, very likely overwhelmed by great fear and sheer terror, given an expectation the worst will befall them given the organization’s reputation, would avail themselves to be apprehended and held indefinitely as their situation would immediately be converted into a psychiatric issue. After all, any charge will do. The goal is to cull the so-called threatening population by plausibly arresting benign citizens and warehousing them away from their homes. One can only imagine that it would mean for those declared to have psychiatric issues to be placed in the hands of medical professionals linked to the MPS. MPS officers are apparently not timid to draw very false, aberrant, far-fetched inferences from fact collected during investigations. Of course, no professional ethics, no moral principles founded upon religion, and no less spiritually based philosophy of humanism could not obstruct such actions. Ethnic and religious minorities must feel akin to big chickens in a world of foxes.

Tibetans detained by MPS officers facing judgment in court (above). China has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability.

A principle is a precise standard, a course of conduct you are committed to, a way of life that you live by. Adherence to principles, has little meaning to the Communist Party of China unless the principles adhered to are those of the Party. Publicly available sources show that Beijing considers Falungong, Tibetans, Uyghur Muslims, democracy activists and pro-independence Taiwanese undesirables as they adhere to principles and a way of life adverse to that insisted upon by the Communist Party of China. They have been named the “five poisons” that constitute the greatest threat to Beijing’s rule. Tibetans, Uyghur Muslims, in particular, are essentially looked upon as vindictive ill-balanced creatures of China’s hinterland.

As noted here MI5 unfortunately has a record of past mistakes and poor judgment, too, and fortunately from that history, lessons have certainly been learned. Yet still, making mistakes and misjudgments is a far cry different from being deliberately bad, acting the name of injustice and engaging in cruelty, based on a contrived motive and without any reasonable provocation. MPS currently engages in activities which, not to apportion wickedness, manifest just how different the two intelligence services really are. MPS, as an organization, espouses great anger about ethnic and religious minorities, dubbing them activists, reactionaries, counterrevolutionaries, and terrorists, and for the sake of the Communist Party of China and the Communist Revolution, has done what it does best, acted aggressively toward such “threats.” If one is of a ethnic group or religious groups at variance with the Communist Party of China, and consequently under the thumb of the MPS, one will have the sense of being in contact with an evil of an exceptional nature. In recent years, egregious abuses have increased through government policies under the pretext and justification of fighting the “three evils” of “ethnic separatism, religious extremism, and violent terrorism.” 

Tibet is an autonomous region in the People’s Republic of China. The region has historically been the home to ethnic Tibetans, among others ethnic groups. It is the spiritual home of Tibetan Buddhism and the traditional seat of the Dalai Lama. China  has long considered Tibet to be part of its historical empire. In 1951, China occupied Tibet and took control of the region. Many Tibetans believe the region was illegally incorporated into China and have pressed for independence. A Tibetan independence movement has been calling for the independence of Tibet and political separation from China. That independence movement is largely supported by the diaspora of ethnic Tibetans worldwide. During periods of repression and martial law in the region, it is believed that the Chinese government has killed thousands of Tibetans. The Chinese government has referred to Tibetans as one of “the five poisons” threatening China’s stability. Omnis enim ex infirmitate feritas est. (All savageness is a sign of weakness.)

Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.” A commonality among the homelands of the different ethnic and religious groups in China is the fact that they are depressed regions with unemployment, poor infrastructure and many structures tumbled down. Interdum volgus rectum videt, est ubi peccat. (At times the world sees straight, but many times the world goes astray.) 

Uyghur citizens seated in formation in a detention center (above). Regarding the Uyghurs, the Chinese Communist Party is waging a targeted campaign against Uyghur women, men, and children, and members of other Turkic Muslim minority groups in Xinjiang, China. Abuses have included coercive population control through forced abortion, forced sterilization, and involuntary implantation of birth control; the detention of more than one million Uyghurs, ethnic Kazakhs, ethnic Kyrgyz, and members of other Muslim minority groups in internment camps; forced labor in facilities nearby or affiliated with the internment camps; the destruction and closure of mosques and other religious sites, prevention of youths from participating in religious activities, forced political indoctrination or “re-education.”

Regarding religious minorities, during the first thirty years of its existence, the Communist Party of China committed itself to making atheist Marxism the fundamental ideology of the country. depriving the Chinese people of their constitutional right of religious liberty. There is a clarity and certainty that comes from being able to know another’s origins. One place to look to identify, research, is to study a the  of culture, history, customs, that may shape the subject’s attitudes and behaviors, worldview. Adherence to religion, culture and identity as well, stiffens resistance to authoritarian pressures and coercion, and girds uncommon perseverance. To that extent, the Communist Party of China surely fears citizens’ adherence to their religions and cultures, and the rejection of Communism. In response to that threat, Beijing has formulated and implemented new policies, regulations, and legislation impacting religious freedom have been created and implemented, particularly since 1979. The idea of it all being to surgically strip citizens of their ethnicity, culture, and religion, thereby smother the individual’s identity, leaving the individual with nothing to grab onto, except Mao’s teachings on Chinese Communism. In the report of the US Congressional Executive Commission on China (CECC), 2017 Annual Report 127 (October 5, 2017), it is noted that Chinese authorities commonly prosecute Falun Gong practitioners under article 300 of the People’s Republic of China Criminal Law. That information was found on the official Chinese government “anti-cult website.” In February 2018, a woman in Beijing was convicted of “using cult organizations to obstruct the enforcement of laws” under article 300 of the Criminal Law. The woman was sentenced to one and half years in prison and a fine for publicly advocating “the evil cult Falun Gong.” Falungong, essentially an anti-Communist China spiritual group, was banned by Beijing in 1999, having been labeled an “evil cult.”  In 2014, a leader of the Church of Almighty God, a quasi-Christian group also known as Eastern Lightning, was also convicted of “using cult organizations to obstruct the enforcement of laws” and sentenced to four years in prison. That church is now officially banned.

Reportedly, MPS has detained or otherwise restricted the freedom of Catholic leaders in both the underground and official churches. The government has reportedly pushed for Chinese Catholic bishops to be selected through the patriotic religious organizations and then ordained by Chinese bishops without the involvement of the Holy See. Chinese officials have also reportedly subjected Protestant Christian beliefs and practices to a wide range of restrictions. Beijing reportedly pressured unregistered house churches to join the officially recognized religious organization, the Three-Self Patriotic Movement. Protestant house churches faced raids during church gatherings, eviction from meeting spaces, and official bans on worship. Martin Luther King, Jr. said that “The moral arc of the universe bends toward justice.” While that may be true, it surely has not bent so much in China’s direction yet. Iniqua nunquam regna perpetuo manent. (Unjust rule never abides continually.)

II. The Role of the MSS in China’s National Security Bureaucracy

As aforementioned, Chinese intelligence services, in terms of task and purpose, work within an authoritarian government and must be viewed as a different kettle of fish than the services of the United Kingdom. Having created the space and acquiring the flexibility over the past few decades to allow the service to evolve into the elite, very capable intelligence service the Communist Party of China originally wanted it to be, MSS senior executives and managers have now figuratively declared “game on” to China’s competitors and adversaries. The mission, as originally intended, has not changed much since 1983. Overall, it is now defined as collecting solid intelligence from the inner workings and the very top of foreign military, diplomatic, political, economic, financial, scientific, educational, media, communications, and social institutions. By conventional wisdom, one might proffer those are its priorities. It is surely what Beijing wants now and it is what MSS is chasing after. Its tactics, techniques, procedures and methods are surely more refined than ever before. As previously mentioned, Western intelligence services until recently have habitually underrated the abilities of Chinese intelligence services. That was a mistake. Central to greatcharlie’s understanding of China’s intelligence services and their activities are the writings of Peter Mattis. Since leaving the CIA where he was a highly-regarded analyst on China, Mattis has published a number of superlative essays on Chinese intelligence and counterintelligence. Mattis’ writings evince an appreciation of the depth of thought, organization, and planning Chinese intelligence services have put into building up their organizations and conducting operations in all areas. To that extent, he proffers that the West as of late has been facing very modern, competitive Chinese intelligence services that make use of tactics, techniques, procedures, and methods at a level equal and in some cases far more competitive than those of Western intelligence services. As he explained in a September 2012 article in Studies in Intelligence entitled, “The Analytical Challenge of Understanding Chinese Intelligence Services,” Chinese writings on intelligence bear remarkable similarity to familiar US definitions of intelligence functions and goals. He reminds that Sun Tzu taught that “foreknowledge” (xianzhi) allowed commanders to outmaneuver opponents. However, he notes more modern definitions range from “activating [catalytic] knowledge” (jihuo zhi-shi) to information to protect national security, domestic stability, or corporate interests in a competitive environment. Mattis goes on to state that Chinese military scholars today frame intelligence as a distinct subset of knowledge, defined by its relevance to decision makers and a competitive environment. Specifically, intelligence is transmittable (chuandi xing) and is knowledge that satisfactorily (manzu xing) resolves a specific decisionmaking problem. He further asserts that empirically, Chinese intelligence officers consistently have demonstrated the use of widely practiced professional tradecraft, having successfully exploited for political and military intelligence purposes agents with vulnerabilities familiar to anyone who follows the subject.

The Minister of State Security, Chen Wenqing (above). Chinese intelligence services target a broad range of national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities of the United Kingdom, the US, and other advanced industrialized countries. Lately, the chief feature of the intelligence war between those countries and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its corporate victims.

Using MI6 as a Yardstick to Gauge the MSS and Its Activities

Everyone on the outside has their own version of what MI6 is and does. Looking at MI6 as a yardstick to understand the MSS, the two organizations pair up to the degree that both are foreign intelligence services. The United Kingdom’s MI6, formally the Secret Intelligence Service as mentioned previously, is the government agency responsible for the collection, analysis, and appropriate dissemination of foreign intelligence. It is also charged specifically with the conduct of espionage activities outside of the United Kingdom’s territory. The MI6 motto is Semper Occultus (Always Secret), but the organization states as its mission: “We work overseas to help make the UK a safer and more prosperous place.” Much as MI5, MI6 has only a few thousand employees. It is headquartered in London, at Vauxhall Cross. It is a component of the same intelligence apparatus in the United Kingdom as MI5. 

MI6’s four main areas of focus are: countering international terrorism, combating weapons proliferation, supporting stability overseas and securing the United Kingdom’s cyber advantage. Countering international terrorism means exactly that, protecting the United Kingdom from terrorists. Performing that task entails: gathering and assessing intelligence; conducting investigations and disrupting terrorist activity; preventing people from becoming terrorists; and, protecting critical national infrastructure and crowded places. Through gathering intelligence and disrupting operations, MI6 plays an indispensable role in the United Kingdom’s counter weapons proliferation efforts directed at combatting the international proliferation of chemical, biological, radiological and nuclear weapons. Working in cooperation with key national and international partners as the US, MI6 also helps to ensure that the United Kingdom’s weapons exports never fall into the hands of terrorists. Instability and conflict overseas leads to weak governments and poor national security, and nurtures a fertile environment in which terrorists and organized crime groups can thrive. Using agents, the MI6 provides intelligence to government policymakers and decisionmakers and provides early warning indications of potentially hostile threats. Most often that information can lead to early political intervention to prevent prolonged instability. Cyber threats are a key security risk to the United Kingdom, as they have the potential to disastrously impact individuals, organizations and governments. Global and ever becoming increasingly complex, cybercrime has the unusual characteristic of having the potential to rear its ugly head and reach out from anywhere in the world. The MI6 provides secret intelligence to help protect the UK from current and emerging cyber threats across a range of adversaries such as hostile countries, terrorists and criminals. Additionally, MI6 conducts counterintelligence operations via a furtive counterintelligence section, but it is generally understood that the organization shares that work with MI5.

In order to meet the challenges of their work, MI6 officers are highly trained in the tactics, techniques, procedures, and methods of their profession. Within intelligence services, as noted earlier, it is referred to as tradecraft. High on the list skills learned and honed are espionage techniques and the use of agents. Often MI6 officers may operate openly in their host country, declaring themselves as representatives of the United Kingdom’s foreign intelligence services. Otherwise they will work covertly under the cover of other official positions such as diplomatic staff or trade delegates. Some MI6 officers may operate under non-official cover to conceal the fact that they work for an intelligence service. That usually entails posing as a business person, student or journalist for example. In some cases MI6 officers will operate under “deep cover,” meaning they will use false names and nationalities. In the intelligence industry, such officers operating under such cover are referred to as “illegals.” They operate without any of the protections offered by diplomatic immunity. MI6 officers typically seek to establish networks of agents whom they can use over a sustained period of time, so that they can obtain a reliable flow of information. As it was stated in the aforementioned discussion on MI5 agents, MI6 agents operate by exploiting trusted relationships and positions to obtain sensitive information. They may also look for vulnerabilities among those handling secrets. They may be aware of flaws in their organization’s security that they can exploit. Recruiting agents, both foreign and domestic, who can provide intelligence on terrorist plans and organizations is of the utmost importance to MI6 officers.

MI6 was constituted in its present form in 1912 by Commander (later Sir) Mansfield Cumming as part of the United Kingdom’s attempt to coordinate intelligence activities prior to the outbreak of World War I. In the 1930s and ’40s it was considered the most effective intelligence service in the world. Following the rise to power of Adolf Hitler in Germany, MI6 conducted espionage operations in Europe, Latin America, and much of Asia. When the US entered World War II, MI6 helped to train personnel of the US Office of Strategic Services (OSS). As mentioned, it was the organization in which Hilsman served. Much of OSS’ foreign intelligence and counterintelligence tradecraft was adopted from MI6. Indeed, the CIA still uses much of it today. Reportedly, many “old boys,” veterans of the OSS are fond  of saying, “The Brits taught us everything that we know, but certainly not everything that they know.” The two organizations worked closely during the war. MI6 has since cooperated extensively with the OSS’s successor, the CIA. MI6 senior executives, managers, and officers refer to the US intelligence organization the “American cousins.” Details of MI6 operations and relationships have rarely appeared in the press. In the mid-1950s, the public reacted with consternation when it was revealed that MI6 had been penetrated by double agents who had served the Soviet Union since the 1930s. It was not until the 1990s, that the head of MI6 was publicly named for the first time. Still, information about MI6 is still much more closely guarded than that about MI5, which carries out internal security and domestic counterintelligence activities. The agency has the power to censor news accounts of its activities through the use of “D” notices under the Official Secrets Act. MI6 reports to the Foreign Office.

Stephen Dorril’s work, MI6: Inside the Covert World of Her Majesty’s Secret Intelligence Service, is a true reflection of the organization, its people and its history, what it has done and where it has been most influential . Dorril, a meticulous observer and chronicler of the security services, demonstrates an understanding of everything one might have thought about MI6. Through the text, readers learn that MI6’s postwar activities were mired in prewar attitudes and practices. Many in the United Kingdom imagined the foreign policy task dividing up the world with US and other global powers. Instead, the preoccupation was the Soviet Union and the Cold War. In chronicalizing the Cold War segment of MI6’s history, Dorril fills the pages with anecdotes of its most spectacular failures, stirring successes, unsavory plots and bizarre missions, the real-life cloak-and-dagger world is exposed. There is a discussion of Operation Stalin, which exploited the Russian dictator’s paranoia and led to the execution of thousands. There is another about the tunnel MI6 dug beneath the Berlin Wall. During the Cold War, in the intelligence war, it seems that there was no opportunity, in the midst of his work against the Eastern Bloc and more the Soviet Empire, to view matters from a broader or humane perspective. Surely, with the benefit of hindsight, it is easy to enumerate all of the mistakes, poor choices that were made. By 1992, influence abroad had been lost in the Middle East, most of Africa and large swathes of Asia. The United Kingdom was not exiled and isolated as some might suggest. It was then and remains a key partner to the US with its superpower status, and often takes lead from the US, the main push was to abrogate the world’s resources. In the post-Cold War era, there was once again a sense, particularly in the administration of US President Bill Clinton of the West’s entitlement to the world’s spoils. That rush to take what was available was intensified by the need to get to what was out there before the People’s Republic of China did. Political power seemed to embrace corporate power. As a consequence, there was the appearance that corporate power was supported by government power. MI6, one of the great information-gathering organizations of the world, was put to that task, placing some strains on the service.

The book presents a well of extraordinary characters. As alluded to earlier, the lion’s share of what was told is meat and drink for those who enjoy spy novels, but it is all real. Yet, in addition the book presents the similitudes of the intelligence industry with profoundly human stories. The world of the intelligence officer is often a dank and grey one, visceral, boring at times. There is a drudgery about agent running. Doing chores in the analytical shops can be tedious. One is invited to understand the suffering and sacrifices of MI6 officers. Prerogatives are surrendered, loves, passions, moral ambiguities, moral compromise. Many officers fall off, finding satisfaction in other professions and pursuits, others engaged in betrayal, a few entered the device with the objective of spying. As with MI5, MI6, as a dynamic, intelligence service, operating worldwide, has a history riddled with complexity. Stories of unpleasantness are even found in Dorril’s authorized study, too! The more counterintuitive these acts are from the past, the more puzzling they are. In such an old, but odd profession, if one finds oneself doing odd things, the hope would be to catch oneself out when one is so far out of bounds that nothing good is being accomplished.

The People’s Republic of China Embassy in Washington, DC (above), home to the MSS resident in the US. Much as it was the case during the Cold War with Soviet and Eastern Bloc intelligence services, it remains a penchant today among the Chinese intelligence services, to troll the émigrés who have made their way out of those countries. They will go as far as to twist their tails to garner their cooperation as operatives and informants. There is almost an insistence that even having left China, the émigrés must accept China’s iron rule. It may appear to be daylight madness, nevertheless, it is happening. In the recent case of an New York City Police Department officer was alleged to be supporting the intelligence activities of the Communist Party of China’s intelligence organ, the United Front Work Department. That case brought to fore the fact that Chinese intelligence services work hard at compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats.

Present Day Focus and Operations of MSS

MSS, as well as other Chinese intelligence services, target a broad range of US national security actors, including military forces, defense industrial companies, national security decision makers, and critical infrastructure entities. Lately, the chief feature of a defacto intelligence war between West and China has been the economic front. Indeed, economic espionage, one might venture to say, holds perhaps a prominent place among the bread and butter activities of the MSS and is best known to industries around the world most of which could easily become one of its corporate victims. To understand the intelligence efforts of MSS, one must understand how guIding concepts from Deng Xiaoping led to a decision by Chinese intelligence to make economic espionage an even greater emphasis. Under the Second Chairman of the Communist Party of China, Deng Xiaoping, China began authentic economic reform partially opening China to the global market. China’s economy grew rapidly soon afterwards. In a five-year economic plan 2006-2010, the Communist Party of China outlined that China must maintain fast and stable economic growth and support the building of a harmonious society. The Communist Party of China’s aim was to raise the country’s gross domestic product by 7.5% annually for the next five years. In order to achieve such rapid economic growth, However, countries such as India and Vietnam had begun competing with China to offer cheap manufacturing bases for Western companies. Further, the increased demand for raw materials such as oil and iron ore, and new environmental and labor laws led to cost increases, making manufacturing in China more expensive which caused some factories to close. China sought to diversify its economy, for example, through the manufacture of better made high end products. However, that diversification of the economy required the Chinese to increase their knowledge of design and manufacturing processes. Espionage has offered a relatively cheap, quick, and easy method to obtain information that could help Chinese companies remain competitive. Many of China’s largest companies are state owned, or have close linkages to the government, and receive intelligence collected by Chinese intelligence services. Those firms have also proved to be capable of engaging in commercial espionage themselves. To get an idea of how well the MSS operates, one only needs to consider its ongoing activities in the US. Without the intention of tarnishing or being beastly toward US intelligence and  counterintelligence services, and law enforcement, they have been unable to prosecute a successful, fruitful, and victorious campaign against Chinese intelligence services operating in the US and against US interests globally. Readers might recall from previous posts on the subject, greatcharlie noted that Western intelligence services until recently have habitually underrated the abilities of Chinese intelligence services. Further, in previous US administrations, particularly in the administration of US President Barack Obama, a somewhat relaxed attitude resulted in policies on China lost in the wilderness that failed to genuinely protect or promote US interests. The delinquency and lethargy of previous administrations also allowed for the steady progress of China versus US power and further advances in technology. The burgeoning threat was apparently not fully discerned or appreciated. 

In response to past US missteps, Chinese intelligence services presumably placed a laser focus upon enhancing and adjusting their approaches to US targets. As a product of their success in recruiting officers and contractors from the US intelligence services, Chinese intelligence services have apparently managed to better understand what the US has been doing to try to recruit Chinese intelligence officers, operatives, and informants is prioritized. To the extent, US intelligence officers and contractors recruited as spies are typically tasked with actions to support Chinese counterintelligence requirements. Doubtlessly, the collection of information on what MSS foreign intelligence has been doing has been insufficiently analyzed in light of information collected on US counterintelligence surveillance strategies and technological capabilities would inspire audits in Chinese intelligence services to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight. If Chinese intelligence services actually hire hundreds, perhaps even thousands, of officers, operatives and informants, it stands to reason there would be a number of bad apples among them. If not, one must become reconciled with the fact that Chinese spies do not go astray so often.

Foreign Intelligence Operations of MSS

Successful multifaceted activities of Chinese Intelligence services have included: conventional espionage; outright intellectual property theft via corporate and academic institutions worldwide, and cyber attacks. For a good idea of how MSS conducts conventional espionage today, Ryan Clarke, a senior fellow at the East Asia Institute, a Singapore-based think tank, boils it down well in a July 31, 2020 Asia Times article entitled, “The Face of Chinese Spying in Singapore.” Curiously using MSS efforts primarily in the US primarily as an example, Clarke asserts its intelligence operations are highly targeted and tethered to specific state goals. He explains: “These types of operations are quite simple with relatively few moving parts, which is why they are replicable at scale.” To illustrate the variety of targets attacked by MSS, Clarke says: “We’ve seen operations against a range of American targets, from Covid-19 vaccine research to the F-35 fighter jet program.” With regard to the collection effort, Clarke goes on to propound: “The general approach is to establish target priorities and then proceed to collect what appear to be rather innocuous inputs with relatively limited value when viewed in isolation. Sometimes the information may not even be classified. This is done on a massive scale in-country with a parallel synthesis-fusion operation in China itself.” Putting such a massive and energetic effort into perspective, Clarke maintains: “The strategic logic is that, in the aggregate, this massive collection and synthesis-fusion effort will yield unique findings and insights which the Chinese Communist Party can leverage across a range of domains.” The Idea that a massive synthesis-fusion operation exists to mine useful intelligence from piles of information collected was also proferred and the analytical operation was conceptualized in greatcharlie’s July 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2).”

So far as is known publicly, counterintelligence services of the countries Chinese intelligence services have struck, to include the US, have yet to get to the bottom of their business in their countries in order to put an appreciable dent in their work. One might imagine that trying to spot, intercept, neutralize, and recruit significant numbers of Chinese intelligence officers, operatives, and informants has become an exercise in chasing shadows. This has likely left senior executives and managers of many counterintelligence services in a mute frenzy. For the US, in particular, long gone are the opportunities such as the relatively facile recruitment of the MSS officer Yu Zhengsan back in 1985. Then, when MSS was barely up and running for two years, Yu Zhengsan, a mid-level MSS officer from a well-connected political family, was allegedly aided by the CIA allegedly in escaping China and defecting to the US. Once in US hands, Yu provided investigative leads for US counterintelligence services to capture Larry Wu-Tai Chin, a retired CIA language analyst, who had spied for China since the 1940s. If Chinese intelligence services actually hire hundreds, perhaps even thousands, of officers, operatives and informants, it stands to reason there would be a number of bad apples among them. If not, US counterintelligence services must become reconciled with the fact that, today, Chinese spies do not go astray so often. That is, there must be nothing so creative that US counterintelligence services are doing or offering to encourage them to do so.

Prior to the coming of the administration of US President Donald Trump, economic espionage by Chinese intelligence gained real traction. Startled US government officials began to sound the alarm particularly over the destructive impact of Chinese commercial espionage upon US national security. Intrusions by Chinese actors into US companies and other commercial institutions harm both the individual companies and the overall US economy, to the benefit of China. Indeed, in July 2015, Bill Evanina, who was the National Counterintelligence Executive in the Office of the Director of National Intelligence, and remains in that position as of this writing, stated point blank, “Economic security is national security.” Nevertheless, the vociferous statements of those tasked with defeating China’s operations had no real effect on the course of the administration of US President Barack Obama and Chinese intelligence activities steadily intensified. In response to counterintelligence and cyber defense missteps, Chinese intelligence services seem to have placed a laser focus upon enhancing and adjusting their approaches to US targets.

It is important to note that much as it was the case during the Cold War with Soviet and Eastern Bloc intelligence services, it remains a penchant today among the Chinese intelligence services, to troll the émigrés who have made their way out of those countries. They will go as far as to twist their tails to garner their cooperation as operatives and informants. There is almost an insistence that even having left China, the émigrés must accept China’s iron rule. It may appear to be daylight madness. However, while it is madness, it is happening. Clearly, the Communist Party of China must think it makes sense or they would be acting in this way. In the recent case of a New York City Police Department officer was alleged to be supporting the intelligence activities of the Communist Party of China’s intelligence organ, the United Front Work Department. That case brought to fore the fact that Chinese intelligence services work hard at compelling overseas Chinese to take part in economical and technical espionage, whether through patriotic appeals or simple threats. To be more precise, they will twist the tails of émigrés by threading to harm family members still living in China if cooperation was not provided.

The People’s Republic of China National Security Office in Hong Kong (above). MSS counterintelligence certainly would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning, Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations.

MSS Counterintelligence

MSS shares the counterintelligence role with MPS. The primary mission of organic MSS counterintelligence elements is the infiltration of all the foreign special service operations: intelligence and counterintelligence services, as well as law enforcement organizations worldwide. Its primary targets hands down are its chief competitor, the US, the bordering Russian Federation, and Australia and New Zealand. The advanced industrialized countries of Western Europe would also fall under its watchful eyes although China has not achieved prominence in their space. Second would come Taiwan, India, Pakistan, Nepal, Mongolia, and Iran which it trusts up to a point.  China must also measure its national interests, and particularly its national security against Japan, South Korea, Vietnam, Indonesia, Thailand, the Philippines, Malaysia, and Singapore. China has also stepped up intelligence operations throughout Africa to support and facilitate its effort to extend its geopolitical influence and acquire oil, rare Earth minerals, and fish. Africa is estimated to contain 90 percent  of the entire world’s supply of platinum and cobalt, 50 percent of the world’s gold supply, 66 percent of the world’s manganese, and 35 percent of the world’s uranium. Africa accounts for almost 75 percent of the world’s coltan, which is a key mineral required for the construction of electronic devices, including cell phones. Well over 10,000 Chinese firms are operating on the continent with 25 percent located in Nigeria and Angola. China has also expanded its military presence in Africa, rivaling the level of US military equities there.)

A Difficult Comparison with MI6 Counterintelligence

Making a proper comparison between MSS counterintelligence operations and those of MI6 is difficult due to the fact there are only soupçons to go on with regard to that United Kingdom intelligence service. One aspect of that work already noted here is that counterintelligence responsibilities among the United Kingdom’s intelligence services have been divided between MI5 and MI6. In Nigel West’s Historical Dictionary of British Intelligence (Scarecrow Press, 2014), one of his many superlative reference books on the subject of intelligence, not surprisingly one can find at least some reference to the work of MI6 in that province. As explained in the Historical Dictionary of British Intelligence, in the United Kingdom, counterintelligence is the discipline devoted to penetrating the adversary’s intelligence structure and protecting one’s own organization. (This is significant for a number of other intelligence services take a different approach to the matter. In the CIA and the FBI in the US and in the erstwhile Soviet Union’s KGB and the Russian Federation’s Sluzhba Vneshney Razvedki (Foreign Intelligence Service) or SVR, for instance, counterespionage operations are organic to the work of their organizations’ counterintelligence sections.)  West notes that during World War II, the MI6 counterintelligence section was designated Section V, the romance numeral five being the cause of considerable misunderstanding and confusion for outsiders.

With regard to counterespionage, in the Historical Dictionary of British Intelligence, West notes that responsibility for such operations lies primarily with MI5, although inevitably the Secret Intelligence Service and Government Communications Headquarters as well occasionally encounter evidence of hostile activity and investigate it. During World War II, counterespionage was acknowledged as an interagency discipline that overlapped different organizations and in 1942, was the motive for an attempt at amalgamation, which was ultimately rejected. Following the collapse of the Soviet Union, MI5’s commitments were reevaluated periodically, and the counterespionage branch, designated K in 1968, was absorbed to a new D Branch in 1994 

To elaborate further on MSS counterintelligence, certainly it would do whatever possible to intercept, neutralize, and recruit foreign intelligence officers, as well as their operatives and informants in China and those working in locations close to, and on matters concerning Chinese interests in other countries. As with almost any other counterintelligence organization worldwide, necessary attributes must be present to initiate a counterintelligence investigation on a suspected “foreign spy.” The primary means to confirm their identity is through careful study and observation of the subject and thorough research of all available information. It is a process similar to selecting a target for recruitment. Covert audio and video monitoring in the residences, vehicles, offices, hotels frequented and homes of friends of the suspected foreign spy. Passive collection by informants will also be used to eavesdrop on the individual’s conversations. The surveillance effort may not always be easy going. A foreign intelligence officer’s trade craft may be superb and all of his or her interactions and moves might appear authentic. The foreign intelligence officer’s movement technique could make maintaining surveillance on the subject difficult. For any counterintelligence services, that type of professionalism in an opponent can pose a challenge. Oddly enough though, it will result in increased suspicion among some.

Shifting a bit from United Kingdom intelligence efforts to elaborate more effectively on this point, federal indictments and criminal complaints against MSS foreign intelligence operatives and informants caught in the US indicate that they are generally tasked, as most field operatives and informants of any intelligence service, as intelligence collection requirements demand. As noted in greatcharlie’s August 31, 2020 post entitled, “China’s Ministry of State Security: What Is This Hammer the Communist Party of China’s Arm Swings in Its Campaign Against the US? (Part 2),” from what can be learned from indictments and criminal complaints about such cases that are made public, in almost all of the MSS taskings of those intercepted operatives and informants, certain counterintelligence aspects can be discerned. Those aspects appear aimed at providing ways to assist MSS counterintelligence in identifying and locating foreign intelligence officers, operatives, and informants, particularly in China, or assist in devising ways to intercept, neutralize, and recruit them. Typical counterintelligence aspects in takings that include collecting information on how the US intelligence services communicate with officers, operatives, and informants overseas. In order to develop ways to counter the efforts of US counterintelligence services against MSS foreign intelligence officers, operatives, and informants, MSS counterintelligence would want to know how the organization is set up to confront adversarial networks of spies, who is who, where they are situated, and what exactly are they doing. Understanding the surveillance strategies of US counterintelligence services, particularly the FBI, would inform MSS counterintelligence of what layers of surveillance are usually being pressed on MSS foreign intelligence officers, operatives, and informants in the US and how to devise better ways to defeat them. Technological capabilities would inform MSS counterintelligence whether all along US counterintelligence services have had the capability to monitor its activities or whether they have the capacity and have simply failed to use it effectively. The collection of information on what MSS foreign intelligence has been doing ineffectively in the face of US counterintelligence surveillance strategies and technological capabilities would undoubtedly inspire audits to better assess how closely its operatives were being monitored and how US counterintelligence managed to see a number of MSS efforts straight. (If one were to mine through the US Department of Justice’s very own indictments and criminal complaint against those few Chinese officers, operatives, and informants that have been captured, reading between the lines very closely, one can find to more than few open doors that might lead to successes against existing but well-cloaked Chinese intelligence networks and actors. The particulars of those real possibilities will not be delved into here. Not one case has been a “wilderness of mirrors.” It is hard to know what to make of how things are currently transpiring.)

FBI wanted poster for hackers Zhu Hua (left) and Zhang Shilong (right) of the Advanced Persistent Threats 10 (APT 10 Group) which acted in association with the MSS Tianjin State Security Bureau. In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Cyber attacks are perhaps the most prolific type used against industry advanced industrialized countries. This dimension of Chinese intelligence collection is also perhaps the most aggressive. Hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running operatives and informants. It is a full-fledged  dimension of China’s intelligence campaign strategy.

MSS Electronic Intelligence

In its intelligence campaign against the US, EU Member States, and other advanced industrialized countries, the MSS has taken a multidimensional approach. Three apparent dimensions include: illicit technology procurement, technical collection (cyber attacks), and human intelligence collection. Cyber attacks are perhaps the most prolific type used against industry advanced industrialized countries. This dimension of Chinese intelligence collection is also perhaps the most aggressive. Hackers locate doors that they can rapidly pass through and grab whatever might be within reach. It is by no means a supplemental or mere attendant method of espionage relative to running operatives and informants. It is a full-fledged  dimension of China’s intelligence campaign strategy. If human intelligence were the only focus, constraints on manpower resources would always be a big problem to overcome. Cyber collection complements all other forms of attack well. Typically, Chinese spokespersons from the People’s Republic of China Ministry of Foreign Affairs or the Communist Party of China, itself, will issue declarations seemingly designed to create the false impression that China was engaged in a lex talionis of allegations with the US on cyber espionage. Perchance the aim in doing so was to distract the world from the reality of its one-way abusive and criminal cyber attacks to obtain classified information from the federal government, intellectual property from private firms, and research from academic institutions in the US.

When GCHQ Was Part of MI6

For a time, MI6 also enjoyed having an organic technical surveillance capability. That technical surveillance capability today resides in an independent intelligence agency known as the Government Communications Headquarters (GCHQ). GCHQ grew out of the Government Code and Cypher School (GC&CS), established in November 1919. During the 1920s and 1930s, GC&CS had considerable success in its efforts to decipher German and Soviet transmissions. Once Nazi Germany acquired the Enigma machine, with its apparently unbreakable ciphers, in the late 1930s, GC&CS greatly stepped up its efforts. In August 1939, just before war broke out in Europe, it moved its headquarters to Bletchley Park outside London. There its cryptanalysts undertook Operation Ultra, the breaking of the Enigma cipher—a project whose details remained classified until the 1970s. Renamed the Government Communications Headquarters in 1942 to conceal its activities, this leading communications intelligence agency of the United Kingdom. Through GCHQ, MI6 enjoyed a number of successes during World War II, most notable among them being the Ultra program to break German Enigma ciphers. Today GCHQ functions similarly to the US National Security Agency (NSA) Working in coordination with the NSA during the Cold War, it greatly escalated its efforts. Reportedly, it participates in the Echelon global surveillance network. Much of what is known about how GCHQ is organized was provided publicly in James Bamford’s famous 1982 book on NSA, The Puzzle Palace (Houghton Miflin Harcourt, 1982). Knowing how GCHQ is organized allows one to infer with at least some degree accuracy, how it functions. According to Bamford, GCHQ at that time had six directorates. Among these were the Composite Signals Organization, dedicated to radio intercepts; the Directorate of Organization and Establishment, whose functions were chiefly administrative; the Directorate of Signals Intelligence Plans, concerned with long-range planning and management; and the Joint Technical Language Service, which intercepted foreign communications. Bamford stated that the largest and most secretive directorate, the Directorate of Signals Intelligence Operations and Requirements oversaw codebreaking activities. 

Returning to the discussion of MSS technical collection, it can include the use of high-tech tools covering phone calls and all forms of messaging to relatively low level actions against electronic equipment such as mobile phones and computer networks. While technical intelligence collection, cyber attacks by Chinese intelligence services upon targets in the US, have been deplorable, the skill displayed and their list of accomplishments has been impressive. What have essentially been standard targets of cyber attacks from Chinese intelligence services in recent years have been those levelled against US national security decision makers and government organizations, particularly during the Obama administration. The objective of that targeting has been to access any classified information they might possess. Through that information, MSS would surely hope to develop insight into highly sensitive US national security decisionmaking processes.

MI6 in the Political Realm: A Bad Mix

There is much beyond the controlled bearing, composure of MI6 officers and the organization itself. From what has been revealed, their efforts have been defined by hard work, establishing solid foundations, diligence and forethought, practicality and organization, determination and dependability, passion and drive. Creativity is combined with thoughtful effort and hard work to manifest positive energies, opportunities and results. 

As aforementioned, the Ministerial Committee on the Intelligence Services exercises regular ongoing oversight of intelligence activities. Through this committee, the Prime Minister, with the assistance of the Secretary of the Cabinet, exercises authority over the daily operations of the British intelligence and security communities as a whole. MI6 answers to the Foreign and Commonwealth Secretary. The Foreign Secretary receives assistance from the Permanent Secretaries’ Committee on the Intelligence Services. Finally, the Joint Intelligence Committee draws up general intelligence needs to be met by MI6. It also prepares National Intelligence Estimates.

As with officers in MI5, speaking truth to power is also the charge entrusted to leaders of MI6. Yet circumstances have often been complicated enough to spoil adherence to that. One might say how MI6 has performed, has really boiled down to leadership. Indeed, the intelligence services may have figuratively been wonderful horses but the chief or key senior executives–no names here–may have been less-than-perfect jockeys in matters of high policy. Admittedly short on specifics of such cases here, yet with all conspiracy theories aside, it may be enough to say the resources and capabilities of MI6 allegedly have reportedly  on certain occasion been used by political leaders to turn a situation that might not necessarily stand in their favor due to interests beyond those urgent and important to the United Kingdom. Some believe it was really seen during the Iraq War when the United Kingdom followed the US into the whole affair which was unfortunately founded on false intentions,  namely weapons of mass destruction were being produced by the regime of the erstwhile Iraqi President Saddam Hussein. Tragically, MI6 became the alleged coauthor and signatories to misleading information

When misgivings and disfavor might have been expressed what may have been proposed from the top, it may have been the case that  the powers that be would brook no denial. Those too concerned of their position or being politically indebted, might have seen themselves with little option but to follow orders. Those who see themselves as pragmatists, may explain away a decision to go along thoroughly with a suggestion from on high as an effort to simply adapt in a shifting world. They may not have seen themselves as keepers of some sacred flame. The fatal mistake occurs when the choice is made to play along thoroughly. No proper MI6 or MI5 officer would be expected to shrink at the last. If the organization’s leadership had decided to disappoint the political leadership, they might not only have been forced to surrender the coveted privilege to serve their country in the intelligence services. To many in the intelligence service, that idea would be anathema. Such thoughts likely broke through any defenses their minds raised against them. Additionally, after their departure they might find the whole force of the state on his or her back. L’homme c’est rien—l’oeuvre c’est tout.

Assuredly, Parliament, which provides oversight of MI6, has a process for ascertaining the truth about such matters. The principal oversight committee for British intelligence is the Central Intelligence Machinery, based in the Prime Minister’s Cabinet Office. It oversees the coordination of security and intelligence agencies. It also acts as a mechanism for assessment and accountability, observing and reporting on the performance of specific agencies. Further, it more directly intelligence operations as it is also concerned with tasking and the allocation of resources.

To discuss such issues concerning MI6, even if it is just a part of a mere commentary on MSS, is to walk out on shaky ground given many who may read this post may be invested in maintaining the image of the organization and may have previously been invested heart and soul in its work. While admittedly greatcharlie has sought to be sensitive to the concerns of those readers, doubtlessly, the soupçons discussed here will still be an issue of contention in some quarters and there will surely be those disposed to quarrel most bitterly over it. All the same, what is opined here is only what has been publicly discussed by those familiar with the issue. To that extent, not being aware first-hand of it all, greatcharlie would not like to swear by it.

There is no legal “right to know” what is undertaken abroad in the name of the United Kingdom’s security, what it costs or how it is run. Reportedly, beyond mere concerns exposing any classified information about MI6, to write about MI6, even today, risks harassment and prosecution. Former members and current commentators are fully aware of this and have complied thereby allowing the organization to remain beyond any educated public scrutiny. In the past, any dissident reports of its operations were effectively snuffed out. The agency has the power to censor news accounts of its activities through the use of “D” notices under the Official Secrets Act. As one might imagine, this reality does not sit well with the citizens of the United Kingdom. There is a perception among many in the United Kingdom that such behavior brings the organization more closely in sync with that of MSS, an organ of an authoritarian government, than it should in a free society. Civil rights groups and average citizens argue that the policy of total should be reconsidered and scrapped, should not be disparaged as rubbish in any quarter.

Meeting of the Politburo of the Communist Party of China (above). Changes in both competency and necessity have favored an increase in MSS influence in foreign policymaking. One change was the decision of the Communist Party of China wanted MSS looking further abroad than minority groups on China’s periphery. Another change was the expansion of Chinese interests abroad. The real threats to China were no longer seen as coming from traditional internal security concerns but from countries capable of stopping China’s access to trade. By successfully building up its foreign intelligence capabilities to meet this challenge, MSS managed to increase its influence and favor with political authorities. Apparently, it was understood in the Communist Party of China that foreign intentions can best be monitored and resolved with intelligence.

MSS in the Political Realm

MSS was stood up to rectify the deficiencies of the previous iterations of the intelligence function in the Chinese national security apparatus. With its inception, MSS added new dimensions to China’s foreign intelligence scheme while freeing MPS to revamp existing capabilities and explore and adapt a new as well as more technological set of cards to play in the intelligence game so to speak. MSS represented a reimagination of the intelligence collection process abroad and the counterintelligence struggle against outside powers. MSS also represented the tidying up of old ways of conducting its business, and a modernization of Chinese intelligence that was long overdue. The MSS generally appears to have adhered to the non-politicization  of the service. This is not to say that occasionally shifts away from that position by some senior executives has not impacted the organization. MSS elements, particularly at local levels, often have provided protection services for the business dealings of Communist Party of China officials or their well-connected friends. However, the Ministry rarely appears connected to any elite political maneuvering or purges. Since 1983, only the purges of Beijing Party secretary Chen Xitong (1995) and Shanghai Party secretary Chen Liangyu (2006) were rumored to involve the ministry. In the wholesale purges after the fall of Bo Xi laid and Zhou Yongkang, the Beijing State Security Bureau chief Fangfoss Kent and Vice Minister Qiu Jin were ousted precisely because they exploited MSS resources to back particular leaders in their political struggles against each other.

Of course, the foreign policy influence of intelligence services depends on the quality of their inputs and their leadership’s influence with key policymakers. If an intelligence chief is not influential, then his service’s influence depends on performance. The MSS’s role in policymaking could be rising as China’s overseas interests expand. When China entered the World Trade Organization (WTO) in 2001, the thought was that there would be an influx of foreign business into China. That was a concern. At the time, the response was to make greater use of MPS. However, changes in both competency and necessity have favored an increase in MSS influence in foreign policymaking. When direct political power is absent, influence usually relates to merit and necessity. Senior foreign policymakers would eventually want the MSS in the room, contributing to the discussion. The Communist Party of China’s leadership wanted an MSS looking further abroad than minority groups on China’s periphery. The MSS’ foreign intelligence service is now more similar to the CIA. Another major change was the expansion of Chinese interests abroad. The real threats to China were no longer seen as coming from traditional internal security concerns but from countries capable of stopping China’s access to trade. Apparently, it was understood in the Communist Party of China that foreign intentions can best be monitored and resolved with intelligence. By successfully building up its foreign intelligence capabilities to meet this challenge, MSS managed to increase its influence and favor with political authorities. Indeed, MSS has managed to move from backstage, second to MPS, to frontstage, up from behind its bureaucratic competitor in internal security.

III. Coming Reality for Visitors to China

For an more efficacious explication, the comparisons in this section of the discussion shift from an examination of United Kingdom and People’s Republic of China intelligence organizations and activities, to mainly comparisons of US counterintelligence and those of both MPS and MSS counterintelligence efforts using informants and the impact a ratcheting up of counterintelligence activities particularly on mainland China will likely be experienced by foreign visitors, particularly those from the West. Indisputably, the Communist Party of China’s line on the coronavirus pandemic clashes with the truth. So far, there has been no grand conversion of the world to its point of view. As touched on earlier, it surely raises a few hackles within the relevant bodies of the Communist Party of China whenever Chinese citizens–scientists and doctors working on the coronavirus for instance–behave as if there is a choice of who they would prefer to alienate, their own Chinese or the US government and worldwide human rights activists. We live in an ordered universe and expect everything to follow that design. 

In The Crisis V, Thomas Payne, the orator and American Revolutionary explained: “To argue with a man who has renounced the use and authority of reason, and whose philosophy consists in holding humanity in contempt, is like administering medicine to the dead, or endeavoring to convert an atheist by scripture.” No matter how the West and particularly the US decided the address matters related to the coronavirus with China, one can be assured that an undesirable situation will be created by the Communist Party of China’s leadership. At least for a period, a very tense atmosphere will exist for employees and members of all types of organizations and private foreigners who travel or reside in China and those outside of China who for whatever reason may have contact with counterparts from China. They should prepare to cope with increased pressures and discomforts.

To expound further on a point raised earlier, what should be of great concern is what approach the MPS may take toward foreign visitors. Foreigners are always closely investigated by the local MPS. Under such unfortunate circumstances as the coronavirus fracas with West, the real possibility that some, including US citizens, might be arrested or “briefly” detained for questioning, having done nothing that ordinarily would hardly warrant such treatment. Indeed, US visitors could regularly become the center of frightful international incidents at the hands of authorities. Regardless of one’s status in the US, it can happen in China. Believing that the Western Capitalist drive for markets is so strong, and desire for profits so considerable, the Communist Party of China would surely be willing to test the theory that the US and other Western firms heavily invested and enjoying business in China would do nothing rash in the face of inordinate investigations, interrogations, and short-term, repeated, detainments of line employees, managers, and executives. Communist Party of China leaders would insist that such foreign companies do more to change the US and other Western government’s stances toward China on the coronavirus and perhaps even trade. Considerable evidence that China is willing to engage in this type of “hostage diplomacy” despite claims of wanting to be the dominant power on the world stage. One can imagine what type of world that would be. In an informative October 20, 2020 Axios article entitled “China Embraces Hostage Diplomacy,” a chilling snapshot is provided of a few publicly known cases in which Beijing has detained foreign citizens unless their home governments acquiesced to its demands.

The Beijing Municipal Public Safety Bureau Office Building (above) MPS counterintelligence officers will regularly collect and closely review reports on a foreigner’s behavior via informants among neighbors in the vicinity of their residence and locals among colleagues at work. They would be interested in knowing if they have engaged in behaviors that would make them open to recruitment. Their attitudes toward China and its system would be important. The friendships they have made would be of interest. Assessments of what type of temptations could be used to bring them to China’s side will be based on observations of the foreigner’s lifestyle. MPS officers have no qualms about exploiting individual weaknesses.

Informants

In domestic intelligence operations, informants are a most valued weapon to use against an adversary’s intelligence operations. In an authoritarian country as China, informants are also a valued weapon for the same reason, but it is also a tried and true way to monitor the population and monitor foreigners. 

In the West

As it stands today, bread and butter operations of Western intelligence services, even in the US, rely heavily upon the work of both agents–or operatives–and informers. As explained previously, agents actually engage in activities on behalf of an intelligence service. Informers, such as those discussed here, are used mainly for surveillance of targets of an investigation. Many US citizens will for the most part give pollices premiere to the intelligence services. (The US in particular has come a long way from the days of the post-Vietnam era and years before when citizens would stand together to question federal government decisions and actions on national security.) To act against a foreigner, is now more typically viewed as a patriotic duty. The foreigner is as the adversary and “the other.” In the US, to surveil another citizen might cause pangs of anxiety for some as there would be the real possibility of violating the 1st Amendment and Fourth Amendment rights of a fellow citizen under the Constitution. However, that can often be mitigated by payments and by assurances that the subject will never know he or she is being surveilled. Moreover, if the fellow citizen who is the subject of the surveillance can be convincingly connected, not necessarily correctly or truthfully, to a foreign intelligence service, usually the informant will accept watching the target as a cause they can get behind. To that extent, it will be reasoned to be a necessary sacrifice of morality. Ethical implications are also raised when the subject of an investigation may be a member of a racial or ethnic minority. Existing biases of the informant can fall into mix. Problems encountered can be overzealousness on the part of the biased informant, even aggressive behavior. For the most part, there is little to no vetting concerning such issues. Problems that arise are largely ignored at least by US counterintelligence services.

There is a romanticized view that many informants hold about working with official men and women, that gives the average citizen a sense of being someone special. Although the bulk of what they may know about spying may be sourced from fiction novels and Hollywood, they view themselves proudly as being part of the secret world. There is a curious type of dignity that secrecy confirms for some. They perceive themselves as being separate from the crowd, and what could be called an ordinary existence. When they talk to family and friends, pass other citizens in the street, they revel in the idea of knowing something they do not. That inflated sense can be exploited to encourage them to do more, behave more aggressively toward the target of their surveillance, than they might have if thinking clearly. It can also lead to a sense of entitlement in wrong headed thinkers, that must be curbed by issuing them strict parameters for behavior while serving in legal terms as “agents” for an intelligence service, even if working through contractors. When being told the plan for surveillance, often in many there is a sensation felt. The larcenous part of the citizens heart is stirred. As noted, informers are paid for their service. The payments can also become an  Since they are usually provided considerable pay for very little work, an eagerness builds for more surveillance work and more easy money. To that extent, surveillance work becomes intoxicating for some. Interestingly enough, payments become a self-generating locus of control that the counterintelligence officer can hold over the informant. 

A scholarly basis for understanding such behavior by citizen informants in a Constitutional Republic as the US is provided by Martha Stout in The Sociopath Next Door (Harmony, 2006). One can easily take from Stout’s work that there are quite a few people given the opportunity, who will routinely act against the common good. She notes that conscience does not exist without an emotional bond to something or someone. There is a desire to make others jump, to be in control of them. (This is quite different from 19th century German philosopher Friedrich Nietzsche’s concept Der Wille zur Macht (The Will to Power), the desire to exercise authority over others was a conscious or unconscious driving force in all humans. Stout limits the desire to some, not all.) which he asserted was The actions that the informant is typically asked to take during a surveillance effort encourages me-first attitudes devoted to the pursuit of domination. There is a refusal to acknowledge responsibility for the decisions they make, or for the outcome of their decisions. There is an inability to understand what a wrongful target of the surveillance effort imagine was very likely feeling. A month before being killed in Bergen-Belsen concentration camp in 1945, Anne Frank wrote in what would be published as The Diary of a Young Girl (Doubleday & Company, 1952): “How noble and good everyone could be if, at the end of each day, they were to review their own behavior and weigh up the rights and wrongs.”

With regard to the motivations of those who undertake the role of informant, some research has been done. In a February 1997 article in Intelligence and National Security entitled, “Cold War Spies: Why Why They Spies and How They Got Caught,” authors Stan A. Taylor and Daniel Snow use the acronym MICE to account for common motives of those US citizens informing for the Soviet Union during the Cold War. MICE is abbreviation formed from money, as noted earlier, ideology, compromise or coercion, and ego. Taylor and Snow added that other influences include excitement and revenge. Crucially, they suggest that: “no human act is ever motivated by a single factor.” The mix of motivations between agents and informers ensures that there will always be individuals who will inform. (In previous posts, greatcharlie has used a slightly different interpretation of the MICE acronym, indicating that it referred to, money , ideology, conspiracy, and excitement. Perhaps much as greatcharlie’s editor, the blog’s interpretation admittedly is a tad rustic.)

It should be noted that during the Cold War the use of human informants to surveil subjects of investigation was increasingly supplemented by technical means of surveillance, particularly electronic eavesdropping tools. Today, informants engaged in surveillance essentially complement or depending on the case, actually supplement collection efforts using electronic tools. Such tools at a basic level can provide a window onto usage of hundreds of millions of computers, routers, fitness trackers, modern automobiles and other networked devices, known collectively as the Internet of Things (IOT). The whole process took a huge step forward following the September 11, 2001 territory attacks in the US, which led to the 2001 USA Patriot Act that opened the door to the acquisition of telephone data by the then new Department of Homeland Security and other government agencies to include: the National Security Agency, FBI, and CIA. The authorization granted federal agencies to intrude on the privacy of citizens under the legislation of the Patriot Act, and continued in the annual National Defense Authorization Act by fate having come into being concurrently with developments in the technology of smartphones, IOT devices, digital circuit board dependent autos, and all the many household devices now with MAC wireless access addresses, meant surveillance could be taken to a level very likely unimaginable to those who drew up those laws in 2001. Artificial Intelligence, machine learning, neural nets everywhere, and massive government data processing power will doubtlessly result in the development of additional surveillance technologies that can only be imagined now. Placing the growing tools of surveillance and the power to use it in possibly the hands of errant US counterintelligence officers and contractors, who could use them to thwart the rights of citizens guaranteed under the US Constitution should be the cause for some alarm.

In China

As mentioned, the foreign visitor is always a potential target for province and municipal offices of MPS and MSS. The capability of Chinese authorities to use technological means to keep a close eye on foreigners and detect, apprehend, and deal with those who protest and oppose the government has recently been enhanced immensely. Two sensational articles in the New York Times, “A Surveillance Net Blankets China’s Cities, Giving Police Vast Powers” dated December 17, 2019, and “Inside China’s Dystopian Dreams: A.I., Shame and Lots of Cameras” dated July 8, 2018 well lay out the increased use of technology in MPS and MSS surveillance efforts. Reportedly, as part of Xi’s effort to have the security services take on a greater role in China, he has launched a major upgrade of their surveillance capabilities. China, as a result,, has become the world’s largest market for security and surveillance technology. It is reported that almost 300 million cameras have been installed in the country. Government contracts are supporting research and development into technologies that track faces, clothing and even a person’s gait. MPS officers on the beat have been observed using experimental gadgets such as facial-recognition glasses. In Zhengzhou, police and security services can use software to create lists of people. They can create virtual alerts when a targeted  individual approaches a specific location. They can acquire updates on people every hour or every day, and monitor anyone with whom those people have met, particularly if there exists a report that one or both individuals have committed an infraction.  Yet, while the new technology may ostensibly provide police and security services with a way to track criminals, it also improves their means to crack down on sympathizers of the protest movement in Hong Kong, critics of the Communist Party of China, and critics of the police and security services, themselves. Worse, it better enables the police and security services to target migrant workers who travel from the countryside to fill China’s factories and ethnic minority groups as the Uyghurs.

On the street, the surveillance of foreigners will typically be relatively light, calibrated to ensure utilization of an optimal number of officers and informants in the role of surveillance operatives in the field. Doing so also facilitates the monitoring process. The more surveillance one uses the more reports that must be reviewed to find one aggregate picture of what occurred. MPS counterintelligence officers will regularly collect and closely review reports on a foreigner’s behavior via informants among neighbors in the vicinity of their residence and locals among colleagues at work. They would be interested in knowing if they have engaged in behaviors that would make them open to recruitment. Their attitudes toward China and its system would be important. The friendships they have made would be of interest. From the reports of informants and technical surveillance, assessments of what type of temptations could be used, if necessary, to bring them to China’s side based on observations of the foreigner’s lifestyle. 

For citizens of the People’s Republic of China, the motivations of money ideology, conspiracy, and excitement do not factor in such a decision to come to call of their country’s intelligence services. The law requires them to do so. If any motivations at all could be said to factor in a Chinese citizen’s decision to obey the direction of an intelligence service, expectedly the Communist Party of China would list faith and adherence to the ideals of the Communist Revolution, the Communist Party of China, patriotism, and the homeland. Supposedly, revolutionary zeal drives the heart of China as one beating heart so to speak.

The National Security Law of the People’s Republic of China, as adopted at the 15th session of the Standing Committee of the Twelfth National People’s Congress declares under Article 9 that in maintenance of national security, priority shall be given to prevention, equal attention shall be paid to temporary and permanent solutions, specialized tasks shall be combined with reliance on the masses, the functions of specialized authorities and other relevant authorities in maintaining national security shall be maximized, and citizens and organizations shall be extensively mobilized to prevent, frustrate, and legally punish any conduct that compromises national security. Article 11 decrees that there will be no tolerance shown for the failure to meet one’s obligation to maintain national security. The article states: “All citizens of the People’s Republic of China, state authorities, armed forces, political parties, people’s groups, enterprises, public institutions, and other social organizations shall have the responsibility and obligation to maintain national security.” Authorities in China understand that extraordinary powers are entrusted in the hands of many, such as MSS officers, who work on national security matters. Contractors, and even informants, who might work on their behalf are placed under the same scrutiny. Those who have attempted to cross the Chinese government have faced stiff reprisals. The shadow of sudden death can hang over the head of any individual arrested for such betrayal. As stated under Article 13: “Whoever as an employee of a state authority abuses power, neglects duty, practices favoritism, or makes falsification in national security work or any activity involving national security shall be held liable in accordance with the law.” The article further declares: “Any individual or organization that fails to fulfill the obligation of maintaining national security or conducts any activity compromising national security in violation of this Law or any relevant law shall be held liable in accordance with the law.” The furtive work of Chinese citizens at home and abroad under the direction of the MSS does not need to be without guerdon. As explained under Article 12: “The state shall commend and reward individuals and organizations that have made prominent contributions to maintaining national security. The 19th century philosopher, logician and writer of the United Kingdom, Bertrand Russell, explained: “Neither a man nor a crowd nor a nation can be trusted to act humanely or to think sanely under the influence of great fear.”

The foreign businessman, scientist, engineer, academic or any other type of professional  working closely with a Chinese counterpart in China may not be aware that he or she is being monitored by that same friendly colleague. It should be expected. When told, it may be so emotionally shocking to outsiders  that it may very well be near impossible to believe. Perhaps refusing to accept that reality is the only way a foreigner can continue to function comfortably in China. In any event, it is the responsibility of the Chinese citizen to engage in such activity under the National Security law. To that extent, friendship with Chinese colleagues may never be authentic as there is an element to the interaction between the foreigner and the Chinese citizen that is cloaked. China comes first. The foreigner is inconsequential to that reality. Ordinary people doing a little this and a little that for the MPS as well as the MSS is a  norm.

Although it has not been a commonplace problem, if a foreigner visiting China for the purpose of business or tourism, accepts recording devices or recorded materials without knowing what they contain, the traveler might discover quite surprisingly that he or she is carrying items that contain sensitive data the possession of which could be considered criminal. Without a shadow of doubt, the illicit materials would have been presented to the traveler intentionally, perhaps even by a Chinese citizen with whom the traveler may have a positive personal relationship, almost certainly at the behest of MPS or MSS. (Given the uncertainty of what may result from contact with Chinese intelligence and counterintelligence units, ordinary Chinese citizens typically will not seek out contact with them nor independently engage in activity with foreigners outside of the workplace on matters related to their work. They will focus true personal relationships on personal matters, human interests.)

To defeat this problem, one must also be very cautious about accepting documents, notebooks, and books, or any devices, thumb drives, dvds, or materials that may include video or audio recordings unless one can be absolutely certain as to their contents. Documents contained in any of these media may prove to be state documents concerning confidential matters, and not any run-of-the-mill confidential matters at that. One must immediately open the documents and read them or use a laptop or tablet to kindly and respectfully review the recordings posthaste in what could be passed off as a display of ebullience and appreciation of the gift and wonderment about what it holds.

The Shanghai Public Security Bureau Office Building (above). The foreign businessman, scientist, engineer, academic or any other type of professional  working closely with a Chinese counterpart in China may not be aware that he or she is being monitored by that same friendly colleague. It should be expected. When told, it may be so emotionally shocking to outsiders  that it may very well be near impossible to believe. Perhaps refusing to accept that reality is the only way a foreigner can continue to function comfortably in China. In any event, it is the responsibility of the Chinese citizen to engage in such activity under the National Security law. To that extent, friendship with Chinese colleagues may never be authentic as there is an element to the interaction between the foreigner and the Chinese citizen that is cloaked. China comes first. The foreigner is inconsequential to that reality. Ordinary people doing a little this and a little that for the MPS as well as the MSS is a norm.

Celebrity tourists, Hollywood actors, athletes, singers, dancers, any other performers, novelists, poets, sculptors, painters, documentary filmmaker, celebrity chefs, as well as any other professionals interested in visiting may often unknowingly be surrounded by throngs of MPS officers and operatives posing as aficionados and curious onlookers. Ordinary citizens observed engaging in an unauthorized display of interest in such personalities by security officials, might be judged as being too appreciative of Western bourgeois amusement, and they could place themselves under suspicion by authorities. For such reasons, the overwhelming majority of Chinese citizens would be extremely hesitant or even more, absolutely avoid being seen behaving that way. (Of course, this does not mean that average Chinese citizens would not harbor very positive thoughts about such Western visitors and that they would not draw their interest.)

One might posit that those types of choreographed mass movements of some likely mix of officers and Chinese citizens recruited impromptu to be surveillance operatives by MPS or MSS managers, helps to create a strong band of security around the foreign visitor. Despite such sanguine, a malign aim of Chinese authorities to create the opportunity to detect any effort by citizens to contact or transfer messages or items of any kind to the foreigners. Oddly enough such mass movements are the envy of some novice, errant US counterintelligence officers. Having been fed a steady diet of film, television, streaming television, Netflix, YouTube, Facebook, and Instagram since their youth, many US counterintelligence officers would relish the sensation of directing their own surveillance operatives to create something akin to the Chinese style of mass surveillance, the real draw for them being that it so resembles a fairly common surveillance scene in banal Hollywood spy dramas in which screenwriters and directors depict US intelligence officers wielding such control, such power, that they would convert an everyday happening–crossing the street, ordering coffee in a cafe, or shopping in store–into something exciting or extraordinary. Not to be beastly with the US intelligence and counterintelligence services and law enforcement, but in fact, errant US counterintelligence officers, perhaps forgetful of their true purpose, often attempt to accomplish this similarly at street corners, in stores, museums, parks, and other public spaces in the US, even at the risk of spoiling the surveillance. They may here and there have some success with keeping the targets of such stunts completely unaware that they are being surveilled. Still, for those targets who are aware that they are being surveilled, the so-called movement techniques of a mix of counterintelligence officers and ill-trained contract surveillance operatives on the street, will typically seem strange, harassing, and even comical. When made aware that the surveillance that they designed was burned, they would doubtlessly, yet perhaps successfully, conceal the truth from their managers and continue on as if nothing had happened. It is very unlikely that such activity using taxpayer dollars has ever generated the ego boost that errant US counterintelligence officers, who would do such, likely seek. Mi rattrista una si piena cecità! (Such utter blindness grieves me deeply!)  

Intelligence officers and managers of the various Chinese intelligence services operating in the US, observing such activities–rest assured they are always studying “their opponents” and the environment in which they are work–surely gaze stoically in amazement at the extraordinary misuse of personnel, time, energy, finances, and other resources to orchestrate such a “Keystonian” display that is immaterial to their mission, bewildered over their very apparent insouciance for their important jobs and disregard of their duty to country, the absence of a sense of honor, and perhaps wondering what type of mental disorder had befallen US counterintelligence officers executing it. They would very likely wait until they got back to the office, operating base, or back to the main headquarters and have a good chuckle about what they witnessed before beginning a meeting on the tally of technologies MSS operations have acquired from US firms or universities, how many new technologies have been identified for theft, and the unlikelihood that their officers and operatives could be stopped from doing so.

Attempting to defeat the capability of MPS and MSS to provide near blanket surveillance while in China under such circumstances would be extremely difficult if not impossible. Doing so successfully would be akin to hiding from water in the ocean. The fact that its present may aggravate, but as long as it stays light, things should be alright if as mentioned, one takes special care with regard to personal behavior and interactions with professional counterparts. One must make it a point to comport oneself appropriately, cautiously with staff at accommodations, restaurants or locations for recreation.

In addition to guarding against making statements about the Chinese government or details about one’s work to Chinese citizens who are friends or close acquaintances to protect oneself, one must guard against such actions to protect them. Surely, it would put Chinese citizens who are friends or close acquaintances in the dreaded position of reporting your statements or face the danger of not reporting them and later discovering that through some electronic means or citizen surveillance operative passively collecting information, the statements were picked up. They may very well be held accountable for failing to report any foreigner speaking in such ways.

NBA superstar LeBron James (above) enters the arena for a preseason exhibition game in Shanghai between the Los Angeles Lakers and the Brooklyn Nets in 2019. Some official exceptions in Beijing concerning foreign visitors are most often allowed for visiting foreign athletes. A good example of such an exception would be players, coaches, and executives of the National Basketball Association (NBA) from the US. Indeed, NBA players, in addition to being athletic ideal, representing the best in international athletic competition, are welcome due to the very cooperative attitudes and actions of the NBA executives toward the Chinese government and favorable impression visitors from the NBA have created with responsible State Council bureaucracies, the National Party Congress, and especially the Communist Party of China. Still,  such positive attitudes held about NBA personnel among the ruling class in China would not exempt them from continuous surveillance by the MPS and MSS.

Some official exception in Beijing concerning foreign visitors is most often allowed for visiting foreign athletes, particularly superstars in their sports. Sports and international athletic competition are highly endorsed by the Communist Party of China. A good example of such an exception would be players, coaches, and executives of the National Basketball Association (NBA) from the US. Indeed, NBA players, in addition to being athletic ideals, representing the best in international athletic competition, are welcome due to the very cooperative attitudes and actions of the NBA executives toward the Chinese government and favorable impression visitors from the NBA have created with responsible State Council bureaucracies, the National Party Congress, and especially the Communist Party of China. Doubtlessly, reports produced from information collected by their country’s domestic intelligence, counterintelligence, and law enforcement informants have been very pleasing to them. However, such positive attitudes held about NBA personnel among the ruling class in China would not exempt them from continuous surveillance by the MPS and MSS.

The Human Mind and the Incomprehensible

Unusquisque mavult credere quam iudicare. (Everyone prefers to believe than to think.) One might imagine some would find it far easier, less unnerving, to remain blissfully unaware that in traveling to China they would, or have been, immersing themselves in such an environment. Many who may frequently travel to China for business or leisure may insist that they never encountered any problems with surveillance or other intrusions by the Chinese government. Perhaps that could be attributed to the excellent tradecraft of surveillance those individuals have unknowingly encountered. True art is to display no art. However, it more likely may be the result of a total lack of unawareness, intelligence and counterintelligence tactics, techniques, procedures and methods and were figuratively blind to the surveillance activity that may have regularly unfolded all around them. One surely should not look upon the matter with humor. MPS officers take the surveillance of foreign visitors very seriously, and that work is among its main activities aimed at intelligence collection. Suffice it to say the MPS does not equate any of the work to some enthralling battle of wits with foreign visitors, with aim of revealing the superior intellect. That would too much resemble the thinking of lower tier federal intelligence and counterintelligence and law enforcement officers and their contractors engaged in surveillance in the US, who too often approach their work from a personal perspective and with an apparent ax to grind and whose thinking about their work is apparently uncoupled from the greater scheme of US national security.

Security offices of any Western firms whose executives and staff frequently visit China should have long since arranged opportunities to brief those employees on problems they could possibly face in China. Such briefings might include the discussion of ways to subtly execute defensive measures to defeat MPS, MSS, PLA Joint Staff Department human intelligence groups, and any Communist Party of China intelligence organs (e.g., the Chinese People’s Political Consultative Conference, the super secret and malignant International (Liaison) Department, the United Front Work Department, and the Propaganda Department) from capturing information that meets their organizations’ immediate intelligence requirements as well as whatever information that managers of those spy organizations may deem useful otherwise. Quemadmodum perniciosior est hostis fugientibus, sic omne fortuitum incommodum magis instat cedenti et averso. (Just as an enemy is more dangerous to a retreating army, so every trouble that fortune brings attacks us all the harder if we yield and turn our backs.)

The Way Forward

As indicated in its introduction, this post serves as an expatiation of a technique learned long ago for directing one’s thoughts upon developing ideas and insights on issues in international affairs and other subjects of interest. Given its subject matter, it hopefully managed to satisfy the experienced scholar, academic, and policy analyst. By showcasing the generation of ideas and insights on subjects, hopefully it satisfied the desire of students to see examples and will become a subject of inquiry for some. 

By their very nature, insights are inherent to the writer, unique in that way. At least, they should be. No truer are the words, “everyone is entitled to an opinion.” The ideas and insights of the novice writer have a right to be aired equal to that of experienced, published authors in the various fields. Note, however, that eccentric, whimsical, and outlandish ideas are seldom useful and never desirable. In some respect, the process of generating ideas and insights is a form of self-exploration. One’s mind must be open to all reasonable considerations and all plausible possibilities. Nontraditional students should try to apply sensibilities shaped by a multitude of experiences. The length and breadth of their knowledge and experience may allow for a broader understanding of humanity. That is what the world will most appreciate reading.

Saepe stilum vertas, iterum quae digna legi sint scripturus. (Often must you turn your pencil to erase, if you hope to write something worth a second reading.) It is perfectly in order to feel a bit timid about drawing inferences and sharing them for others to review. Accept those awkward feelings, but write down all of the ideas and insight that may develop inside anyway. Have at it! To enhance one’s ability to summon up new ideas and insights, study, understand, and consider the deeds of personalities. Ruminate on events in relation to those that proceed them and meditate on what the future may bring. Build on that thinking. Strive to forecast decisions that may shape what might come and proof one’s efforts by watching events unfold in the news. Some of the best ideas and insights may come at inopportune times. Whether one is struck with a coruscating flash of logic, or has a nagging thought on an issue that builds throughout the day, notes must be kept of it all. At one’s earliest convenience, write those ideas and insights down in a notebook, on a pad, or on the back of an envelope. If one can, type them up on an electronic device. Organize them as bullet points if that is easier, however, one must make certain that enough is recorded to ensure that actual ideas are being expressed and that they “feel” compelling. Avoid simply jotting down statements of fact, or worse, simple fragments of your thoughts. State your conclusions about matter! Each expression can be fleshed out and tidied up with editing later. Sticking to this course may not be easy at first. After a time and with honest effort, one should become accustomed to it. Optimally, a writer will effectively generate enough ideas and insights to allow for the selection of more reasoned, potent, and eloquent among them for inclusion in a draft essay. The ability to increase quantity and improve the quality of ideas and insights produced will come with practice. Plus novisti quid faciendum sit. (You have learned more what has to be.)

A Look at Stephen Marrin’s “Improving Intelligence Studies as an Academic Discipline” and Remembering a Professor and Friend, Roger Hilsman

Stephen Marrin says literature in intelligence studies must be compiled and evaluated in a structured way for it to become aggregated and made cumulative as the literature of other academic disciplines. Intelligence studies writers today often overlook past practitioners’ works. Marrin says contributions by Roger Hilsman (above) are among those overlooked. Hilsman was this author’s professor, faculty advisor, and friend during undergraduate and graduate study. Due to the fact it is edifying and thought provoking, and due to sentiment over a generous professor, greatcharlie.com has presented Marrin’s article to its readers.

In February 2016, Routledge, part of the Taylor & Francis Group, provided free online access to an article from Intelligence and National Security entitled “Improving Intelligence Studies as an Academic Discipline.” The article, by Stephen Marrin, a former Central Intelligence Agency (CIA) analyst and General Accounting Office analyst and current associate professor at James Madison University, considers whether the body of intelligence studies scholarship is sufficient as a basis for the development of intelligence studies as an academic discipline. In the article, Marrin notes that in the 1950s, there was concern that the lack of literature on the intelligence profession. Ensuring that knowledge about the intelligence business would be captured and made accessible to others was uncertain. He says that paucity has been resolved as both government and academia have been contributing literature to advance knowledge in the field. However, he argues intelligence studies literature has not been compiled, evaluated, and aggregated in a structured process yet. Marrin illustrates this by reviewing the discourse on the view of Sherman Kent, the renowned Office of Strategic Services (OSS) and CIA intelligence analyst, that the “integrity” or independence of the analytic function had to be retained outside the direct line authority of the decision maker. For the counterargument, researchers often turn to Kent’s contemporary, Willmoore Kendall, who suggested that if this were done the contribution from intelligence analysts would be marginalized in the decision making process.

Marrin is convinced that Roger Hilsman’s 1952 writings are as good as or better than Kendall’s in challenging some of Kent’s ideas. Nevertheless, he says Hilsman’s work is usually overlooked. Marrin further discusses Hilsman’s strong case for a closer relationship between intelligence analysis and decision making. Hilsman argued, “a more effective integration of knowledge and action”—or intelligence analysis and decision making—will require intelligence analysts to become more policy-oriented. Hilsman also argued that in order for intelligence to be “useful and significant,” it “should be frankly and consciously concerned with policy” and that its practitioners should have “a frame of mind which is … instrumental, action-conscious, policy-oriented. The major task before the researchers is one of recasting their thought to the context of action, and adapting their tools to the needs of policy.” Marrin believes the rediscovery of Hilsman’s work and those of others will result in a much more substantive debate about the respective roles and functions of intelligence analysis vis-à-vis decision maker assessment. Marrin later proffers that intelligence studies should emulate the key practices that enable any field of knowledge to become cumulative and in doing so become its own coherent academic discipline. In reviewing the need to evaluate intelligence studies for gaps or holes as a step to become more cumulative, Marrin discusses Hilsman’s evaluation of “the academic observers” in Strategic Intelligence and National Decisions (The Free Press, 1956)). Marrin’s article is edifying, thought provoking, and another valuable contribution by him to the body of intelligence studies scholarship.

What is most interesting to this author is Marrin’s reference to Roger Hilsman’s work. Hilsman was this author’s professor, independent study advisor, faculty advisor, and friend during undergraduate study at Columbia College, Columbia University, and mentor during graduate study at Columbia. Hilsman was a phenomenal educator. Discussions on policymaking and analysis that he had with students during seminars held at his residence were marked not only by the inspiration and encouragement he would give to students in their research and career plans, but also by a frankness and realism that would give them a leg up in future endeavors. The reminiscences Hilsman would share directly with this author during office hours were from those periods of his life that are perhaps the most intriguing in his biography. That included: studying at West Point; service in Merrill’s Marauder’s and command of an OSS guerilla warfare battalion both in Burma in World War II; work as a military planner for NATO and the Supreme Headquarters Allied Powers Europe; service in the administration of US President John Kennedy as Director of the Bureau of Intelligence and Research for the US Department of State; and, service as Assistant Secretary of State for Far Eastern Affairs in the administration of US President Lyndon Johnson. During lectures, he would always provide a riveting anecdote from his experiences during the 1962 Cuban Missile Crisis to accompany his “pearls of wisdom”. Perhaps one of the most interesting aspects of what he proffered on intelligence analysis and “the politics of policymaking” was the need not only to gather and analyze intelligence to understand key actors among ones’ opponents and to formulate policy, but to understand the relevant actors in the US policymaking process to understand how to promote, formulate, and implement viable policy approaches. Due greatly to the insights and lessons, and due in part to nostalgia and sentiment for a generous professor, greatcharlie.com has decided, with permission from Taylor & Francis Online, to present Marrin’s article to its readers. Quod enim munus rei publicae ad ferre maius mellusve possumus, quam si docemus atque erudimus luventutem? (What greater or better gift (or performance of duty) can we bring to the state than if we teach and instruct youth?)

Stephen Marrin, “Improving Intelligence Studies as an Academic Discipline,” Intelligence and National Security 31, no. 2 (February 2016): 266-279.

Abstract

As the field of intelligence studies develops as an academic complement to the practice of national security intelligence, it is providing a base of knowledge for intelligence practitioners to interpret their past, understand their present, and forecast their future. It also provides the basis for broader understanding of intelligence as a function of government for other government and security officials, academicians, and the general public. In recent years there has been significant growth in the numbers and kinds of intelligence-related educational and training opportunities, with the knowledge taught in these courses and programs derived from the body of intelligence studies scholarship. The question posed here is: to what extent is this body of knowledge sufficient as a basis for the development of intelligence studies as an academic discipline?

Intelligence studies is an academic complement to the practice of national security intelligence; the contribution that higher education makes to interpreting its past, understanding its present, and forecasting its future. It forms a body of knowledge that is academic—frequently embedded within broader studies of government and foreign policy—yet also useful for the intelligence professional. As the literature grows and entire academic degree programs, departments, and even colleges are dedicated to the study and teaching of intelligence, it is becoming more established as an academic discipline.1 At the same time, there are significant gaps in the literature due to a generalized failure to ensure knowledge accumulation and aggregation over time. Improving intelligence studies as an academic discipline will require reinforcing best practices that exist in academia by identifying, acquiring, storing, creating, and disseminating new knowledge.2 More effective implementation of these practices will strengthen the coherence of intelligence studies as an academic discipline while at the same time increasing its impact on broader scholarship, public understanding, and government practice.

Intelligence Studies Literature: Large and Growing

The intelligence studies literature is quite large, and growing. This was not always true, however. In 1955, Sherman Kent observed that the intelligence profession lacked a literature and as a result was unable to ensure that knowledge about the intelligence business was captured and made accessible to others.3 To address this inadequacy, Kent strongly argued for the self-conscious development of a professional literature. Soon after, in 1957 Washington Platt observed that: “the literature dealing specifically with the principles of strategic intelligence is scant, and does not reflect even the best of what is now known.”4 Platt attributed this to “the newness of the systematic pursuit of strategic intelligence, and in part to the lack of graduate courses and graduate students” as well as the general paucity of researchers on the subject.

Many of the problems of the 1950s and the early years of intelligence studies have been fixed as both government and academia have contributed to knowledge advancement in the field. The US government has traditionally participated in this process through CIA’s Center for the Study of Intelligence, and National Intelligence University’s Center for Strategic Intelligence Research.5  Other governments such as Britain, Romania, Turkey, and Spain have also begun to support intelligence studies research, especially through intelligence studies associations. At the same time, academia has contributed to intelligence studies through the development of a cadre of intelligence studies specialists primarily in political science and history departments. They tend to come together in conferences organized by various academic and professional associations where a good part of the intelligence studies scholarship is developed and presented. Foremost among these are the Intelligence Studies Section portion of the annual International Studies Association conference, the British Study Group on Intelligence and Security and Intelligence Study Group, the Canadian Association of Security and Intelligence Studies, and the Australian Institute of Professional Intelligence Officers, though many others also support intelligence studies research and scholarship.

Once it has been developed, new contributions to the intelligence studies literature are then published in a handful of dedicated journals including the peer-reviewed journal Intelligence and National Security, the more policy-oriented International Journal of Intelligence and Counterintelligence, and the widely-referenced CIA journal Studies in Intelligence, in addition to more specialized journals generally produced by various intelligence-related organizations and associations.6 While most of the intelligence studies literature exists in the form of journal articles, book publishers have also gotten involved, with Routledge’s Studies in Intelligence book series focusing on the research market, Rowman and Littlefield’s Professional Intelligence Education Series focusing on the practitioner market, and Georgetown University Press and CQ Press focusing on the academic market. The growing literature makes up the body of knowledge in the field. The accumulation of the literature has become so notable that in 2009 the Chronicle of Higher Education published a profile of intelligence studies as a growing academic discipline.7

When one surveys the extensive intelligence studies literature in all its variety, the literature can appear to be quite large indeed. Scholars who have evaluated the intelligence studies literature have focused on general overviews or the state of the literature in specific countries.8 Some of these evaluations have even focused on the importance of learning from history, both for its own sake as well as for improving practice in the future.9 This is, essentially, the contribution that scholarship can make to practitioner-oriented efforts to learn from past experience in various history and lessons learned centers which are dedicated to avoid the Santayana admonition that “those who cannot remember the past are condemned to repeat it.”10

At the same time, there are some significant problems with the intelligence studies literature which is impeding the field from developing as a coherent academic discipline. In general the intelligence literature is rich in history but both insular and theoretically thin perhaps because of a generalized failure to ensure knowledge accumulation and aggregation over time.

Failing to be Cumulative

The primary problem with the intelligence studies literature specifically is that it is anything but cumulative regarding its own intellectual history. Intelligence studies as a field of knowledge has books and journals to document “lessons identified” but it does not have a structured process for compiling and evaluating the literature so that it is aggregated and made cumulative.

Referencing prior work on the same or similar subjects, a technique used to layer new knowledge on top of old as a way to ensure knowledge is cumulative, is infrequently done by intelligence studies’ authors. Even those who should cite relevant contributions from the three core journals in the field frequently fail to do so. The end result is the repetition of ideas and knowledge rather than the creation of new knowledge. To mix a couple of metaphors, instead of standing on the shoulders of giants and creating an academic discipline, intelligence scholars seem to be re-inventing the conceptual wheel every 15 years or so without really making advances in terms of disciplinary knowledge. While this kind of conceptual repetition occurs in other academic fields as well, frequently characterized by the phrase “old wine in new bottles”, it is especially noticeable in the intelligence studies domain.

Failing to Learn from Sherman Kent

This is not to imply that past knowledge has been forgotten completely. For example, over the past 25 years Sherman Kent has been established as one of the giants in the field partly due to the efforts of Jack Davis, who has raised Sherman Kent’s profile significantly through his writings.11 This higher profile helps in the knowledge aggregation process because it provides a touchstone in the literature that later scholars and practitioners can refer back to. They can then use it as a jumping off point to make additional observations and contributions to the body of knowledge. But even then, sometimes key ideas fail to be picked up by modern scholars.

As an example, Sherman Kent’s 1949 distinction between intelligence and strategic intelligence is not widely referenced in the literature.12 As Kent put it: “Intelligence is a simple and self-evident thing. As an activity it is the pursuit of a certain kind of knowledge. In a small way it is what we all do every day . . . But no matter whether done instinctively or with skillful conscious mental effort intelligence work is in essence nothing more than the search for the single best answer.”13 Kent then goes on to distinguish this definition of “intelligence” from “strategic intelligence” which he says is “knowledge vital for national survival” and what he considers to be unique problems related to this effort.

Yet modern efforts to define intelligence do not include Kent’s 1949 distinction between intelligence and strategic intelligence. In fact, there is as of yet no consensus on the definition or purpose of intelligence. Perhaps a consensus is not required; other fields do not have unanimity on core concepts either. But the development of schools of thought around different kinds of definitions would provide taxonomies of concepts that could be used to evaluate each definition against the others, and greater understanding of the variation in perspectives embedded within this discussion of definitions.

This failure to be cumulative in terms of the definition of intelligence has also limited the development of theories of intelligence. The disagreements over definitions frequently reflect different assumptions about what the purpose of intelligence is. Definitions can be conceived of as static representations of the underlying vision of purpose, and articulating the variety of visions of purpose may be more important than achieving consensus on definitions. So rather than argue over which words to use in a definition, it would be more effective for knowledge development purposes to address what the different purposes of intelligence are, create schools of thought around them, and then foster structured debates between the respective schools of thought. Knowledge manifestly increases when the formal articulation of conflicting perspectives leads to intellectual debate as the proponents of one school of thought take on the proponents of another in a collegial debate. The development of an academic discipline is at least partially contingent on its ability to create productive debates between different schools of thought, and then grow knowledge cumulatively as the debate continues. While there has been recent progress on developing different kinds of intelligence theory, intelligence studies has not yet effectively created schools of thought or fostered these structured debates.14

Forgetting Roger Hilsman

Even when key ideas from early writers such as Kent are identified and retained in working scholars’ memories, sometimes key contemporaries are forgotten. For example, Kent argued for retaining the “integrity” or independence of the analytic function outside the direct line authority of the decisionmaker.15 The end result would be independent, objective intelligence analysis for national security decisionmakers. This concept of an independent analytic corps was subsequently challenged by Kent’s contemporary, Willmoore Kendall, who suggested that if this were done the contribution from intelligence analysts would be marginalized in the decisionmaking process.16 Instead, Kendall preferred to see a closer relationship between intelligence and decisionmaking in which “the intelligence function (helps) the policymakers ‘influence’ the course of events by helping them understand the operative factors on which the US can have an impact.”17 When scholars reference the purpose of intelligence and the relationship between intelligence and policy, they now cite Kent followed almost immediately by Kendall as a way to identify two early schools of thought on the subject.

But Roger Hilsman’s mostly-forgotten 1952 writings are as good as or better than Kendall’s as a challenge to some of Kent’s ideas. Hilsman made a strong case for a closer relationship between intelligence analysis and decisionmaking, arguing that “a more effective integration of knowledge and action”—or intelligence analysis and decisionmaking—will require intelligence analysts to become more policy-oriented.18 Hilsman directly questioned Kent’s conception of a separation of intelligence from decisionmaking by asking “whether this division of labor is a wise or even a valid one”19 and he ended up concluding that it was “both arbitrary and awkward.” Hilsman goes on to say that in order for intelligence to be “useful and significant” it “should be frankly and consciously concerned with policy” and that its practitioners should have “a frame of mind which is . . . instrumental, action-conscious, policy-oriented. The major task before the researchers is one of recasting their thought to the context of action, and adapting their tools to the needs of policy.”20

In other words, Hilsman disagreed with Kent, and believed that intelligence analysts should work in close cooperation with decisionmakers. Intelligence studies scholars know what Kent said about the intersection between intelligence analysis and decisionmaking and they also know about Kendall’s challenge, but they seem to have forgotten Hilsman even though his ideas have as much relevance as anything else written about the subject over the past 60 years.

The potential value of rediscovering Hilsman is a much more substantive debate than that which currently exists about the respective roles and functions of intelligence analysis vis-à-vis decisionmaker assessment. As an example, at one point a solution had been found which approximates Hilsman’s working relationship of knowledge and action. It was known as the National Security Studies Memorandum (NSSM) in the Nixon and Ford Administrations and the Presidential Review Memorandum (PRM) in the Carter Administration, and received a fair amount of praise for being an effective way to bridge intelligence and policy.21

Unfortunately, the PRM/NSSM product line was disbanded in 1980 and appears to have been completely forgotten by both academia and government.22 With a couple of exceptions, it has not been referenced in the literature for almost 30 years, and current long-serving members of the national security community are not aware that it used to exist. Yet some have begun to recommend and implement various mechanisms for doing exactly what the PRMs and NSSMs were built to do. For example, former Deputy National Security Advisor James Steinberg called for the National Security Council to play a more direct role in facilitating a better working relationship between intelligence producers and consumers.23 In addition, senior intelligence professionals Josh Kerbel and Anthony Olcott recommended a much closer relationship between intelligence and policy.24 If implemented, these suggestions would essentially recreate the old PRM/NSSM product decades later. But this reinvention of the wheel was not necessary. Instead, all that was needed was better utilization of the ideas that were already in the intelligence studies literature.

Ignoring Platt, Knorr, and Hughes

Another example of forgotten intelligence studies scholarship is Washington Platt’s 1957 book Strategic Intelligence Production: Basic Principles. The titles of Platt’s chapters speak to the very interests of intelligence scholars and practitioners today: Principles of Intelligence Production; From Information to Intelligence; Intelligence Production: An Act of Creative Thinking; Help From the Social Sciences; Probability and Certainty; Forecasting; Characteristics of the Intelligence Profession. All of these chapters could make contributions to the ongoing discussions regarding analytic process, utility of the social sciences, increasing imagination, futures work and forecasting, and professionalization. But Platt’s work has also been forgotten, even though it contains some important ideas that current scholars and practitioners would find quite interesting.

Finally, other forgotten scholarship includes some of the best work on intelligence analysis as a social science and the relationship between intelligence producers and consumers. Klaus Knorr’s 1964 monograph “Foreign Intelligence and the Social Sciences” contains the best evaluation of how analysts use social science methodology in the entire intelligence literature, yet is rarely cited or referenced in most work on intelligence analysis.25 In addition, Thomas Hughes wrote a short monograph in 1976 on the relationship between intelligence and policy that is one of the best treatments of the subject, but there are very few references to it in the literature.26

In their treatment of these subjects, current scholars are ignoring insights from prior works and are instead rebuilding the wheels that were built decades ago. It is necessary to know who the giants are in order to stand on their shoulders and right now it does not appear that the intelligence studies field as a whole possesses sufficient understanding of who those giants are or what can be learned from them.

Two Steps Forward, One Step Back

Some scholars conduct more thorough literature reviews than others, and there have also been efforts to remind current scholars and practitioners of those who blazed the trails before them. For example, intelligence studies literature reviews began as early as Hilsman’s evaluation of “the academic observers” in his 1956 book chapter reviewing the works of George Pettee, Sherman Kent, and Willmoore Kendall.27 A set of reviews organized by Roy Godson in the 1980s also provided a review of what had been published up to that point.28 But then these reviews are forgotten, and have to be rewritten for a new generation.

A recent example of this is Anthony Olcott’s evaluation of the writings of Sherman Kent, Willmoore Kendall, and George Pettee that compares and contrasts their differing perspectives and approaches to strategic intelligence analysis.29 This is a valuable contribution to the literature because it reminds other scholars of these authors’ writings. It also reminds them that to understand where the literature is today it is necessary to go back and understand the perspectives of those who helped build it into what it is today. Unfortunately, Olcott’s contribution does not reference Hilsman’s 1956 book chapter which evaluated the very same authors that Olcott did with the very same goal in mind: to evaluate these early writings in order to compare and contrast their different perspectives and approaches to intelligence analysis. This is not intended as a criticism of the author, because most every scholarly contribution fails to address some significant prior work. Instead, it is being flagged here because it is symptomatic of a broader problem in the intelligence studies literature related to the limitation of knowledge accumulation in the field.

Academicians and scholars document, store, and disseminate existing knowledge as well as grow new knowledge. So why have scholars failed to learn from their own history? Because there has not been sufficient emphasis placed on the infrastructure which facilitates knowledge production in the field. In the field of security studies, for example, Stephen Walt has recommended that scholars focus on the relationship between academia and practice in ensuring healthy evolution of knowledge over time.30 He also identifies research support as well as prevailing norms and ethos of the security studies community as mechanisms where improvements can be made to knowledge production in the field. Unfortunately, the kind of emphasis that Walt put on the knowledge infrastructure in the security studies field does not have an equivalent in intelligence studies. But this lack of emphasis in the past presents us with an opportunity to build that infrastructure with an eye to the future.

Developing Intelligence Studies as an Academic Discipline

To become more cumulative, intelligence studies should emulate the key practices that enable any field of knowledge to become cumulative and in doing so become its own coherent academic discipline. This involves establishing formalized processes for creating, documenting, storing, and disseminating knowledge in such a way as to ensure that future generations of scholars and practitioners can benefit from it.31 The steps involve: (1) documenting what is known; (2) evaluating it for gaps or holes; (3) working to fill those gaps in knowledge; (4) distributing this knowledge to those who need or want it; and (5) institutionalizing these efforts.

In most academic disciplines, scholars articulate important ideas which are then evaluated and critiqued by others in the field. This leads to the development of competing schools of thought, with individuals representing those schools. But even if the idea is debunked, that discussion remains in the literature for later generations of scholars to learn from. So there also needs to be a tradition of critiquing previous interpretations, and building secondary and tertiary arguments off of the arguments of the main proponents of each school. It is from this process of evaluation and critique that the giants in the field are identified and their insights transferred to new scholars, leading to longer and deeper intellectual histories. To support this, there also needs to be a heavy emphasis on citation and footnotes in order to link current ideas back to the ongoing scholarly debates. More effective implementation of these academic best practices will strengthen the coherence of intelligence studies as an academic discipline while at the same time increasing its impact on broader scholarship, public understanding, and government practice.

The first step in improving the body of knowledge is to document what is known. This has to be a dynamic rather than static process; perhaps an annualized bibliographic book series. This is labor intensive and probably not something that most scholars would choose to do on their own. The closest working approximation to what is required is the online Muskingum College intelligence bibliography compiled by J. Ransom Clark, which is a tremendously valuable resource for both intelligence studies scholars as well as students of intelligence.32

Other efforts are either limited to specific subject matter topics, or have not been updated recently.33 To continue developing this kind of working bibliography, governments and professional associations interested in ensuring that intelligence studies remains an active academic discipline may have to collaborate on this kind of project.

The second step in improving the body of knowledge is to evaluate what is known; the literature that has already been developed. This would involve a variety of literature reviews oriented towards identifying the research questions that have been explored sufficiently, others that still require some work, and yet still others that have not yet been answered. The Intelligence Studies Section (ISS) at ISA has implemented something like this as its contribution to the International Studies Encyclopedia.34 ISS broke the intelligence studies literature down into 20 different topics, and lined up authors to write literature reviews on each of those topics. These topics include those of interest to practitioners, such as analytic methods, organizational structures and processes, training and education, and so forth. In published form, the end result provides current and future scholars and practitioners with a starting point for understanding the current state of that segment of the literature.

This kind of evaluative literature review is also being done through the Guide to the Study of Intelligence being developed by the Association of Former Intelligence Officers (AFIO). The purpose is to provide high school, college, and university instructors with “a literature review of significant works useful for educators” in order to help them with course development.35

The subject matter is wide ranging, and covers many specialized topics within the intelligence studies literature. Additional efforts like it and the one by ISA’s Intelligence Studies Section would improve the intelligence literature by ensuring that both scholars and practitioners were able to evaluate the existing state of knowledge in order to know where the gaps in knowledge are.

The third step in the process is to begin filling in the gaps in the literature identified in the evaluations. There are a variety of ways to do this, including by developing a dedicated (and funded) research agenda akin to the Army War College’s Key Strategic Issues List to back-fill gaps in knowledge. Another way to fill in gaps in knowledge is through themed conferences and symposia. Alternatively, open calls for papers for paper-based conferences on various intelligence-related themes could lead to some interesting new contributions to the literature. A model for this kind of activity could be the 2005 International Conference on Intelligence Analysis that Mitre coordinated on behalf of Mark Lowenthal, the then-Assistant Director of Central Intelligence for analysis and production. This conference was modeled on an academic conference, with a paper requirement and proposals open to the public. It also led to the presentation of papers which have since made their own contributions to on-going discussions in the scholarship.

Funding and content for these conferences could come from consortia made up of experts from government, academia, professional associations, and private industry; together they should have the infrastructure, contacts, and knowledge necessary to successfully implement this kind of venture. Associations could provide a focal point for acquiring and coordinating the kinds of knowledge that would be helpful in terms of outreach to the academic community. For example, the Office of the Director of National Intelligence has partnered with the Intelligence and National Security Alliance (INSA) on events related to analytic transformation, but other associations such as ISA’s Intelligence Studies Section or the International Association for Intelligence Education (IAFIE) would both be good partners for those wanting to engage academia. The broad point is to find appropriate collaborative partners for these sorts of knowledge-building initiatives.

The fourth step in the process would be to disseminate the new knowledge to those who can use it, including current and future intelligence scholars and practitioners. That could involve better communications between those who research and write about intelligence and those who teach it, so that a feedback loop is established to maximize learning. The students could be those in academia in intelligence studies or intelligence school programs, or those in governmental training courses. The Harvard University Intelligence and Policy Program also provides a potential model for those who want to establish a form of continuing education in the field devoted not to practitioner proficiency per se, but rather broader understandings of purpose and how best to manage the enterprise.36

Finally, the last step in the process would be to institutionalize these efforts. One kind of institutionalization would be through academic Intelligence Studies centers; academic equivalents to CIA’s Center for the Study of Intelligence or NIU’s Center for Strategic Intelligence Research.37 Such programs can centralize knowledge about the theory and practice of intelligence as a profession, and can provide this knowledge to government, other parts of academia, the news media, and segments of society in a more structured way than has been done in the past. The knowledge resident in these departments in the form of faculty, staffs, libraries, and the other infrastructure can provide the optimal educational environment for those who want to learn more about intelligence studies.

Another way to institutionalize these efforts would be to encourage Ph.D. students to specialize in intelligence studies. Intelligence studies has not developed a cumulative tradition of scholarship partly because there are relatively few intelligence studies Ph.D.s. This means that there are not many scholars who look at the body of knowledge in a longitudinal sense; how it has grown and changed over time. The Ph.D. is not a static representation of knowledge and it cannot be evaluated based on that criterion. Instead, one must evaluate the Ph.D. based on the ability of the bearer to create new knowledge. In this case, that means relevant contributions to our understanding of intelligence. To make that contribution to knowledge, the Ph.D. student first has to survey and evaluate the current state of existing knowledge before deciding precisely how to contribute to new knowledge.

More Ph.D. students studying more intelligence-related subjects will enable the literature to become more cumulative than it ever has been, identify where cumulative progression of knowledge has stalled, and contribute to the institutionalization of footnoting and other practices that would be indicative of greater scholarly rigor. The most effective way to encourage more doctoral students is to provide them with funding. This funding could come in the form of fellowships which bring junior scholars into academic institutions where they would add to the creativity and learning of that institution by managing different projects or developing new courses. This kind of fellowship could be funded by governments in the same way that they fund other kinds of Ph.D.s, the private sector which would benefit from the knowledge created, or professional intelligence associations in their efforts to support related educational activities.

Finally, a push to make the intelligence studies literature more cumulative would also be to make it more professional, more structured, and more disciplined which will increase its impact on broader literatures as well as among intelligence professionals. Currently intelligence studies as a field of knowledge is subordinate to other more traditional academic disciplines including political science, history, anthropology, sociology, psychology, and communications disciplines. Unfortunately, while the intelligence studies literature itself is extensive, many mainstream scholars do not sufficiently incorporate its knowledge and insight into their work.38

As a result, both conventional academic scholars and by extension the general public do not incorporate the extensive nuance reflected in the intelligence studies literature and instead frequently rely on broad brush generalizations and mischaracterizations. Improving the coherence and rigor of intelligence studies as an academic discipline will highlight the breadth and depth of the literature to those who were previously unaware of it.

Intelligence studies as an academic discipline was in its formative stages for about 20 years, from the mid-1980s through to the early 2000s. It then entered a form of adolescence resulting from the flow of interest and money in its direction after the 2001 terrorist attacks. Through the 2000s the literature has grown in terms of sophistication and abstraction, with much additional emphasis on key intelligence concepts and theories. As the field continues to mature, improving intelligence studies as an academic discipline will require a return to scholarly fundamentals and best practices in order to create a cumulative, comprehensive, and influential body of disciplinary knowledge for future scholars and practitioners to learn from and contribute to.

Notes

1 For a recent discussion of intelligence studies as an academic discipline, see Loch Johnson and Allison Shelton, “Thoughts on the State of Intelligence Studies: A Survey Report”, Intelligence and National Security 28/1 (2013) pp.109–20.

2 These recommendations are derived in part from remarks given at the Conference on Learning the Lessons of All-Source Intelligence Analysis sponsored by State Department’s Bureau of Intelligence and Research and the Office of the Director of National Intelligence’s Intelligence Community Lessons Learned Center, Washington, DC, July 2008.

3 Sherman Kent, “The Need for an Intelligence Literature”, Studies in Intelligence Spring (1955) pp.1–11.

4 Washington Platt, Strategic Intelligence Production: Basic Principles (USA: Praeger 1957) pp.133–4.

5 Russell G. Swenson, “Meeting the Intelligence Community’s Continuing Need for an Intelligence Literature”, Defense Intelligence Journal 11/2 (2002) pp.87–96.

6 For more on the value of the International Journal of Intelligence and Counterintelligence for conventional scholars and practitioners, see Jason Vest, “Artificial Intelligence”, Foreign Policy, 4 January 2006.

7 Peter Monaghan, “Intelligence Studies”, The Chronicle of Higher Education, 20 March 2009.

8 Loch K. Johnson, “An Introduction to the Intelligence Studies Literature” in Loch Johnson (ed.) Strategic Intelligence (Westport, CT: Praeger 2007) pp.1–20; Kenneth G. Robertson, “The Study of Intelligence in the United States” in Roy Godson (ed.) Comparing Foreign Intelligence: The US, USSR, UK and the Third World (Washington, DC: Pergamon-Brassey’s 1988) pp.7–42; Geoffrey R. Weller, “Assessing Canadian Intelligence Literature: 1980–2000”, International Journal of Intelligence and Counterintelligence 14/1 (2001) pp.49–61; Len Scott, “Sources and Methods in the Study of Intelligence: A British View” in Loch Johnson (ed.) Strategic Intelligence (Westport, CT: Praeger 2007) pp.87–108; Eric Denécé and Gérald Arboit, “Intelligence Studies in France”, International Journal of Intelligence and Counterintelligence 23/4 (2010–11) pp.725–47; Gustavo Díaz Matey, “The Development of Intelligence Studies in Spain”, International Journal of Intelligence and Counterintelligence 23/4 (2010–11) pp.748–65.

9 Christopher Andrew, “Intelligence Analysis Needs to Look Backwards Before Looking Forward”, paper given at the New Frontiers of Intelligence Analysis Conference, “Shared Threats, Diverse Perspectives, New Communities”, 31 March–2 April 2004. Stephen Marrin, “Preventing Intelligence Failures By Learning From the Past”, International Journal of Intelligence and Counterintelligence 17/4 (2004) pp.655–72; John Hedley, “Learning from Intelligence Failures”, International Journal of Intelligence and Counterintelligence 18/3 (2005) pp.435–50; Len Scott and R. Gerald Hughes, “Intelligence, Crises and Security: Lessons from History?”, Intelligence and National Security 21/5 (2006) pp.653–74.

10 George Santayana, The Life of Reason (NY: Scribner’s 1905–6).

11 Jack Davis, “The Kent-Kendall Debate of 1949”, Studies in Intelligence 36/5 (1992) pp.91–103; Jack Davis, “Sherman Kent and the Profession of Intelligence Analysis”, Occasional Papers 1, no. 5, Washington, DC, Central Intelligence Agency, The Sherman Kent Center for Intelligence Analysis, November 2002; Jack Davis, “Sherman Kent’s Final Thoughts on Analyst-Policymaker Relations”, Occasional Papers 2, no. 3, Washington, DC, Central Intelligence Agency, The Sherman Kent Center for Intelligence Analysis, June 2003.

12 Thomas F. Troy, “The ‘Correct’ Definition of Intelligence”, International Journal of Intelligence and Counterintelligence 5/4 (1991–2) pp.433–54; Martin T. Bimfort, “A Definition of Intelligence”, Studies in Intelligence 2/4 (1958); Michael Warner, “Wanted: A Definition of Intelligence”, Studies in Intelligence 46 (2002) pp.15–22; Kristan Wheaton and Michael Beerbower, “Towards a New Definition of Intelligence”, Stanford Law and Policy Review 17 (2006) pp.319–30; Alan Breakspear, “A New Definition of Intelligence”, Intelligence and National Security 28/5 (2013) pp.678–93.

13 Sherman Kent, Strategic Intelligence for American World Policy (Princeton, NJ: Princeton University Press 1951) p.vii.

14 For recent progress on intelligence theory, see Gregory F. Treverton, Seth G. Jones, Steven Boraz and Phillip Lipscy, Conference Proceedings: Toward a Theory of Intelligence Workshop Report (Arlington, VA: RAND National Security Research Division 2006); Peter Gill, Stephen Marrin and Mark Phythian (eds.), Intelligence Theory: Key Questions and Debates (London: Routledge 2008); Stephen Marrin, “Intelligence Analysis Theory: Explaining and Predicting Analytic Responsibilities”, Intelligence and National Security 22/6 (2007) pp.821–46.

15 See “The Problem of Objectivity and Integrity” in Kent, Strategic Intelligence for American World Policy, pp.195–201.

16 Willmoore Kendall, “The Function of Intelligence”, World Politics 1/4 (1949) pp.542–52, p.550.

17 Davis, “The Kent-Kendall Debate of 1949” p.95.

18 Roger Hilsman Jr., “Intelligence and Policy-Making in Foreign Affairs”, World Politics 5/1 (1952) pp.1–45, p.45.

19 Ibid., p.25.

20 Ibid., p.44.

21 Arthur S. Hulnick and Deborah Brammer, “The Impact of Intelligence on the Policy Review and Decision Process”, Center for the Study of Intelligence, Central Intelligence Agency, Washington, DC, January 1980.

22 Stephen Marrin and Philip H.J. Davies, “National Assessment by the National Security Council Staff 1968–80: American Experiment in a British Style of Analysis”, Intelligence & National Security 24/5 (2009) pp.644–73.

23 James B. Steinberg, “The Policymaker’s Perspective: Transparency and Partnership” in Roger George and James Bruce (eds.) Analyzing Intelligence: Origins, Obstacles, and Innovations (Washington, DC: Georgetown University Press 2008) pp.82–90.

24 Josh Kerbel and Anthony Olcott, “The Intelligence-Policy Nexus: Synthesizing with Clients, Not Analyzing for Customers”, Studies in Intelligence 54/4 (2010) pp.1–13.

25 Klaus E. Knorr, “Foreign Intelligence and the Social Sciences”, Research Monograph No. 17, Center of International Studies, Woodrow Wilson School of Public and International Affairs, Princeton University, June 1964.

26 Thomas L. Hughes, The Fate of Facts in a World of Men, Headline Series No. 233 (NY: Foreign Policy Association 1976).

27 Roger Hilsman, Strategic Intelligence and National Decisions (Glencoe, IL: The Free Press 1956) pp.123–37.

28 Godson, The New Study of Intelligence, pp.1–6; Robertson, “The Study of Intelligence in the United States”, pp.7–42; Christopher Andrew, “Historical Research on the British Intelligence Community”, in Roy Godson (ed.) Comparing Foreign Intelligence: The US, USSR, UK and the Third World (Washington, DC: Pergamon-Brassey’s 1988) pp.43–64.

29 Anthony Olcott, “Revisiting the Legacy: Sherman Kent, Willmoore Kendall, and George Pettee – Strategic Intelligence in the Digital Age”, Studies in Intelligence 53/2 (2009) pp.21–32.

30 Stephen M. Walt, The Renaissance of Security Studies, International Studies Quarterly 35/2 (1991) pp.211–39.

31 This is the knowledge advancement portion of the professionalization process. Stephen Marrin and Jonathan Clemente, “Modeling an Intelligence Analysis Profession on Medicine”, International Journal of Intelligence and Counterintelligence 19/4 (2006–7) pp.642–65.

32 J. Ransom Clark, “The Literature of Intelligence: A Bibliography of Materials, with Essays, Reviews and Comments, Muskingum University, 1998–2012” < http://intellit.muskingum.edu/index.html>

33 George C. Constantinides, Intelligence and Espionage: An Analytical Bibliography (Boulder, CO: Westview Press 1983); Marjorie W. Cline, Carla E. Christiansen and Judith M. Fontaine (eds.), Scholar’s Guide to Intelligence Literature: Bibliography of the Russell J. Bowen Collection (Frederick, MD: University Publications of America 1983); Neal H. Petersen, American Intelligence, 1775–1990: A Bibliographical Guide (Claremont, CA: Regina Books 1992); The Future of Intelligence Analysis, Vol. II, Final Report, Center for International and Security Studies at Maryland, 10 March 2006; Greta E. Marlatt, “Intelligence and Policymaking: A Bibliography”, Naval Postgraduate School, December 2010.

34 Robert A. Denemark (ed.), International Studies Encyclopedia (Malden, MA: Wiley-Blackwell 2010) < http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1405152389.html> with specific intelligence-related publications listed here: < http://intellit.muskingum.edu/refmats_folder/teachingiss.html>

35 AFIO Weekly Intelligence Notes #37-10, 5 October 2010 < http://www.afio.com/sections/wins/2010/2010-37.htm>

36 Ernest R. May and Philip D. Zelikow (eds.), Dealing with Dictators: Dilemmas of US Diplomacy and Intelligence Analysis, 1945–1990, BCSIA Studies in International Security (Cambridge, MA: The MIT Press 2006) pp.ix–x.

37 Stephen Marrin, “Intelligence Studies Centers: Making Scholarship on Intelligence Analysis Useful”, Intelligence and National Security 27/3 (2012) pp.398–422.

38 Amy B. Zegart, “Cloaks, Daggers, and Ivory Towers: Why Academics Don’t Study US Intelligence” in Loch Johnson (ed.) Strategic Intelligence (Westport, CT: Praeger 2007) pp.21–34. Also see Amy Zegart, “Universities Must Not Ignore Intelligence Research”, Chronicle of Higher Education, 3 July 2007. For examples of intelligence studies works that are good treatments of the subject but fail to address existing scholarship, see Richard Posner, Preventing Surprise Attacks: Intelligence Reform in the Wake of 9/11 (Lanham, MD: Rowman and Littlefield 2005); Douglas Hart and Steven Simon, “Thinking Straight and Talking Straight: Problems of Intelligence Analysis”, Survival 48/1 (2006) pp.35–60; David Omand, Securing the State (NY: Columbia University Press 2010); Ken Lieberthal, The US Intelligence Community and Foreign Policy: Getting Analysis Right (Washington, DC: Brookings Institution 2009). For an exception consisting of a treatment of intelligence which also cites the relevant intelligence studies literature, see Robert Jervis, Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War (Ithaca, NY: Cornell University Press 2010).

Book Review: Donald P. Gregg, Pot Shards: Fragments of a Life Lived in CIA, the White House, and the Two Koreas (Vellum, 2014)

Pot Shards presents the life and times of Ambassador Donald P. Gregg (above), an individual who contributed greatly to US foreign and national security policy. Readers are taken on a journey through Northeast and Southeast Asia and halls of power in Washington, DC. Readers will discover how much Gregg valued others and his value to humanity.

The Association for Diplomatic Studies and Training (ADST) is an independent, non-profit organization that advances the understanding of diplomacy and supports the training of foreign affairs personnel through a variety of programs and activities. As part of its Foreign Affairs Oral History Project, it has prepared thousands of transcripts of interviews recorded with US Foreign Service veterans.  These excellent oral histories present the realities of diplomacy to include thought provoking, sometimes absurd, and often horrifying stories from which valuable lessons can be drawn.  In April 2014, ADST graciously authorized greatcharlie.com to present the oral history of Ambassador Donald P. Gregg, an authentic intelligence professional and consummate diplomat.  In July 2014, Gregg published his extraordinary, must read memoirs entitled, Pot Shards: Fragments of a Life Lived in CIA, the White House, and the Two Koreas (Vellum, 2014).  It is part of ADST-DACOR’s Diplomats and Diplomacy Series. (DACOR is an organization of foreign affairs professionals.)

Donald Gregg was an employee of the US government for forty-three years, working in the fields of intelligence and diplomacy.  Gregg served in the Central Intelligence Agency (CIA) for thirty-one years from 1951 to 1982.  Paramilitary trained and airborne trained, he spent most of his career in assignments overseas and advising the most senior leaders of the CIA.  He was assigned to Japan, Burma, Vietnam, and Korea.  He was special assistant to the Ambassador of Korea from 1973 to 1975.  Gregg also served as a member of the White House National Security Council staff from 1979 to 1982. Upon retirement from CIA, Gregg became National Security Adviser to US Vice President George H.W. Bush from 1982 to 1989, and US Ambassador to the Republic of Korea from 1989 to 1993.  Outside of government, Gregg served as a senior consultant to Goldman Sachs, the chairman and president of The Korea Society in New York, and he currently serves as the chairman of the Pacific Century Institute in Los Angeles.  Gregg was born in New York. He enlisted in the US Army upon graduation from high school in 1945.  He received training as a cryptanalyst and reached the rank of sergeant.  He went on to attend Williams College from 1947 to 1951, majoring in Philosophy.  Gregg has received numerous awards from CIA, the US Department of Defense and the South Korean government and five honorary degrees from American and foreign colleges.  Gregg has visited the North Korea several times and advocates for the normalization of relations between that country and the US.

On its face, Pot Shards is a significant contribution to the record of the US experience in the Far East written by a major player, an intelligence icon.  Pot Shards covers some weighty matters regarding intelligence, diplomacy, and defense policy.  Some of the issues and events discussed by Gregg have never been revealed in other texts. Gregg could have limited the book to the audience of policy scholars, analysts, historians, intelligence professionals and veterans and all those familiar with the subject matter.  However, he presents Pot Shards in a way that everyone can understand and enjoy at some level.  There is much in Pot Shards that would especially thrill those beguiled by spy novels and films and spy craft enthusiasts.  Yet, what makes Pot Shards most exciting is the story of the man: Donald Gregg.  With good humor, he recounts many satisfying exploits, but also reveals vicissitudes and trials he faced.

Individuals that Gregg mentions in Pot Shards are those with whom he had continuous contact as managers, mentors, and friends. Some of are well known, “foreign policy celebrities,” such as Robert McNamara, Henry Kissinger, Creighton Abrams, Richard Helms, William Colby,  Harold Brown, Zbigniew Brzezinski, Richard Holbrooke, and Richard Allen. Others may be remembered only by a few.  Gregg sheds light on their impact and exactly how their ideas ignited events from the inside. Moreover, Gregg indicates those individuals helped him develop a greater understanding of the world and other ways of thinking, allowing him to become something that he perhaps would not have been without them.

In Cloud of Witnesses, George Rutler examines sixty-six individuals, who have influenced his life, based on what Aristotle would refer to as their ethos (an honest use of talent), logos (an honest use of mind), and pathos (an honest involvement in the suffering of the world).  That would be the best way to examine Gregg’s presentation of his life and career.  At Williams College, Gregg was influenced by the thinking of Professor John William Miller, the head of the Philosophy Department, who taught him the simple definition of morality, “Never treat another human being as an object.”  Gregg explained that he has tried to live by that definition.  Gregg was also influenced by Miller’s interest in people taking action and being defined by, and held responsible for, the actions they took.  Miller taught him that “Man does not have a nature, he has a history,” Gregg recalled Miller urged his students to act upon what they believed in and to “cut behind appearance toward reality.”

It was clear from many anecdotes in Pot Shards that Gregg has had a genuine interest in people.  He has looked beyond differences, avoiding being caught up with race, ethnicity, or other things which had been used particularly in the 1940s, 1950s, and 1960s to determine how one should relate with another.  For example, when he first came to Washington, he would enjoy going to jazz clubs which catered to African-American patrons.  That was notable because Washington, DC at the time was a segregated city. Serving in the military at a young age, he learned about different men and different behaviors, and witnessed racial and ethnic prejudice which repulsed him.  In Kai Bird’s excellent work, The Good Spy: The Life and Death of Robert Ames, it was indicated that racial and ethnic prejudice was apparent at CIA.  It was manifested in the casual and official discussions of some, and even worse, in decision making.  That was certainly not Gregg’s way.  His type of clearheaded, solid judgments resulting from giving situations and individuals a deeper look, was always needed.  Virtue shines in the presence of vice.

Having served as a cryptanalyst in the US Army, Gregg was sought by the National Security Agency in the middle of his senior year at Williams.  However, the recruiter rather than take Gregg suggested he join CIA.  Gregg knew little of the CIA and what it did.  However, the recruiter, with what Gregg now thinks was a bit of cynicism said, “Oh, they jump out of airplanes and are going to save the world!” That attracted Gregg, and initiated his thirty-one year career with the Agency.  Gregg has provided an incredibly intriguing discussion of his paramilitary training at CIA and the others he met during it. Gregg makes it clear in that discussion though, that so-called “good old days” in CIA were not always so good.  There were crazy events. Some people were not best serving the needs of CIA or their country. Managers who were very most often former OSS officers tried to recreate approaches taken by their former organization in German and Japanese held territory in Europe and Asia.   Often proposals for covert operations were based on questionable judgment and scant research.  Real possibilities for success were not fully considered by decision makers.  They were praised and approved by management as displaying a “Gung-Ho”, “Go Get ’em”, motivated attitude.  Yet, those operations more often resembled suicide missions.  Gregg found himself on such an assignment.

In March 1952, Gregg was assigned to fly to Bangkok, Thailand, where he would pick up a group of North Vietnamese whom he would train in sabotage and small unit tactics at a secret base. Following the completion of the training, Gregg and his team would be parachuted into North Vietnam.  Gregg spoke neither Vietnam nor French, and knew nothing of Vietnam or its history, and he was far from a veteran saboteur or guerilla leader. Gregg discovered an attractive post-debutante in her mid-thirties was the Vietnam plans officer and he had heard her say that her “Vietnam plan” had been accepted.  A cocktail party was given to celebrate the occasion, but Gregg was not invited.  When Gregg met his team, they turned out to be totally untrained Vietnamese with whom he had no way of communicating.  Gregg said they looked childlike.  Later he further learned that they were ethnic-Vietnamese from Thailand and had never set foot in Vietnam.  The potential for disaster was enormous. Gregg had no intention of backing out, but the truth behind the operation eventually revealed, and things worked out for the best. The operation was exposed as a fraud.  It turned out that a corrupt principal agent had hoodwinked CIA officers in Bangkok and had “taken the money and run.”  The mission was cancelled.

However, Pot Shards does not serve as some expression of some longstanding of primal doubt.  Gregg never moved about stating “Something is rotten in the Agency.”  Readers discover that through coping with those problems he learned not only what to do, but more importantly, “how not to do it.”  Gregg could recognize what was good, as good.  Gregg also worked with many in CIA who were true professionals.  He modeled his own management and decision making style in part from theirs. Gregg’s loyalty to his country and conviction toward duty was surpassed by no other.  He is proud of his years in CIA. So much of that experience was central to his personal life.  Through CIA, he met some life-long friends.  Through CIA, he met his wife.

Gregg makes it clear that his wife Margaret (“Meg”) has been central to his life.  A fortuitous encounter while hailing a taxi at Washington, DC’s Union Station set off of chain of interesting events that led to their life-long partnership.  Unbeknownst to Gregg, Meg, fluent in Russian, was actually Gregg’s superior in the Operations branch at CIA when they met.  However, as Gregg makes clear he was irresistibly taken by her combination of beauty, intellect, and charm, which made her something supreme to him.  Whether accompanying him in Japan, Korea, or Burma or remaining back in the US with their three children while Gregg served in Vietnam, she was the rock on which Gregg was able to build a career while raising a family. Relating the course of their marriage, Gregg leaves no doubt that meeting Meg was the best luck he ever had.

As Gregg rose through the ranks at CIA, he saw more clearly how many policies that drove CIA activities were not carefully considered and constructed. Gregg saw how euphonious policy speeches by political officials would often be based on captivating assessments of positive outcomes and capabilities of foreign partners not based in reality. He could see that near desperation on wanting a situation to be certain way led many, even the well-intentioned, to project their thinking on that of senior foreign counterpart, or worse, an adversary.  Only a negative outcome would reveal the error of a flawed approach for some.  In the early years of the US involvement in Vietnam Gregg witnessed this.  Gregg recalled accompanying US Secretary of Defense Robert McNamara to Vietnam in 1963. McNamara was told by General Paul Harkins, who commanded the US Military Assistance Command in Vietnam (MACV) that “We will be out of here with a military victory in six months.”  McNamara was disturbed by the unrealistic reporting, and told US President Lyndon Johnson that things were really not as good as Harkins’ people seemed to think they were.  Gregg also recalled a war game in 1964 on the use of airpower in the North Vietnam.  He participated with: General Maxwell Taylor, US Chairman of the Joint Chiefs of Staff; General Earl Wheeler, US Army Chief of Staff; General Curtis LeMay, US Air Force Chief of Staff; John McCone, CIA Director; and, in the presence of McGeorge Bundy, the National Security Adviser.  Gregg, as the CIA representative of the Blue Team, gave CIA’s analysis of the plan to bomb North Vietnam.  Gregg described the rationale of the plan and then proceeded to explain why it would fail.  The rest of that story will not be spoiled here.  One will have to read Pot Shards to discover what the response to Gregg was from the many powerful men in the room.  Gregg’s description of it all makes the moment palpable.

Writing about his second tour in Vietnam, Gregg provides good lessons on how to function effectively as a manager or leader under extremely adverse circumstances.  His lessons hold true for professions beyond intelligence for they primarily concern human nature and the wonders and realities of human interaction.  There were many difficult experiences that were a part of that period.  One evening Gregg received a frantic call from a member of his crew who he described as a gifted and committed paramilitary officer, with several tough tours under his belt.  The officer had married a Vietnamese war widow with children and lived in her Bien Hoa apartment.  He had just returned from a mission to find one of his children “desperately ill.”  Gregg rushed to the officer’s apartment with medical assistance in tow.  Yet, by the time he arrived, he found the tragic scene of a beautiful young girl, eight years old, lying silent and still, with her frightened siblings and anguished mother, who was being comforted by the officer.  The girl was confirmed dead and the officer asked Gregg to take her away.  Gregg picked up the child and walked out.  Doing so reminded him of carrying his own small daughters Lucy and Alison to bed after they had fallen asleep. He searched for an answer on how to handle the situation.  This was a CIA matter and had to be kept confidential.  Gregg eventually decided to bring the child to the emergency room of the US Army hospital at Long Binh, where US Army Military Police told him where to go to have the body cared for.

In this segment of Pot Shards, there are also fascinating stories of Gregg’s exploits in combat.  He was in the thick of things as CIA Regional Officer in Military Region 3 (War Zone D).  There are accounts of Gregg managing paramilitary operations and interrogations of his crew.  He flew with forward controllers, directing fire support for US and allied troops.  He described radio communications from battles, the descriptions of which bring the reader right to the scene.  Gregg’s efforts were appreciated by US and allied commanders he worked with such as: General James Hollingsworth (US);  General John McGiffert (US); General Nguyen Van Minh (South Vietnam); General Jangnai Sohn (Korea); and General Roh Tae-woo (Korea); Colonel Nguyen Cong Vinh (South Vietnam); and, Colonel Bach Van Hien (South Vietnam).

On his second tour, Gregg could still see how different ideas, among policy and decision makers, about what was truly happening in there impacted the decisions being made and the lessons the US military as well as other security organizations as CIA, were learning from the experience.  At the very end of his tour in Vietnam, General Creighton Abrams hosted a lunch for Gregg at his MACV Headquarters in Saigon, a place where he had been excoriated in the past.  At lunch, Gregg sat next to Abrams and six or eight of his subordinates.  He felt Abrams was the best of the three commanders the US sent to Vietnam.  Knowing Abrams had been in Vietnam for some time, Gregg asked him how long it had actually been.  Abrams proudly responded, “Six years.”  Gregg then asked him how he kept going, and Abrams stated, “Well, I keep learning things.”  Gregg then politely asked him what he had learned so far, and Abrams replied that just finished reading Bernard Fall’s Hell in a Very Small Place, an account of the French defeat at Dien Bien Phu. Abrams said that he “now” understood Fall’s reasoning as to why the French had failed to reestablish their colonial rule in Vietnam.  When Gregg asked “How did Fall explain it,” Abrams explained, “Fall said that the French lost because they failed to politically organize the terrain.  I think I understand that now, but I would not have understood that a year ago.”  Gregg had no response to that, but explained that when he later saw pictures of heavy US battle tanks, named after Abrams, crashing around Iraq and Afghanistan, he thought of Abrams’ answer.

Through his achievements in Vietnam, Gregg developed a reputation in CIA as a very wise and capable officer.  He knew how to present ideas and concepts to develop agreement or consensus on issues. Bringing his thoughts to precise declarations took skill.  This was one of the many skills that Gregg honed through interactions with a number of accomplished professionals.  One who helped Gregg elevate his capabilities while he served in his next overseas assignment as CIA Station Chief in Seoul, was US Ambassador Philip Habib.  Habib was gruff and outspoken.  However, by Gregg’s account, he understood people well and was an excellent diplomat for whom he developed tremendous respect.  Gregg indicates that it was Habib’s maneuvering that help to save the life of liberal South Korean politician, Kim Dae-jung, after he had been kidnapped from his Tokyo hotel room by the Korean Central Intelligence Agency (KCIA).  Habib never accused the Korean President Park Chung-hee of ordering the kidnapping but sent a message to him explaining that the US was aware of the action and hoped he could do everything to keep Kim alive.  This allowed Park a chance to avoid direct embarrassment and contrive a story in which he accused rogue elements of the Korean government had alone committed the act, and in which he took credit for saving Kim.  Gregg said Habib’s astute handling of the situation kept Kim alive and allowed Park to save face.  Gregg explained saving face was always a major concern in Asia.  Habib’s actions allowed Washington’s relations with Seoul to improve.

Gregg completed his career at CIA on a high note at the US National Security Council.  He had achieved success maintaining an ethic of his own, a moral code.  There was goodness living inside a good man.  He saw the greater good that would result from his actions against Communism.  Gregg was invited to join the administration of US President Ronald Reagan as the National Security Adviser to then Vice President George H.W. Bush.  His job made use of all of his skills and experience from CIA.  During those six years with Bush, Gregg traveled to 65 countries.  Along with those visits came his attendance at endless formal events.  Gregg recounts some of rather unusual happenings at such gatherings, providing readers with a gift bag of humorous stories.  Yet, while in the Reagan administration, his self-image was put to the test.  Gregg dedicates a chapter to a painful period of that service: IranContra, which was the purported attempt by the administration to sell surplus arms to Iran in exchange for it to ensure the release of US hostages being held in Lebanon.  Claims that Gregg was involved with that matter were invalidated.  Gregg’s account of it all is captivating.

As Ambassador to South Korea in the administration of President George H.W. Bush, Gregg successfully made use of his experience at CIA as well as the White House.  However, Gregg did not tap into his training as an intelligence officer to manipulate Korean officials or simulate closeness with Koreans he met.  There was no deception at all. Gregg was genuine, natural, in his interactions and that is what helped him gain their respect and confidence.  There was a type of communion between Gregg and many of his senior Korean counterparts.  One of the issues Gregg was determined to confront as ambassador was the continuing negative note in US-South Korean relations over the alleged US involvement in the Kwanju Uprising of 1980.  Then Korean President Chun Doo-hwan had brutally cracked down on protests in Kwanju in the wake of the arrest of Kim Dae-jung on charges of treason. At least two hundred Koreans were killed in the streets.  Chun claimed that the US had fully supported his actions.  That was not true, but by the time Gregg arrived in Korea as ambassador, hostility toward the US was still strong in the city.  The US Cultural Center in Kwangju was often attacked with fire bombs by rioters trying to drive the US out.  Gregg after consulting with others, including Kim Dae-jung, went to Kwangju in January 1990.  While there, Gregg met with six leaders of anti-US groups for over three hours.  Gregg explained that he came to Kwangju to lessen the hostility that the people in the city seemed to hold for the US.  Gregg explained to them that the US was not connected at all to the incident, and many of the actions by the US at that time, such as moving an aircraft carrier to Pusan were not a show of support for Chun. That particular move was meant to signal to North Korea not to intervene.  The anti-US protesters believed the US was close to Chun administration, but Gregg let it be known that there was general distaste for it.  In that vein, Gregg explained, that at the time, the Reagan administration had agreed to receive Chun at the White House if Chun agreed to lift the death sentence imposed on Kim Dae-jung, and to release him from prison.  Most important in the conversation was Gregg’s apology over the fact the US had remained silent for so long on the Kwangju issue.  Gregg diffused the hostility toward the US and attacks on the Cultural Center in Kwangju stopped.  Gregg explained his first visit to Kwangju was deeply valuable in showing him how Koreans can hold feelings of han (deep-seated resentment) when they are dealing with events caused by others and which they feel are unjustified, immoral, and unfair.  When Gregg made his first visit to Pyongyang in April 2002, he explains that he encountered the same feelings of han that he had encountered in Kwangju twelve years before.  However, he notes that lessons learned in Kwangju were helpful as he tried to establish a dialogue and some degree of trust between his North Korean hosts and himself.  Ambassador Philip Habib certainly would have been proud of Gregg’s performance.

There is much more in Pot Shards to enjoy!  It is a book one will want to read again and again.

Quam bene vivas referre, non quam diu!  (It is how well you live that matters, not how long!)  There have been a few stories written about Gregg in books, articles, in anecdotal form.  Many were written in the troubled time of the Iran-Contra Affair.  Pot Shards presents the true life and times of Gregg, an individual who contributed greatly to US foreign and national security policy. Readers are taken on a journey through Northeast and Southeast Asia and halls of power in Washington, DC.  Readers will also discover how much Gregg valued others and his value to humanity.  Gregg continues to make a valuable contribution to US foreign and defense policy efforts as a private citizen.  Pot Shards is an absolute pleasure to read.  Without reservation, greatcharlie.com highly recommends Pot Shards to everyone.

By Mark Edmond Clark

Book Review: Raymond Batvinis, Hoover’s Secret War Against Axis Spies: FBI Counterespionage During World War II (University Press of Kansas, 2014)

In 2010, US counterintelligence and counterespionage efforts resulted in the take down of 10 Russian “sleeper agents” from the “S” Department of the Russian Foreign Intelligence Service (SVR). As Raymond Batvinis discusses in Hoover’s Secret War Against Axis Spies, the foundation of present US counterintelligence capabilities was laid 70 years before.

Outstanding spy novels tell exciting tales of spy rings, secret and double agents, surveillance, codes and ciphers, wiretaps, microdots, deception, disinformation, and even use of invisible ink!  That is what a reader would expect from the works of John le Carré, Frederick Forsyth, Robert Ludlum, or Tom Clancy.  In Hoover’s Secret War Against the Axis: FBI Counterespionage During World War II (University Press of Kansas, 2014), Raymond Batvinis recounts equally thrilling stories of international intrigue as the Federal Bureau of Investigation (FBI), working alongside other US government elements and allies, sought to overcome Germany’s efforts to disrupt and defeat its war effort in the US before and during the war.  They will transfix the reader to the book’s pages much as the writings of the great spy novelists.  However, unlike the novelists’ works, Batvinis’ accounts are not amusements, but discussions of real cases of a struggle between adversaries filled with lessons on counter-intelligence (spycatching) as well as counterespionage (turning enemy agents against their spymasters).  The stories present the thought provoking, sometimes absurd, and often horrifying realities of spycatching and turning spies into double-agents. The history is not presented as nostalgia, but as a text on a unique aspect of the intelligence war against Germany, and to a lesser extent, Japan, from which valuable lessons can be drawn.  It is not by chance Batvinis’ book would be presented in this fashion.  The work is a product of painstaking, detail oriented research, and the benefit of his experience as a former FBI special agent.

Indeed, during his 25 years as an FBI special agent, Batvinis focused on counterintelligence and counterespionage cases.  His assignments included work out of the Washington Field Office and the FBI Intelligence Division’s Training Unit at FBI Headquaters.  As a Supervisory Special Agent, in the Baltimore Division, Batvinis managed the espionage investigations of Ronald Pelton (a spy for the Soviet Union), John Walker and Michael Walker (spies for the Soviet Union), Thomas Dolce (a spy for South Africa), and Daniel Richardson (caught attempting to spy for the Soviet Union).  After the al-Qaeda attacks of September 11, 2001, Batvinis came out of retirement and returned to the FBI for three years in order to manage a team of former FBI special agents and Central Intelligence Agency (CIA) case officers who taught the Basic Counterintelligence Course at the FBI Academy.  With a continued desire to contribute to US national security efforts, Batvinis went on to teach a “Lessons Learned” course for counterintelligence personnel at FBI field offices throughout the US for two years.  Exploiting his doctoral studies in American History, Batvinis has lectured at George Washington University and has written several articles on counterintelligence.  Prior to writing Hoover’s Secret War Against Axis Spies, he published The Origins of FBI Counterintelligence (University Press of Kansas, 2007).

Hoover’s Secret War Against Axis Spies was designed to pick up where The Origins of FBI Counterintelligence finished.  Origins was an in-depth look at the FBI’s development in the 1930s from a small law enforcement organization to a counterespionage service.  The need for change was made stark in 1938 with the bungled handling of the long-running investigation of the Guenther Rumrich espionage ring.  A series of missteps allowed dozens of German agents from Abwehr (German military intelligence) to step out of the US and reach Europe safely.  The Interdepartmental Information Conference in 1939 brought all elements of the burgeoning US intelligence community together for the first time, to discuss creating a structure to handle the espionage threat to the US.  Rather than fight like a sack of wildcats, new linkages were created between the FBI and the US military, and partnerships were established with foreign services such as the Royal Canadian Mounted Police as well as Mexican and British intelligence officials.  The FBI’s General Intelligence Division was established to manage foreign counterintelligence and other intelligence investigations.  In 1940, US President Franklin Roosevelt signed a Presidential order allowing FBI director, J. Edgar Hoover, to begin wiretapping embassies and consulates.  The Rumrich failure, the new initiatives, and FBI’s education in managing the intricate details of counterespionage matters resulted in the surprise arrest of 33 German agents in 1941, effectively breaking the back of German military intelligence in the US.

Although the Special Intelligence Service (SIS) of the FBI (whose evolution and expansion into Europe, Latin America and Africa Batvinis discusses), was already engaged in foreign intelligence in the prewar years, in 1941 Roosevelt created a new foreign intelligence office under a Coordinator of Information (COI).  By the end of the year, COI’s director, William Donovan, managed 600 personnel.  Hoover and Donovan had a mutual dislike of each other that was over nearly 20 years old.  Hoover sensed the COI as an effort by Donovan to supplant SIS, and as both viewed the Oval Office as their turf.  Their poor relationship hampered coordination between their services. In 1942, the COI transformed from a civilian agency to a military intelligence service known as the Office of Strategic Services (OSS), the precursor of the Central Intelligence Agency

In extending his discussion beyond The Origins of FBI Counterintelligence , Batvinis relates the story of how William Stephenson of British Security Coordination (BSC), the center of MI6 (British Secret Intelligence Service) operations in the US, ran afoul of Hoover. Hoover railed on Stephenson for what he viewed as BSC’s rumor mongering and mischief.  Without spoiling this amazing segment of the book, it is enough to say MI6 personnel and MI5 (British Security Service) personnel also had a shaky relationship. Hoover skillfully managed to bypass MI6 and its BSC in the US to reach MI5 in London.  As result, the FBI gained access to Ultra, the British code name for its capability to intercept and decipher encoded German communications from the Enigma system.

Batvinis is at his best in Hoover’s Secret War Against Axis Spies in his discussion of the Double Cross System.  Although known historically as a British success during the war, Batvinis explains that achievements through Double Cross were the result of joint Allied efforts.  That includes the handling of the double-agent, Spanish pacifist Juan Pujol—codenamed “Garbo”—who deceived the Germans into believing the Normandy invasion would not occur, and then convinced them that the June 6, 1944 D-Day landings were a mere diversion for a larger invasion soon to come.  Double Cross began to make use of US based turned German agents after the British, with some difficulty, convinced the US there was great value in counterespionage work.  The very persuasive Ewen Montagu, from Bletchley Park, home of the Ultra secret, was brought into the fray to bring Hoover. Hoover and the FBI hoped through counterespionage, further control could be gained over German intelligence activities.

Among the several Double Cross counterespionage cases Batvinis discusses are that of: a flamboyant playboy who was also a central figure in the dispute between Hoover and Stephenson; a world renown French flyer, who had orders to infiltrate the US aircraft industry; and a lecherous Dutchman, who was deemed useless as an agent and whose activities in the US were fabricated for his spymasters while he remained bottled up in London.  Batvinis takes the reader to school, brilliantly teaching about the fundamental nature and “nuts and bolts” of counterintelligence and counterespionage in a manner understandable for both the intelligence and law enforcement professional and the laity right in the midst of his exhilarating storytelling.  To help readers understand the type of enemy the FBI faced, Batvinis explains how Germany acquired the often involuntary service from German expatriates as agents and their very capable and somewhat ingenious handling of them.  In Chapter 11 entitled “The Count from New York,” Batvinis discusses the case of Wilhelm Rautter, a scion of German aristocracy, who was recruited into the German military intelligence without choice, and tacit threat to his well-being and that of his family and property.  As Batvinis magnificently recounts, Rautter, searching for employment, was invited to interview at Remy and Company, by its owner Hans Blum. After a month at the company, during which he established a very cordial relationship with the owner, Rautter was abruptly interrupted in the midst of perfunctory business chatter when Blum said, “German military intelligence had investigated him, found him acceptable, and wished to use him for collecting information in the United States.”  Blum downplayed the request in a friendly, soft-spoken and reassuring, but subtly betraying a sinister, threatening tone indicating that he would not accept “no” for an answer.

Almost immediately, Rautter began training at Blum’s company’s in secret writing, radio construction, transmitting, receiving, coding, and decoding cabled messages using a standard work of fiction.  He was directed to recruit an experienced operator to handle transmissions once he reached New York City.  Rautter was given the address of a mail drop on Manhattan’s Upper Westside, and rented an apartment in Brooklyn near the famous Brooklyn Navy Yard. He was provided a contact, Heinrich Stuhl, whose home, also in Brooklyn, offered easy observation of Brooklyn and Manhattan piers where merchant ships routinely lined up to load cargo bound for Great Britain.  Rautter was given a catalogue of requirements to monitor shipping bound for Europe by riding the Brooklyn-Staten Island ferry.  He would use Blum’s business contacts to travel throughout the East coast of the US, to observe factory facilities of US Steel, Remington Arms Corporation, and twelve leading aircraft companies such as the Douglas and Boeing companies.  He also was directed to pick up intelligence in local bars and restaurants about troop strength, unit designations, military equipment, and specifics on armament production.  To evade capture, Rautter would vary the means of communication with Germany.  The unexpected collapse of the FBI’s capability to intercept radio transmissions also managed to temporarily thwart its counterintelligence effort.  Nevertheless, in 1944, Rautter was identified and waylaid by the US government as the outcome of some incredible investigative work by the FBI, along with the US Customs Service, comparing German handwriting samples with tens of thousands of baggage declarations of travelers going to Europe and British censors on Bermuda, sifting through mail to Europe.

To understand how the FBI handlers engaged in counterespionage operations against Germany, Batvinis illustrated how they concerned themselves with things that the average person might very well assume was minutiae or too esoteric, to matter.  Among the tactics, techniques, and procedures used, the FBI would first closely watch a German agent to determine his susceptibility for neutralization and recruitment before intercepting him.  Particular attention would be placed on his movements and behavior patterns.  The target’s mail and cable traffic would be copied and read, his contacts were identified, and his accommodations would be searched.  Once the turned agent was activated by the FBI, his reports to Germany were designed to match his trained capabilities and the degree of the agent’s access to information.  For example, if stationed in New York City, an agent from the marine branch of German intelligence would be expected to easily identify all types of Allied ships from specific combat vessels to cargo ships and tankers entering and departing the port.  Allowing a turned agent to remain positioned near a port or shipyard might require the FBI to sacrifice too much vital information about US activities, to legitimize his efforts, in exchange for a tentative counterintelligence reward. Moreover, the US Navy would never clear information on the departure of such convoys, and it would be difficult for a double-agent to explain the failure to collect such information to his intelligence principals in Germany.  The counterespionage agent would need to be placed in a plausible new post, such as Washington, which would allow for a mixture of valuable information, rumors, and other pieces of information picked up from soldiers and sailors in local bars and from senior military and military officials on the Washington cocktail party circuit.  A persona had to be established for counterespionage agents that would typically present them as being fiercely loyal and well-placed, making the most of access to important military secrets, but greatly concerned about being discovered by the FBI.  In one case, a counterespionage agent’s persona was spiced up with emphasis on his struggle with communications equipment and transmission problems, coupled with encoding and decoding errors.  When transmitting messages for a turned German agent, a painstaking effort would be put into mimicking his distinctive transmission style through the study of recordings.

In Chapter 13, entitled, “Peasant,” Batvinis explains that one case, to copy the style of a very inexperienced radio operator, his FBI substitute filled his messages with errors common to amateurs.  Further, by using his left hand, with the radio key placed on the edge of a table so that the hand and arm had no support, the technician found that he could easily produce scores of unintentional and intentional errors.  The FBI categorized messages from counterespionage agents to Germany as “A” or “B.” “A” messages held a blend of accurate and fabricated information, created by Joint Security Control (JSC) of the Military Intelligence Division, established in 1941.  JSC had a central deception staff to its portfolio of both the Army and the Navy to plan measures for disguising or concealing an operation against the enemy that would encourage enemy action on a belief that something true was actually false. “B” messages, developed by FBI special agents of the Washington Field Office from open sources were sent in the form of suggested messages with the actual source of information actually identified.  All “A” and “B” messages were first discussed with translators of the FBI’s Cryptanalytic Section, which helped assure that German intelligence service radio operators made no mistake in deciphering the information.  The reader will find many more comparable lessons in Batvinis’ book.

There is some discussion of FBI efforts against Japan.  One segment concerns German efforts to gather and transmit important information on B-29 bomber manufacturing, other war production relevant to the Pacific Theater of Operations, the increase in conscription in the US in 1945, and war plans.  The extent to which the FBI tried put Double Cross measures in play against the Japanese is discussed in Chapter 12 entitled “Japs, Aspirin, and Pep.”  Although Batvinis relays how the FBI had little success in positioning double agents among Japanese targets, he also uses this aspect of the history of US counterintelligence and counterespionage in World War II to explain how best to manage an effort when “That dog don’t hunt.”

Organizing the US counterintelligence effort was not based on a vain desire by the FBI to take on a new capability on top of its well-known criminal investigation work.  There was no other service fully engaged in counterintelligence work, and as the war drew close to the US, it became an absolute necessity.  There was no guarantee of success. The German intelligence service, and the various departments of German military intelligence were up and running full speed with well-trained and very capable agents spreading out worldwide.  Nevertheless, it was anticipated that through the right organization, appropriate preparation, and diligent work, as well as engagement with allies, the effort would be effective and possibilities for success would increase.  The FBI learned quickly that the fight against Germany was not taking place in some “war over yonder” but already underway in US.  Despite the difficulties the FBI had with the OSS, and its counterparts in Britain, those obstacles were overcome, and it was able to protect the US public and US interests from harm.

There is a breath-taking amount of amazing information on counterintelligence and counterespionage to learn from Hoover’s Secret War Against Axis Spies.  There is also much to that can be learned from the history it provides on US relations with Great Britain and other nations on national security issues. Batvinis’ book is also a real page turner, and one that will be difficult to pull away from.  Without reservations, greatcharlie.com provides its highest recommendation to Hoover’s Secret War Against Axis Spies to its readers. They are guaranteed to read at it over and over again.  Given the timeless value of its information, for some practicioners, it may even serve as a reference.  It is a book everyone will appreciate.

By Mark Edmond Clark